Create a Gartner Account

Three Critical Use Cases for Privacy-Enhancing Computation Techniques

Sign In

Already have a Gartner account?


Privacy concerns have led to constraints around how and where personal data is processed. Security and risk management leaders can manage constraints while respecting individual privacy by applying PEC techniques in AI modelling, cross-border data transfers, and data analytics.


Order Amount: $195.00


For help or information on purchasing documents contact us.

Please provide your profile information.

By clicking the "Submit" button, you are agreeing to the Gartner Terms of use and Privacy Policy.

Call +1 855-515-4486 or contact us

to become a Gartner client.