Skip to content
  • Data
  • Digital transformation

Data privacy: navigating the maze that is data privacy

Navigating data privacy

by TPXimpact team

Over the past few years, the world has been rocked by data scandal after data scandal (e.g. Cambridge Analytica) – which has shed a light on a new potential risk that organisations need to be averse to. Spending on data security is predicted to grow by 8.7% in 2019 – but it is a worthwhile investment when you see the havoc that lax data privacy rules can cause for an organisation.

Data privacy has become one of the hottest topics of the 21st century

In order to avoid the risk of lax data privacy, an organisation may need to invest in the following techniques;

  1. Data masking
  2. Automated Statistical Generalisation
  3. Format-preserving Tokenisation

All of these sound like big, scary techniques that can be extremely complicated to implement across the whole company – but it still stands that the best policy would be to apply all of these techniques (and more!).

Using Privitar Publisher, one can create many layers of data privacy protocols that can be consistent and repeatable across both sources and applications. This means that organisation-wide data policy can be orchestrated from one central point.

On Privitar Publisher’s UI, the user can create their data privacy policies without any coding required – meaning that policies can be understood and set by a number of different employees. The policies are stored in a central repository, where other business areas of an organisation can access them – meaning consistency in data privacy across your whole organisation.

Privitar Publisher is used as an orchestration tool where multiple technologies can be used to perform the data de-identification actions - for example Hadoop, data streaming, or Publisher On-Demand (Privitar’s own application for data de-identification jobs).

Your data is stored in a Protected Data Domain (PDD). A PDD can be accessed by the tools performing the de-identification actions, as well as surrounding tools (such as file systems, and databases). Each individual PDD can only be accessed for the individual user case (e.g. DevOps can only access the DevOps PDD). The PDD also takes care of watermarking and metadata tagging – which takes a lot of the headaches out of your data governance protocol.

There has never been a time where data de-identification has been more important for organisations – and Privitar should be your first port-of-call. The specialised software performs many actions of data de-identification, meaning that your organisation in a much safer position regarding data privacy.

TPXimpact team's avatar

TPXimpact team

Experts in design, data, experience and technology

Contact TPXimpact

Our recent insights


How harnessing train data can improve rail services

Modern trains collect valuable data that could revolutionise UK rail services. Operators need to maximise its potential.

Reducing data risks: Lessons from the UK flight chaos

What the aviation industry's recent mishap can teach us about the importance of good data governance

Do you know how to destroy your data securely?

In this final part of our data ethics series, we look at what data destruction is and how you can comply with GDPR required actions.