[17467] in cryptography@c2.net mail archive
Re: de-identification
daemon@ATHENA.MIT.EDU (Anne & Lynn Wheeler)
Mon Jun 13 18:44:47 2005
X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 13 Jun 2005 13:21:55 -0600
From: Anne & Lynn Wheeler <lynn@garlic.com>
To: Florian Weimer <fw@deneb.enyo.de>
Cc: dan@geer.org, cryptography@metzdowd.com
In-Reply-To: <874qc3q3op.fsf@deneb.enyo.de>
Florian Weimer wrote:
> We call it pseudonymization ("Pseudonymisierung"). It's a commonly
> used technique in Germany to detaint personally identifiable
> information, so you can share it freely for statistics purposes. The
> methods used in the field are rather crude (time-seeded LCGs are very
> common, unfortunately).
from privacy glossary and taxonomy
http://www.garlic.com/~lynn/privacy.htm
that i put together when working on x9.99 PIA standard for financial
industry ... from HIPAA
anonymized
Previously identifiable data that have been deidentified and for
which a code or other link no longer exists. An investigator would not
be able to link anonymized information back to a specific individual.
[HIPAA] (see also anonymous, coded, directly identifiable, indirectly
identifiable)
---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com