A blog written by Professors Michael D. Smith and Jim Waldo to give readers an overview of different kinds of anonymization and de-identification strategies by looking at three different regulations.