e
q
u
e
s
t
a
d
e
m
o < back
De-identification vs. Data Masking
{TOC}
Security
External Threat
TEXT
Internal Threat
TEXT
Sensitive Data Definition
TEXT
De-identification in the Context of Security
TEXT
18 elements of Data Masking per HIPAA
TEXT