Course Title: INTENSIVE TRAINING COURSE ON DATA DE IDENTIFICATION

Course Date Location Course fee: Click to Register (Group)
Start Date: 10/02/2025 End Date: 14/02/2025 Nairobi, Kenya $ 1,250 Register as Individual Register for Online Training Register as a Group
Start Date: 17/02/2025 End Date: 21/02/2025 Mombasa, Kenya $ 1,250 Register as Individual Register for Online Training Register as a Group
Start Date: 07/04/2025 End Date: 11/04/2025 Nairobi, Kenya $ 1,250 Register as Individual Register for Online Training Register as a Group
Start Date: 14/04/2025 End Date: 18/04/2025 Mombasa, Kenya $ 1,250 Register as Individual Register for Online Training Register as a Group
Start Date: 02/06/2025 End Date: 06/06/2025 Nairobi, Kenya $ 1,250 Register as Individual Register for Online Training Register as a Group
Start Date: 09/06/2025 End Date: 13/06/2025 Mombasa, Kenya $ 1,250 Register as Individual Register for Online Training Register as a Group
Start Date: 28/07/2025 End Date: 01/08/2025 Nairobi, Kenya $ 1,250 Register as Individual Register for Online Training Register as a Group
Start Date: 04/08/2025 End Date: 08/08/2025 Mombasa, Kenya $ 1,250 Register as Individual Register for Online Training Register as a Group
Start Date: 22/09/2025 End Date: 26/09/2025 Nairobi, Kenya $ 1,250 Register as Individual Register for Online Training Register as a Group
Start Date: 29/09/2025 End Date: 03/10/2025 Mombasa, Kenya $ 1,250 Register as Individual Register for Online Training Register as a Group
Start Date: 17/11/2025 End Date: 21/11/2025 Nairobi, Kenya $ 1,250 Register as Individual Register for Online Training Register as a Group
Start Date: 24/11/2025 End Date: 28/11/2025 Mombasa, Kenya $ 1,250 Register as Individual Register for Online Training Register as a Group

INTRODUCTION

Driving data value requires careful consideration beyond legal compliance under GDPR, HIPAA and state-level laws like CCPA. Once you’ve completed this 5-day course, you’ll know what’s required to maximize data utility while meeting your organization’s regulatory and privacy obligations. This course has several benefits to participants and their organizations; safely leverage sensitive data for analytics that drive priority business outcomesAligning business and privacy teams to protect the organization’s sensitive data and uncover its untapped value, and improving the efficiency of data analysis and management operations by integrating industry-leading techniques with the existing processes and procedures.

Participants who successfully complete the course will receive Certificate of Participation.

COURSE OBJECTIVES

At the end of this course the participants will learn:

·      Key principles behind measuring identifiability and establishing defensible thresholds to render data non-identifiable.

·      How to apply de-identification to protect privacy while leveraging the power of your data.

·      Risk management and reporting necessary to provide auditable proof you’ve taken consistent, defensible steps toward protecting privacy.

DURATION

5 days

WHO SHOULD ATTEND

This course is designed for professionals working in, Analytics, Compliance, Data, Legal, Privacy, Security, Statistics as well other relevant domains.

COURSE CONTENT

Module 1 –Legal Considerations

A discussion of the legal bases for using and disclosing information for secondary purposes under HIPAA, CCPA, and GDPR, and when each can be applied.

Module 2 – Concepts and Definitions

An overview of known re-identification attacks, analysis of different data release models and classification of identifiers.

Module 3 – Risk Measurement Concepts

An introduction to equivalence classes, and discussion of various risk types & metrics, and their relevance to various anonymization use cases.

Module 4 – Analysis of Context Risk

Descriptions of different types of attacks and how to evaluate the risk of them re-identifying data subjects. This module also covers choosing an acceptable threshold for the risk of re-identification based on the characteristics of the dataset.

Module 5 – Data Transformation Methods

Methods to mask direct identifiers and de-identify quasi-identifiers.

Module 6 –Risk Management and Reporting

Determining if the risk is below an acceptable threshold. Creating a report and documenting that the risk of re-identification is very small.

GENERAL NOTES

·      The instructor-led trainings are delivered using a blended learning approach and comprises of presentations, guided sessions of practical exercise, web-based tutorials and group work. Our facilitators are seasoned industry experts with years of experience, working as professionals and trainers in these fields.

·      The participants should be reasonably proficient in English as all facilitation and course materials will be offered in English.

·      Upon successful completion of this training, participants will be issued with a certificate.

·      The training will be held at Kincaid Training Centre. The course fee covers the course tuition, training materials, two break refreshments and lunch.

·      All participants will additionally cater for their, travel expenses, visa application, insurance, and other personal expenses.

·      Accommodation and airport pickup are arranged upon request. For reservations contact the Training Coordinator at Email: training@kincaiddevelopmentcenter.org or Tel: +254 724592901

·      This training can also be customized to suit the needs of your institution upon request. You can have it delivered in our Kincaid Training Centre or at a convenient location.

 

For further inquiries, please contact us on Tel: +254 724592901 or send mail to training@kincaiddevelopmentcenter.org

 

 

Payments are due upon registration. Payment should be sent to our Bank account before commencement of training and proof of payment sent to training@kincaiddevelopmentcenter.org