Privinity Gold Sponsor DataGrillen
On May 16 and 17 in Lingen Germany, a unique data event will take place: DataGrillen. We are very proud to announce that we, as Privinity, will contribute to this event as a sponsor!
NMTY becomes Privinity
After years of growth, development, and countless beautiful moments under the name NMTY, - as we communicated in July last year - the time has come to change our name.
Four applications where anonymizing can play a role
When it comes to protecting privacy-sensitive data through anonymizing, we often think of situations where this data is ultimately used for research or analysis purposes. However, there are more applications where anonymizing can play a crucial role. We've outlined the four most common applications for you!
k-Anonymity
K-anonymity is a powerful method to assess the quality of anonymization and the risk of re-identification. In this article we will explain what k-anonymity is and how it can be applied.
What is anonymizing and how do you apply it?
Anonymizing is one of the most secure methods to safeguard sensitive data. Personal data that is adequately anonymized no longer falls under the regulations of the General Data Protection Regulation (GDPR), allowing you to use it for any purpose. But what exactly is anonymization, and how do you ensure that personal data is sufficiently anonymized?
What is pseudonymization, and how does it differ from anonymization?
Anonymization and pseudonymization are two terms often used interchangeably when discussing the protection of sensitive data. While both terms are commonly used to refer to the same process, they represent two entirely different methods of safeguarding data, applied in different ways and situations. So what makes pseudonymization different from anonymization?
Privacy by Design & Default
The concepts of Privacy by Design and Privacy by Default are often terms mentioned in the context of software development. However, these terms are not only applicable to software development but also play a role in processes and behavior. Privacy by Design and Privacy by Default are often mentioned together, which is not surprising as both terms are closely related. However, they have distinct meanings. Let's start by exploring what Privacy by Design entails, and you'll see that Privacy by Default naturally becomes part of the Privacy by Design philosophy.
Purpose limitation: What is it, and why does it play such a crucial role?
Undoubtedly, you've come across the terms "purpose limitation" or "purpose-bound" in the context of data privacy protection. That's not surprising, as purpose limitation is essentially at the core of the General Data Protection Regulation (GDPR). But what does it exactly mean, and why is it so important?