SI-19.7 ยท Validated Algorithms and Software

Control Description

Perform de-identification using validated algorithms and software that is validated to implement the algorithms.

Impact Baselines
Security baselines where this control applies
Not in any baseline
Control Properties
SP800-53-enhancement
organization
Enhancement
Control Statement
The control requirements

Perform de-identification using validated algorithms and software that is validated to implement the algorithms.

Supplemental Guidance

Algorithms that appear to remove personally identifiable information from a dataset may in fact leave information that is personally identifiable or data that is re-identifiable. Software that is claimed to implement a validated algorithm may contain bugs or implement a different algorithm. Software may de-identify one type of data, such as integers, but not de-identify another type of data, such as floating point numbers. For these reasons, de-identification is performed using algorithms and software that are validated.