Best practices when using Protegrity Anonymization
Suggestions for using Protegrity Anonymization efficiently.
Suggestions for using Protegrity Anonymization efficiently.
This section describes how the risk metrics are derived. It details the descriptions and the equations used to calculate the risk.
Was this page helpful?