An introductory guide to de-identification for privacy professionals, risk managers … and anyone else who feels a bit bewildered
When it comes to de-identification, you can’t apply privacy or data protection law, or assess project risk, until you first understand the relative merits and limitations of different de-identification techniques. There are detailed, lengthy guides available for statisticians and data scientists, but what if you want something more accessible as an introduction?
This concise, 28-page eBook will improve data literacy for privacy, risk & compliance and legal professionals. It covers:
- Why de-identification matters in privacy law
- Why de-identification matters in business practice
- Managing risk: (re)identification and other privacy harms
- A plain language guide to different de-identification techniques, including their strengths and weaknesses, and
- A checklist of factors to consider for any given de-identification proposal.
If you want to understand how de-identification fits into privacy or data protection law, a simple illustration of how each different technique works, and a plain language overview of the strengths and weaknesses to factor into risk assessment considerations, this guide is for you.
Our guide provides a useful introduction to the topic in any jurisdiction.
This fourth edition has been updated to include new resources published since our first edition in 2017, including guidance from the National Health & Medical Research Council, Australian Computer Society and the Office of the Victorian Information Commissioner, as well as an intro to privacy-preserving computation techniques.
Click below to purchase Demystifying De-identification.
We accept credit card, debit card or PayPal. Questions? See our eBook FAQs.