!!! Overview [{$pagename}] or [Pseudonymization] is a type of [privacy Enhancing Technologies] [{$pagename}] is a procedure by which the most [attributes] within a [data] record are replaced by one or more artificial identifiers, or [pseudonyms]. There can be a single [pseudonym] for a collection of replaced fields or a [pseudonym] per replaced field. The purpose is to render the [data] record less [identifying|Identification] and therefore lower [End-User] or [patient] objections to its use. [{$pagename}] is the process of either [encrypting|Encryption] or removing [personally Identifiable Information] from [data] sets, so that the [Personal Entity] whom can remain [anonymous]. The Privacy Technology Focus Group defines [{$pagename}] as "technology that converts [clear text|message] data into a [non-person entity] readable and irreversible form, [hashing] and [encryption] techniques in which the decryption key has been discarded." [{$pagename}] enables the [Data In Transit] across a boundary, such as between two departments within an agency or between two agencies, while reducing the risk of unintended [Disclosure], and in certain environments in a manner that enables evaluation and [analytics] post-anonymization. !! [Health Data Set|Health Dataset] [{$pagename}] in the [context] of [medical data|HIPAA], anonymized [data] refers to [Patient Data] from which the [patient] cannot be identified by the recipient of the information. [HIPAA] is very specific on what [data] [MUST] be removed together with any other information which, in conjunction with other [data] held by or disclosed to the recipient, could provide [Identification] the [patient]. Following [{$pagename}] on [Protected Health Information], the [data] is no longer [Protected Health Information] and is referred to a [Health Dataset] [De-anonymization] is the reverse process in which [anonymous] data is cross-referenced with other data sources to re-identify the [anonymous] data source. Generalization and perturbation are the two popular anonymization approaches for relational data. !! [vulnerability] of [{$pagename}][2][3] [{$pagename}] ability to maintain [anonymity] within [{$pagename}] data sets is questionable. Several reports indicate that a small amount of externally associated data may provide [De-anonymization] !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [Data_anonymization|Wikipedia:Data_anonymization|target='_blank'] - based on information obtained 2016-07-06 * [#2] - [No silver bullet: De-identification still doesn’t work|https://freedom-to-tinker.com/blog/randomwalker/no-silver-bullet-de-identification-still-doesnt-work/|target='_blank'] - based on information obtained 2016-08-14 * [#3] - [SCIENTISTS EXPOSE NEW VULNERABILITIES IN THE SECURITY OF PERSONAL GENETIC INFORMATION|http://wi.mit.edu/news/archive/2013/scientists-expose-new-vulnerabilities-security-personal-genetic-information|target='_blank'] - based on information obtained 2016-08-14