restrictions on access. These can then be contrasted with choices about data anonymisation to present a linear representation of data access options. This presentation...
21 KB (2,243 words) - 20:48, 22 July 2024
as personal data, personally identifiable information, anonymisation and pseudo-anonymisation which lack sufficient and detailed enough meanings when...
15 KB (1,646 words) - 18:05, 19 August 2024
information can be shared; VoIP calls; Video calls (since version 0.6.0); Tor and I2P networks support, for further anonymisation (since version 0.6.0). The core...
13 KB (1,256 words) - 13:36, 30 August 2024
by default. A year earlier, in 2012, Shuttleworth had defended the anonymisation method used. He later reversed the decision, and no current Ubuntu version...
22 KB (2,002 words) - 16:34, 25 September 2024
experiences in between.: 177 He also wanted to map the progressive anonymisation of the contemporaries (mitwelt), which was a measurement of increasing...
29 KB (3,423 words) - 13:06, 10 January 2025
information (as an alternative to the other option of complete data anonymisation). An example is encryption, which renders the original data unintelligible...
125 KB (12,939 words) - 07:29, 12 January 2025
03868 [cs.CR]. "Privacy-enhancing technologies (PETs)" (PDF). Draft anonymisation, pseudonymisation and privacy-enhancing technologies guidance. Information...
45 KB (4,306 words) - 09:40, 20 January 2025
Broersma, Matthew (26 August 2015). "IBM Tells Companies To Block Tor Anonymisation Network". TechWeekEurope UK. Archived from the original on 10 September...
169 KB (14,077 words) - 02:37, 21 January 2025
by end users on online search engines of the gatekeeper, subject to anonymisation for the query, click and view data that constitutes personal data; This...
124 KB (12,220 words) - 07:12, 20 January 2025