A guide to deidentification

30/04/2020 | IAPP

We’ve encountered significant confusion on techniques used to preserve privacy and maintain security, such as masking, encryption and others. Because these techniques are so central to the legal and ethical use of data, we thought we’d put together a short guide designed to help shed light on this critical area. 

Read Full Story
light and data image

What is this page?

You are reading a summary article on the Privacy Newsfeed, a free resource for DPOs and other professionals with privacy or data protection responsibilities helping them stay informed of industry news all in one place. The information here is a brief snippet relating to a single piece of original content or several articles about a common topic or thread. The main contributor is listed in the top left-hand corner, just beneath the article title.

The Privacy Newsfeed monitors over 300 global publications, of which more than 2,500 summary articles have been posted to the online archive dating back to the beginning of 2020. A weekly roundup is available by email every Friday.

COVID-19: FLEXIBLE, LIVE ONLINE BCS & IAPP TRAINING NOW AVAILABLE - PLEASE CONTACT FOR DETAILS