Summary - X.1771 (04/2024) - Security guidelines for combining de-identified data using trusted third partyDe-identification is a process to remove the association between a set of identifiable attributes and the data principal. Appropriate de-identification techniques should be used by an organization to balance between its desires to protect data as the data controller and to use the data in new and innovative ways. |