Mechanisms exist to perform de-identification of sensitive/regulated data, using validated algorithms and software to implement the algorithms.
Does the organization perform de-identification of sensitive/regulated data, using validated algorithms and software to implement the algorithms?