[17467] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: de-identification

daemon@ATHENA.MIT.EDU (Anne & Lynn Wheeler)
Mon Jun 13 18:44:47 2005

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 13 Jun 2005 13:21:55 -0600
From: Anne & Lynn Wheeler <lynn@garlic.com>
To: Florian Weimer <fw@deneb.enyo.de>
Cc: dan@geer.org, cryptography@metzdowd.com
In-Reply-To: <874qc3q3op.fsf@deneb.enyo.de>

Florian Weimer wrote:
> We call it pseudonymization ("Pseudonymisierung").  It's a commonly
> used technique in Germany to detaint personally identifiable
> information, so you can share it freely for statistics purposes.  The
> methods used in the field are rather crude (time-seeded LCGs are very
> common, unfortunately).


from privacy glossary and taxonomy
http://www.garlic.com/~lynn/privacy.htm

that i put together when working on x9.99 PIA standard for financial
industry ... from HIPAA

anonymized
    Previously identifiable data that have been deidentified and for
which a code or other link no longer exists. An investigator would not
be able to link anonymized information back to a specific individual.
[HIPAA] (see also anonymous, coded, directly identifiable, indirectly
identifiable)

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post