Data Masking

Cole PrudenData Protection, De-Identification, Personally Identifiable Information, Sensitive Data Protection

Data Masking

The best way to safeguard sensitive data is to keep it out of sight — and out of reach.  Part 2 of this 3-part mini-series explores Data Masking and the irreversible role it plays in PII protection. Let’s get into it. What is Data Masking Data masking is a non-reversible transformation process that “masks” sensitive data by partially or fully … Read More

Data De-Identification

Cole PrudenData Protection, De-Identification, Personally Identifiable Information, Sensitive Data Protection

Data De-Identification

The best way to safeguard sensitive data is to keep it out of sight — and out of reach. This 3-part mini-series explores the 3 BEST anonymization tactics for processing and storing protected information. Let’s learn how. What is Data De-Identification? The first TOP method of data anonymization is called Data De-Identification. In layman’s terms, data de-identification is the process … Read More

PII De-Identification vs. Masking vs. Redaction

Cole PrudenDe-Identification, Personal Data Protection, Sensitive Data

PII De-Identification vs. Masking vs. Redaction

There’s a fine balance between processing users’ PII and storing it safely. The primary ways to encrypt information are Data De-Identification, Data Masking, and Data Redaction. But how exactly do they work? Let’s explore. Data De-Identification To put it plainly, data de-identification is the process of removing personally identifiable information (PII) from data. The purpose of data or PII de-identification … Read More