Data anonymization - from whatis.com
Data anonymization is the use of one or more techniques designed to make it impossible -- or at least more difficult -- to identify a particular individual from stored data related to them.
The purpose of data anonymization is to protect the privacy of the individual and to make it legal for governments and businesses to share their data without getting permission. Data anonymization methods include encryption, hashing, generalization, pseudonymization and perturbation.
De-anonymization is a reverse engineering process used to detect the source data. The most common method of de-anonymization is cross-referencing data from multiple sources, some of which are typically in the public record and contain the personally identifying information (PII) that is being sought.
Good Netiquette to all!
===================================================Have you ever wondered how it would be if your email suddenly came to life? You are about to find out.
Have you ever wondered what a conference call looks like in real life? See the link below
**Important note** - contact our sister company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:
If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications.
Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.