Big Data

De-identification Standards to Protect Personal Information

Individuals value their privacy. In contrast, businesses value the ability to leverage personal information to deliver quality products and services to meet the needs of their clients. The legal standards that regulate the protection of personal information help bridge the gap between these two opposing interests. This article addresses when to apply de-identification, the legal…

Bringing the Cloud Down to Earth

As companies of all sizes begin to store data in the cloud, privacy issues have become big news. Apple co-founder Steve Wozniak commented on the cloud, saying that “the more we transfer everything onto the web, onto the cloud, the less we’re going to have control over it.”[1] A major problem for companies is a…

Identifying Personally Identifiable Information

Data breaches are an everyday occurrence that demonstrate no enterprise or individual is impervious to vulnerabilities. In 2015, there were 781 known data breaches in the U.S., the second highest year since the Identity Theft Resource Center began tracking them in 2005.[1] Between this influx of breaches and rapidly evolving and emerging privacy laws, it is…