Systems | Development | Analytics | API | Testing

The Official 2021 Checklist for HIPAA Compliance

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a U.S. federal law. It sets national standards for health care providers to maintain the privacy of patients' protected health information (PHI), including electronically protected health information (ePHI). If you collect, store, or process any kind of patient or medical data, you need to be aware of HIPAA and how it affects your operations. But what does it really mean to be HIPAA compliant?

What is PII Masking and How Can You Use It?

Imposter fraud is the second-most common type of fraud reported to the Federal Trade Commission, with around one-fifth of all cases resulting in financial loss to the victim. This often occurs because of a failure on the part of organizations to protect personally identifiable information (PII). Fraud is only one type of attack that may occur. Phishing is another exceptionally common data security threat. It often results from crawlers collecting email addresses, one type of PII, on the open web.

A Guide to Data Privacy and Data Protection

Organizations collect and use personal data for a variety of purposes, often without considering the impact on data privacy. Individuals are increasingly more aware of how their data is being used and the lack of say they have over the process. Data privacy and protection regulations are in place around the world to protect consumers and stop their personal information from being misused.

6 Mistakes to Avoid When Handling PII

Personally identifiable information, or PII, is sensitive information that can identify an individual. Industry or data protection laws often regulate this type of data, requiring that organizations handle PII according to specific practices. It’s all too easy to make mistakes when working with PII, so we've highlighted six common scenarios to look out for.

BI Compliance: Can a Restructure Deliver Enhanced Data Privacy?

Every data-driven business is terrified of the prospect of a data breach. Exposing sensitive data could mean reputational damage, loss of clients, and heavy fines under emerging privacy laws. But every data-driven business also wants to make use of its data. Business intelligence (BI) platforms allow anyone to build complex and detailed dashboards that help them understand the organization’s current state. How do you resolve this tension? One approach is to build a privacy-first data structure.

ELT: Easy to Deploy, Easy to Outgrow

Extract, load, transform (ELT) technology is a type of data pipeline that ingests data from one or more sources, loads the data into its destination (typically a data lake), and then allows end-users to perform ad-hoc transformations on it as needed. ELT can perform mass extraction of all data types, including raw data, without the need to set up transformation rules and filters before data loading.