
GB/T 37964-2019
信息安全技术个人信息去标识化指南
Information security technology— Guide for de-identifying personal information
2019・08・30发布
2020・03・01实施
目 次
前言.......................................1
引言.......................................1
1范围......................................1
2规范性引用文件 ................................1
3术语和定义...................................1
4 概述.....................................3
4.1去标识化目标....................................
4.2去标识化原则..................................3
4.3重标识风险...................................3
4.4去标识化影响..................................4
4.5不同公开共享类型对去标识化的影响........................4
5去标识化过程.....................................4
5.1概述......................................4
5.2确定目标....................................5
5.3识别标识....................................5
5.4处理标识....................................6
5.5验证审批....................................7
5.6监控审査....................................8
6角色职责与人员管理..................................9
6.1角色职责....................................9
6.2 人员管理...................................9
附录A (资料性附录)常用去标识化技术........................10
附录B (资料性附录)常用去标识化模型 .......................17
附录C (资料性附录)去标识化模型和技术的选择....................24
附录D (资料性附录)去标识化面临的挑战.......................29
参考文献.......................................31