Redigeer
Verwyder PII heeltemal uit die dokument en vervang dit met 'n plaasvervanger soos [REDACTED].
Kontak John Smith by john.smith@company.com
Kontak [REDACTED] by [REDACTED]
Masker
Verduister PII gedeeltelik terwyl sommige karakters sigbaar bly vir verwysing.
Kontak John Smith by john.smith@company.com
Kontak J*** S**** by j***.s****@c******.com
Vervang
Vervang opgespoorde PII met realistiese vals data wat dokumentleesbaarheid behou.
Kontak John Smith by john.smith@company.com
Kontak Jane Doe by jane.doe@example.com
Hash (SHA-256)
Eenrigting kriptografiese hash wat konsekwente pseudonimisasie oor dokumente moontlik maak.
Kontak John Smith by john.smith@company.com
Kontak a1b2c3d4 by e5f6g7h8
Enkripteer (AES-256-GCM)
Omkeerbare enkripsie wat gemagtigde gebruikers toelaat om oorspronklike data met die korrekte sleutel te herstel.
Kontak John Smith by john.smith@company.com
Kontak [ENC:xyz123] by [ENC:abc456]
pages.anonymizationMethods.methods.encryptAsym.name
pages.anonymizationMethods.methods.encryptAsym.description
pages.anonymizationMethods.methods.encryptAsym.exampleBefore
pages.anonymizationMethods.methods.encryptAsym.exampleAfter
Metode Vergelyking
| Metode | Omkeerbaar | Leesbaar | Koppelbaar | Beste Vir |
|---|---|---|---|---|
| Redigeer | Nee | Gedeeltelik | Nee | Regsdokumente, Openbare Rekords |
| Masker | Gedeeltelik | Gedeeltelik | Nee | Ondersteuning, UI Vertoon |
| Vervang | Nee | Ja | Nee | Toetsing, Demos |
| Hash (SHA-256) | Nee | Nee | Ja | Navorsing, Analise |
| Enkripteer (AES-256-GCM) | Ja | Nee | Nee | Tydelik, Oudit |
| pages.anonymizationMethods.methods.encryptAsym.name | pages.anonymizationMethods.comparison.rows.encryptAsym.reversible | pages.anonymizationMethods.comparison.rows.encryptAsym.readable | pages.anonymizationMethods.comparison.rows.encryptAsym.linkable | pages.anonymizationMethods.comparison.rows.encryptAsym.bestFor |
Is This Right For You?
Best For
- ✦Teams choosing between 7 anonymization operators (replace, mask, hash, encrypt, redact, fake, custom) per entity type
- ✦GDPR pseudonymization vs true anonymization compliance decisions with reversible encryption for audit trails
- ✦Mixed-operator workflows where different entity types require different anonymization strategies
- ✦Comparison-driven decision making with reversibility, readability, and linkability trade-offs
Not For
- ✦Teams preferring a single "black box" redaction without operator selection or configuration
- ✦Use cases requiring original PII tokens to survive exactly unchanged (encryption wraps tokens with metadata)