The problem
Identifying a software solution to meet your data transformation needs is just the first step in defining your approach to compliant data de-identification. How you leverage that solution within your company surfaces a number of new questions to consider:
- Who will be responsible for managing the data de-identification solution?
- What roles or permissions will your users have?
- How will you govern specific de-identification techniques?
- What security and audit controls will you put in place?
Determining a management plan is critical to maximizing the solution’s value across your use cases and ensuring its scalability across your organization.


