Category: Blog

Four applications where anonymizing can play a role
k-Anonymity
What is anonymizing and how do you apply it?
What is pseudonymization, and how does it differ from anonymization?
Privacy by Design & Default