Mechanisms exist to perform de-identification of sensitive/regulated data, using validated algorithms and software to implement the algorithms.
Mechanisms exist to perform de-identification of sensitive/regulated data, using validated algorithms and software to implement the algorithms.