Nate-GB

Search

Search IconIcon to open search

Database Deidentification Methods

Last updated Feb 24, 2023

Deidentification methods are usually implemented as part of the database management system hosting the data. Sensitive fields will be tagged for deidentification whenever a query or report is run.

# Types of Deidentification