Data security - Checklist for De-identification of personal information

Introductory note:
This checklist can be used as a guide to techniques that can be used to de-identify personal information.

Links to related content:
For further practical guidance on de-identification of personal information, see Types of data.