My Photo

Your email address:

Powered by FeedBlitz

April 2018

Sun Mon Tue Wed Thu Fri Sat
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30          
Blog powered by Typepad

Become a Fan

« Damsels in Distress: Stalking Stalkers through London Alleys | Main | Surviving the 2006 France Ironman and How Intelligent are Chimpanzees? »

June 29, 2006


Feed You can follow this conversation by subscribing to the comment feed for this post.

Vincent McBurney

An interesting transcript. I have a couple question on the anonymization you have helped agencies implement.

Are they anonymizing entire records or do they just do the key fields (the sensitive identity fields) and leave other fields unencrypted (such as measures and demographics fields).

If one agency can anonymize data, another agency can perform the same, the two sets of data can match up on the hash key fields, how come they cannot un-anonymize each others key fields? For example, I convert "John Smith" into "*43kfjl$234", does that mean when I see "*43kfjl$234" appear in the data from the other agency that I can work out it is "John Smith"?

The comments to this entry are closed.