When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Pseudonymization - Wikipedia

    en.wikipedia.org/wiki/Pseudonymization

    The pseudonym allows tracking back of data to its origins, which distinguishes pseudonymization from anonymization, [9] where all person-related data that could allow backtracking has been purged. Pseudonymization is an issue in, for example, patient-related data that has to be passed on securely between clinical centers.

  3. Data anonymization - Wikipedia

    en.wikipedia.org/wiki/Data_anonymization

    Generalization and perturbation are the two popular anonymization approaches for relational data. [4] The process of obscuring data with the ability to re-identify it later is also called pseudonymization and is one way companies can store data in a way that is HIPAA compliant.

  4. De-identification - Wikipedia

    en.wikipedia.org/wiki/De-identification

    The removal or generalization of 18 elements from the data. That the Covered Entity or Business Associate does not have actual knowledge that the residual information in the data could be used alone, or in combination with other information, to identify an individual. Safe Harbor is a highly prescriptive approach to de-identification.

  5. Data re-identification - Wikipedia

    en.wikipedia.org/wiki/Data_re-identification

    Such data has proved to be very valuable for researchers, particularly in health care. GDPR-compliant pseudonymization seeks to reduce the risk of re-identification through the use of separately kept "additional information". The approach is based on an expert evaluation of a dataset to designate some identifiers as "direct" and some as "indirect."

  6. Data masking - Wikipedia

    en.wikipedia.org/wiki/Data_masking

    Data masking or data obfuscation is the process of modifying sensitive data in such a way that it is of no or little value to unauthorized intruders while still being usable by software or authorized personnel. Data masking can also be referred as anonymization, or tokenization, depending on different context.

  7. General Data Protection Regulation - Wikipedia

    en.wikipedia.org/wiki/General_Data_Protection...

    Business processes that handle personal data must be designed and built with consideration of the principles and provide safeguards to protect data (for example, using pseudonymization or full anonymization where appropriate). [33] Data controllers must design information systems with privacy in mind.

  8. Category:Data anonymization techniques - Wikipedia

    en.wikipedia.org/wiki/Category:Data...

    Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Help; Learn to edit; Community portal; Recent changes; Upload file

  9. Datafly algorithm - Wikipedia

    en.wikipedia.org/wiki/Datafly_algorithm

    Datafly algorithm is an algorithm for providing anonymity in medical data. The algorithm was developed by Latanya Arvette Sweeney in 1997−98. [1] [2] Anonymization is achieved by automatically generalizing, substituting, inserting, and removing information as appropriate without losing many of the details found within the data.