Uncategorized Using the Safe Harbor Method to De-Identify Data Last week, we introduced the topic of de-identified data, its exceptions under various comprehensive privacy laws, and two methods of how to properly de-identify data. In this week’s edition, we …