Data security - Checklist for De-identification of personal information
Introductory note:
This checklist can be used as a guide to techniques that can be used to de-identify personal information.
Links to related content:
For further practical guidance on de-identification of personal information, see Types of data.