Rec. ITU-T X.1148 (09/2020) Framework of de-identification process for telecommunication service providers
Summary
History
FOREWORD
Table of Contents
Introduction
1 Scope
2 References
3 Terms and definitions
     3.1 Terms defined elsewhere
     3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of de-identification process
     6.1 Data lifecycle model and de-identification phase
          6.1.1 Data collection phase
          6.1.2 Data management phase
          6.1.3 Data use phase
          6.1.4 Data release phase
          6.1.5 Data destruction phase
     6.2 De-identification considerations
          6.2.1 Data collection
          6.2.2 Data management
               6.2.2.1 Data transformation
               6.2.2.2 Data retention
          6.2.3 Data use
7 De-identification process framework
     7.1 Step 1 – Preliminary review
     7.2 Step 2 – Applying de-identification
          7.2.1 De-identification for identifiers
          7.2.2 De-identification for quasi-identifier and high-identifiability attributes
          7.2.3 De-identification techniques
     7.3 Step 3 – Adequacy assessment for de-identification process
     7.4 Step 4 – Follow-up management
          7.4.1 Protection measures for de-identified data
          7.4.2 Monitoring possibilities of re-identification
          7.4.3 Requirements for contract to third party
          7.4.4 Countermeasures to re-identification
8 De-identified data utility
     8.1 De-identified data stages
          8.1.1 Original data stage
          8.1.2 Pseudonymized data stage
          8.1.3 Unlinked pseudonymized data stage
          8.1.4 Aggregated data stage
          8.1.5 De-identified data stage
     8.2 Data release models
          8.2.1 Public data release model
          8.2.2 Semi-public data release model
          8.2.3 Non-public data release model
          8.2.4 Comparison of data release models
     8.3 Relation between data release model and data stage
          8.3.1 Non-public data release model
          8.3.2 Semi-public data release model
          8.3.3 Public data release model
Annex A   Adequacy assessment procedures
     A.1 Preparing basic documents
     A.2 Organizing an assessment panel
     A.3 Conducting assessment
     A.4 Additional de-identification measures
     A.5 Data utilization
Annex B   Unstructured de-identification approaches
Appendix I   Examples of typical de-identification techniques
     I.1 Statistical tools for de-identification techniques
     I.2 Cryptographic tools for de-identification techniques
     I.3 Suppression techniques
     I.4 Pseudonymization techniques
     I.5 Generalization techniques
     I.6 Randomization techniques
     I.7 Synthetic data
Appendix II   De-identification process approaches
     II.1 Data-centric de-identification approach
          II.1.1 Utility-first de-identification approach
          II.1.2 Privacy-first de-identification approach
     II.2 Role-centric de-identification approach
          II.2.1 Centralized de-identification
          II.2.2 Local de-identification
          II.2.3 Collaborative de-identification
Bibliography