Most people are not qualified to build their own anonymization, notes Humu Chief Privacy Officer Lea Kissner. Unlike cryptography, however, the research is at a far earlier stage, and the pre-built code is virtually unavailable. That has not stopped people from claiming certain datasets are anonymized and having them re-identified. Those datasets are generally deidentified rather than anonymized. In this latest installment of a series of Privacy Tech posts on privacy engineering and user-experience design, Kissner breaks down the differences between deidentification and anonymization. While deidentification is not anonymization in virtually all cases, it is still useful as a data minimization technique.
If you want to comment on this post, you need to login.