Data Value

  • Consent management
  • Processing purpose management
  • Secure mass processing in compliance with data protection laws
  • Secure mass processing performance

The following are the different protection techniques used to ensure that sensitive personal data is not identified during mass processing:

  • Differential anonymization
  • Homomorphic encryption
  • Tokenisation and/or deterministic encryption
The analysis processing of unencrypted data by authorised users only (Big Data Scientists, etc.) and within a defined period of time could also be a solution.

The purpose of the analysis processing and the consent of the data subjects concerned – if we are talking about sensitive personal data – will have been defined and obtained beforehand.

Enterprise wide
application data protection

Location

REGDATA SA
Campus Biotech Innovation Park Genève
Avenue de Sécheron 15
1202 Genève - Suisse