Re-Id
Re-identification
Data linkage and correlation techniques on seemingly anonymized datasets that allow the identification of individuals, violating privacy guarantees.
Katharina Bendig, René Schuster, Nicole Thiemer, Karen Joisten, Didier Stricker
Mitigation Strategy
Rigorous implementation of k-anonymity and l-diversity, application of Differential Privacy, advanced obfuscation techniques, and limits on dataset sharing.
Atomic Number
33
Ri
Risk ID
as-33
Severity
7/10
Severity Level