An introductory guide to de-identification for privacy professionals, risk managers … and anyone else who feels a bit bewildered
When it comes to de-identification, you can’t apply privacy or data protection law, or assess project risk, until you first understand the relative merits and limitations of different de-identification techniques. There are detailed, lengthy guides available for statisticians and data scientists, but what if you want something more accessible as an introduction?
This concise, 28-page eBook covers:
- Why de-identification matters in privacy law
- Why de-identification matters in business practice
- Managing risk: (re)identification and other privacy harms
- A plain language guide to different de-identification techniques, including their strengths and weaknesses, and
- A checklist of factors to consider for any given de-identification proposal.
If you want to understand how de-identification fits into privacy or data protection law, a simple illustration of how each different technique works, and a plain language overview of the strengths and weaknesses to factor into risk assessment considerations, this guide is for you.
Our guide provides a useful introduction to the topic in any jurisdiction.
Updated October 2018: This third edition has been updated to include new resources published since our first edition in 2017, including guidance from the National Health & Medical Research Council, and the Office of the Victorian Information Commissioner.
Click below to purchase Demystifying De-identification.
We accept credit card, debit card or PayPal. Questions? See our eBook FAQs.