Easy-to-use GDPR guide for Data Scientist. Part 2/2

Table of Contents

De-identification vs Anonymization

Removing

Masking or suppression

Generalization

K-anonymization

Scrambling

Blurring

Pseudonymization

Tokenization

Hashing

Encryption

Key deletion or crypto-shredding

Sources

--

--

--

Python Developer and Artificial Intelligence Engineer

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

ICOSpeaks AMA With IoTeX Recap.

How to Protect Your Online Privacy Now That Congress Sold You Out

TryHackMe —Subdomain Enumeration Walktrough

🕵🏽♂Price Prediction for ISIKC🕵🏻♀

The Ninja Sensei’s Logbook: Who’s the Weakest Link in Cybersecurity?

Who is the weakest link in cybersecurity?

Multiplier DeFi Q3 Roadmap

PayStory: Closer and Intimate With 3D Secure

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ruslan Korniichuk

Ruslan Korniichuk

Python Developer and Artificial Intelligence Engineer

More from Medium

IBM Data Virtualization Installation

Exploring Amazon Athena

Setup file storage for Azure ML using Python

Data Engineering Project — Retail Store Part 3 — Data Warehousing