SlideShare a Scribd company logo
1 of 11
Data Privacy Through
Data Masking
Table of Contents
•Introduction
•Why data masking is important?
•Nullification
•Substitution
•Encryption
•Conclusion
Introduction
•Data protection is a critical component
of the analytics business and it is
sometimes a requirement for
companies in certain countries where
information laws are very strict.
•Data Protection Act 1998 (UK)
•EC directive 94/95(EU)
•HIPEA (US).
Why data masking is
important?
•To ensure that sensitive information are not leaked
and used by unauthorized parties in possibly illegal
activities, it is essential that protection in the form of
data masking be applied to all data.
•Data masking makes it more difficult for
unauthorized parties who might have accessed the
data illegally to obtain critical information.
•Data masking also allow companies which require
analytics services to be sure that their data will not
be used by the service providers for other
purposes.
Nullification
•Nullification is the process of neutralizing
certain sections of the data by way of
substituting the information with a single null
value.
•Usually the null value used is X or an empty
space, but there are other choices.
•Below is a snapshot of a code that does
nullification.
Nullification
/**********************************************************************************
NULLIFICATION CODE EXAMPLE
***********************************************************************************/
DATA CREDIT_CARD;
SET CREDIT_CARD;
NEW_CARD_NO = CARD_NO;
DO I = 1 TO 12;
SUBSTR(NEW_CARD_NO,I,1) = 'X';
END;
DROP I;
PUT CARD_NO = NEW_CARD_NO =;
RUN;
CARD_NO=4211569111000001 NEW_CARD_NO=XXXXXXXXXXXX0001
CARD_NO=4211569111000002 NEW_CARD_NO=XXXXXXXXXXXX0002
CARD_NO=4211569111000003 NEW_CARD_NO=XXXXXXXXXXXX0003
CARD_NO=4211569111000004 NEW_CARD_NO=XXXXXXXXXXXX0004
CARD_NO=4211569111000005 NEW_CARD_NO=XXXXXXXXXXXX0005
CARD_NO=4211569111000006 NEW_CARD_NO=XXXXXXXXXXXX0006
Substitution
•Substitution is the process of replacing a
section of the information with pseudo
information.
•Usually a fixed length of the information will
be replaced a randomly generated number;
this number is fixed throughout for all the
values.
•Below is a code showing how this is done.
Substitution
/**********************************************************************************
SUBSTITUTION CODE EXAMPLE
***********************************************************************************/
DATA CREDIT_CARD;
SET CREDIT_CARD;
NEW_CARD_NO = CARD_NO;
SUBSTR(NEW_CARD_NO,1,8) = '12345678';
PUT CARD_NO = NEW_CARD_NO =;
RUN;
CARD_NO=4211569111000001 NEW_CARD_NO=1234567811000001
CARD_NO=4211569111000002 NEW_CARD_NO=1234567811000002
CARD_NO=4211569111000003 NEW_CARD_NO=1234567811000003
CARD_NO=4211569111000004 NEW_CARD_NO=1234567811000004
CARD_NO=4211569111000005 NEW_CARD_NO=1234567811000005
CARD_NO=4211569111000006 NEW_CARD_NO=1234567811000006
Encryption
•Encryption is the process of masking
the information via an algorithm that
renders it impossible to retrieve the
original information without the key.
•The original information is usually
transformed by a bit operation with a
key.
•Below is a snapshot of the code.
Encryption
/**********************************************************************************
ENCRYPTION CODE EXAMPLE
***********************************************************************************/
DATA CREDIT_CARD;
SET CREDIT_CARD;
NEW_CARD_NO =
COMPRESS(SUBSTR(CARD_NO,1,8)||BXOR(INPUT(SUBSTR(CARD_NO,9,8),8.),'123456
78'));
PUT CARD_NO = NEW_CARD_NO =;
RUN;
CARD_NO=4211569111000001 NEW_CARD_NO=421156911816975
CARD_NO=4211569111000002 NEW_CARD_NO=421156911816972
CARD_NO=4211569111000003 NEW_CARD_NO=421156911816973
CARD_NO=4211569111000004 NEW_CARD_NO=421156911816970
CARD_NO=4211569111000005 NEW_CARD_NO=421156911816971
CARD_NO=4211569111000006 NEW_CARD_NO=421156911816968
Conclusion
•Data masking is a simple and yet
crucial process in data warehousing
and analytics.
•SAS provides many different options
for users who wish to mask their data.

More Related Content

What's hot

Data Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudData Center Migration to the AWS Cloud
Data Center Migration to the AWS Cloud
Tom Laszewski
 
What is a Data Warehouse and How Do I Test It?
What is a Data Warehouse and How Do I Test It?What is a Data Warehouse and How Do I Test It?
What is a Data Warehouse and How Do I Test It?
RTTS
 
warner-DP-203-slides.pptx
warner-DP-203-slides.pptxwarner-DP-203-slides.pptx
warner-DP-203-slides.pptx
HibaB2
 
Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012
Bluewolf
 
Database Consolidation using the Oracle Multitenant Architecture
Database Consolidation using the Oracle Multitenant ArchitectureDatabase Consolidation using the Oracle Multitenant Architecture
Database Consolidation using the Oracle Multitenant Architecture
Pini Dibask
 

What's hot (20)

Point of View -Converged Infrastructure
Point of View -Converged InfrastructurePoint of View -Converged Infrastructure
Point of View -Converged Infrastructure
 
Client presentation disaster recovery as a service
Client presentation   disaster recovery as a serviceClient presentation   disaster recovery as a service
Client presentation disaster recovery as a service
 
Data Center Migration to the AWS Cloud
Data Center Migration to the AWS CloudData Center Migration to the AWS Cloud
Data Center Migration to the AWS Cloud
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
An overview of snowflake
An overview of snowflakeAn overview of snowflake
An overview of snowflake
 
What is a Data Warehouse and How Do I Test It?
What is a Data Warehouse and How Do I Test It?What is a Data Warehouse and How Do I Test It?
What is a Data Warehouse and How Do I Test It?
 
Data Lakehouse, Data Mesh, and Data Fabric (r1)
Data Lakehouse, Data Mesh, and Data Fabric (r1)Data Lakehouse, Data Mesh, and Data Fabric (r1)
Data Lakehouse, Data Mesh, and Data Fabric (r1)
 
warner-DP-203-slides.pptx
warner-DP-203-slides.pptxwarner-DP-203-slides.pptx
warner-DP-203-slides.pptx
 
Introducing Change Data Capture with Debezium
Introducing Change Data Capture with DebeziumIntroducing Change Data Capture with Debezium
Introducing Change Data Capture with Debezium
 
Azure Data Factory ETL Patterns in the Cloud
Azure Data Factory ETL Patterns in the CloudAzure Data Factory ETL Patterns in the Cloud
Azure Data Factory ETL Patterns in the Cloud
 
Oracle Data Guard
Oracle Data GuardOracle Data Guard
Oracle Data Guard
 
Zero to Snowflake Presentation
Zero to Snowflake Presentation Zero to Snowflake Presentation
Zero to Snowflake Presentation
 
Cloud Security Strategy
Cloud Security StrategyCloud Security Strategy
Cloud Security Strategy
 
Data Warehousing in the Cloud: Practical Migration Strategies
Data Warehousing in the Cloud: Practical Migration Strategies Data Warehousing in the Cloud: Practical Migration Strategies
Data Warehousing in the Cloud: Practical Migration Strategies
 
Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012Cloud Governance Presentation Dreamforce 2012
Cloud Governance Presentation Dreamforce 2012
 
Virtualization in cloud
Virtualization in cloudVirtualization in cloud
Virtualization in cloud
 
Big Data: Architecture and Performance Considerations in Logical Data Lakes
Big Data: Architecture and Performance Considerations in Logical Data LakesBig Data: Architecture and Performance Considerations in Logical Data Lakes
Big Data: Architecture and Performance Considerations in Logical Data Lakes
 
Snowflake Architecture.pptx
Snowflake Architecture.pptxSnowflake Architecture.pptx
Snowflake Architecture.pptx
 
Database Consolidation using the Oracle Multitenant Architecture
Database Consolidation using the Oracle Multitenant ArchitectureDatabase Consolidation using the Oracle Multitenant Architecture
Database Consolidation using the Oracle Multitenant Architecture
 
Object Storage Overview
Object Storage OverviewObject Storage Overview
Object Storage Overview
 

Viewers also liked

DB16-Program-FINAL-small
DB16-Program-FINAL-smallDB16-Program-FINAL-small
DB16-Program-FINAL-small
Latasia Brown
 
Curtis Martin Resume Oct 2015 Controller
Curtis Martin Resume Oct 2015 ControllerCurtis Martin Resume Oct 2015 Controller
Curtis Martin Resume Oct 2015 Controller
Curtis Martin
 
Kleeneze 2010 ewb 48
Kleeneze 2010 ewb 48Kleeneze 2010 ewb 48
Kleeneze 2010 ewb 44
Kleeneze 2010 ewb 44Kleeneze 2010 ewb 44
Shared Value in the Pharmaceutical Industry
Shared Value in the Pharmaceutical IndustryShared Value in the Pharmaceutical Industry
Shared Value in the Pharmaceutical Industry
Robert Au
 

Viewers also liked (19)

Data masking a developer's guide
Data masking a developer's guideData masking a developer's guide
Data masking a developer's guide
 
DMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking OverviewDMsuite Static & Dynamic Data Masking Overview
DMsuite Static & Dynamic Data Masking Overview
 
DB16-Program-FINAL-small
DB16-Program-FINAL-smallDB16-Program-FINAL-small
DB16-Program-FINAL-small
 
Curtis Martin Resume Oct 2015 Controller
Curtis Martin Resume Oct 2015 ControllerCurtis Martin Resume Oct 2015 Controller
Curtis Martin Resume Oct 2015 Controller
 
Kleeneze 2010 ewb 35
Kleeneze 2010 ewb 35Kleeneze 2010 ewb 35
Kleeneze 2010 ewb 35
 
Kleeneze 2010 ewb 48
Kleeneze 2010 ewb 48Kleeneze 2010 ewb 48
Kleeneze 2010 ewb 48
 
Kleeneze 2010 ewb 44
Kleeneze 2010 ewb 44Kleeneze 2010 ewb 44
Kleeneze 2010 ewb 44
 
Kleeneze 2010 ewb 25
Kleeneze 2010 ewb 25Kleeneze 2010 ewb 25
Kleeneze 2010 ewb 25
 
Cross channel? No-line Handel und wie der Kunde ein optimales Einkaufserlebni...
Cross channel? No-line Handel und wie der Kunde ein optimales Einkaufserlebni...Cross channel? No-line Handel und wie der Kunde ein optimales Einkaufserlebni...
Cross channel? No-line Handel und wie der Kunde ein optimales Einkaufserlebni...
 
Michael Jay Freer - Information Obfuscation
Michael Jay Freer - Information ObfuscationMichael Jay Freer - Information Obfuscation
Michael Jay Freer - Information Obfuscation
 
Shared Value in the Pharmaceutical Industry
Shared Value in the Pharmaceutical IndustryShared Value in the Pharmaceutical Industry
Shared Value in the Pharmaceutical Industry
 
Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control	Protect your Database with Data Masking & Enforced Version Control
Protect your Database with Data Masking & Enforced Version Control
 
Business Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and ComplianceBusiness Redefined – Managing Information Explosion, Data Quality and Compliance
Business Redefined – Managing Information Explosion, Data Quality and Compliance
 
Row-level security and Dynamic Data Masking
Row-level security and Dynamic Data MaskingRow-level security and Dynamic Data Masking
Row-level security and Dynamic Data Masking
 
Resume 2016
Resume 2016Resume 2016
Resume 2016
 
Accelerating Devops via Data Virtualization | Delphix
Accelerating Devops via Data Virtualization | DelphixAccelerating Devops via Data Virtualization | Delphix
Accelerating Devops via Data Virtualization | Delphix
 
Informatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar SlidesInformatica Cloud Summer 2016 Release Webinar Slides
Informatica Cloud Summer 2016 Release Webinar Slides
 
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
Test Data Management 101—Featuring a Tour of CA Test Data Manager (Formerly G...
 
Test data management a case study Presented at SiGIST
Test data management a case study Presented at SiGISTTest data management a case study Presented at SiGIST
Test data management a case study Presented at SiGIST
 

More from Murphy Choy (8)

Right time Vs real time
Right time Vs real timeRight time Vs real time
Right time Vs real time
 
Applications of the DOW loop
Applications of the DOW loop Applications of the DOW loop
Applications of the DOW loop
 
Building a decision tree from decision stumps
Building a decision tree from decision stumpsBuilding a decision tree from decision stumps
Building a decision tree from decision stumps
 
Data masking with classical ciphers
Data masking with classical ciphersData masking with classical ciphers
Data masking with classical ciphers
 
A simple introduction to candlestick charts in sas
A simple introduction to candlestick charts in sasA simple introduction to candlestick charts in sas
A simple introduction to candlestick charts in sas
 
General Insurance Conference 2014: Big Data for Insurance Companies
General Insurance Conference 2014: Big Data for Insurance CompaniesGeneral Insurance Conference 2014: Big Data for Insurance Companies
General Insurance Conference 2014: Big Data for Insurance Companies
 
Edison chen and Cammie Tse Scandal: A twitter study
Edison chen and Cammie Tse Scandal: A twitter studyEdison chen and Cammie Tse Scandal: A twitter study
Edison chen and Cammie Tse Scandal: A twitter study
 
Real Time Process Compliance using Nomenclature Approach
Real Time Process Compliance using Nomenclature ApproachReal Time Process Compliance using Nomenclature Approach
Real Time Process Compliance using Nomenclature Approach
 

Recently uploaded

怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
vexqp
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
chadhar227
 
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Bertram Ludäscher
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
gajnagarg
 
Computer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfComputer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdf
SayantanBiswas37
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
nirzagarg
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
gajnagarg
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
gajnagarg
 
Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...
Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...
Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...
HyderabadDolls
 

Recently uploaded (20)

Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...Fun all Day Call Girls in Jaipur   9332606886  High Profile Call Girls You Ca...
Fun all Day Call Girls in Jaipur 9332606886 High Profile Call Girls You Ca...
 
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf
 
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...Reconciling Conflicting Data Curation Actions:  Transparency Through Argument...
Reconciling Conflicting Data Curation Actions: Transparency Through Argument...
 
Dubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls DubaiDubai Call Girls Peeing O525547819 Call Girls Dubai
Dubai Call Girls Peeing O525547819 Call Girls Dubai
 
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Latur [ 7014168258 ] Call Me For Genuine Models We ...
 
Computer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfComputer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdf
 
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangePredicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Tumkur [ 7014168258 ] Call Me For Genuine Models We...
 
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
Top profile Call Girls In dimapur [ 7014168258 ] Call Me For Genuine Models W...
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...
Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...
Sealdah % High Class Call Girls Kolkata - 450+ Call Girl Cash Payment 8005736...
 

Data masking in sas

Editor's Notes

  1. In today’s presentation, we will go through several aspects of data privacy as well as the purpose of data masking. We will discuss the various techniques of data masking as well as how they can be implemented in SAS.
  2. Ever since the beginning of analytics, the industry has been plagued by data issues ranging from poor data quality to privacy issues. Since privacy is highly valued, several countries have implemented data protection measures to protect data collected. Several acts have been passed to enforce these measures. Such protection is critical to protecting the consumer rights. However, they can be quite nasty to companies who rely on consumer data. To overcome this, it is important to have methods to mask the sensitive information.
  3. Why is data masking important? Protecting your clients Makes outsourcing safer Illegal access to sensitive data will not compromise the privacy of the clients Adhering to the data protection acts of the various countries There are many methods to do data masking Nullification, Substitution and Encryption are some of the most common methods