Gnsoft offers the entire system, from planning to developing and deploying information systems
that your environment needs most
Through preliminary review, we determine whether the data constitutes personal information. We then de-identify the data to ensure that individuals cannot be recognized. The de-identified information is evaluated to determine if it can be re-identified when combined with other information. If deemed appropriate, it is considered de-identified information. Finally, necessary measures are taken to prevent re-identification during the use of de-identified information, ensuring post-management.
De-identification Process:
Step 1: Preliminary Review
Step 2: De-identification
Step 3: Appropriateness Assessment
Step 4: Post-management
Personal Information (Identifiable Information), De-identification Measures (Removal of Personal Identifiers), Qualitative Evaluation of De-identification (k-anonymity, l-diversity, t-closeness), De-identified Information, Appropriate, Inappropriate Information that can identify a specific individual by itself (including information that can easily identify a specific individual when combined with other information) Presumed not to be personal information (however, essential management measures to prevent re-identification by combining with other information must be implemented)