Simply removing direct and indirect personal identifiers isn’t enough to achieve de-identification of a dataset. Data controllers must also analyze the context in which the data is presented, as well as the risk of re-identification. Not only that, but technical methods for performing de-identification are not prescribed by law, but rather are often left to the discretion of the data controller. So how do you limit risk of re-identification and respond quickly with appropriate technical methods of de-identification?
While the provisions of the EU General Data Protection Regulations (GDPR) will not become binding until 2018, its provisions considerably expand privacy rights by imposing rigorous obligations on data processors and controllers that span breach notification, data anonymization and trans-border data transfers
Then I could see for myself if the new drive worked or if the problem was really the disk controller on the notebook’s motherboard
8403 Colesville Rd #1100Silver Spring, MD 20910USA
Phone: (301) 587-8202Toll free: (800) 477-2446Fax: (301) 587-2711Email: hello@aiim.org
JoinBenefitsLearn More
About UsTerms of Use