Easy-to-use GDPR guide for Data Scientist. Part 2/2

Table of Contents

De-identification vs Anonymization

Removing

Masking or suppression

Generalization

K-anonymization

Scrambling

Blurring

Pseudonymization

Tokenization

Hashing

Encryption

Key deletion or crypto-shredding

Sources

--

--

--

Python Developer and Artificial Intelligence Engineer

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Top 5 Tips To Secure Project Data

Top 5 Tips To Secure Project Data

5 Ways to Lock your “Virtual Doors”

Trias AMA with CEO Recap

Biometric Authentication: Bye-Bye Passwords?

Genesis Post

Get ready! #DeFi + #NFT top project

HackTheBox: Passage Write-Up

CISO360: The Return

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ruslan Korniichuk

Ruslan Korniichuk

Python Developer and Artificial Intelligence Engineer

More from Medium

Simplifying Dagster Codebases with Dagstd

Low code extracting listserv archives to tabular data using Webscraper.io

How to consume Kinesis-Video-Stream with python and getting metadata from Kinesis.

Finding the n’th Aggregate Value from Every Group in AWS Athena/Presto