Create a Gartner Account

Three Critical Use Cases for Privacy-Enhancing Computation Techniques


Sign In

Already have a Gartner account?

Summary

Privacy concerns have led to constraints around how and where personal data is processed. Security and risk management leaders can manage constraints while respecting individual privacy by applying PEC techniques in AI modelling, cross-border data transfers, and data analytics.

Pricing

Order Amount: $195.00

Help

For help or information on purchasing documents contact us.

Please provide your profile information.



By clicking the "Submit" button, you are agreeing to the Gartner Terms of use and Privacy Policy.

Call +1 855-515-4486 or contact us

to become a Gartner client.