The Easiest Way To Protect Personal Information: Applying The Privacy Commissioner’s De-identification Guidelines for Structured Data in 10 Easy Steps
1. Start with the right question
Ask: Could someone still figure out who this person is?
If the answer might be yes, the data is probably still personal information.
2. Know the difference
Pseudonymized data: names and direct identifiers removed, but people may still be identifiable.
De-identified data: both direct and indirect identifiers have been transformed enough that re-identification risk is very low.


3. Watch for indirect identifiers
Even without names, people can often be identified by combinations such as:
- full or partial postal code
- exact date of birth
- rare job title
- location
- dates of service
- gender
- diagnosis or event type
- unique transaction details
The guideline stresses that most known re-identification attacks rely on these indirect identifiers.
4. Use this simple 5-step process

5. Public sharing is much riskier
If you post data publicly, or publish it openly, you should assume an attack is certain. That means you must rely mainly on stronger data transformation, not promises or policies.
6. Internal sharing is still sharing
If data moves to another department, affiliate, consultant, or vendor, that still needs controls. The guideline emphasizes privacy, security, and contractual safeguards for non-public sharing.
7. Small-cell reporting is a danger zone
The guideline gives practical threshold examples tied to privacy sensitivity:
- low privacy invasion: risk threshold 0.09, roughly equivalent to groups of at least 11
- medium: 0.075, roughly 15
- high: 0.05, roughly 20
For a small business, a simple takeaway is:
Do not publish or share reports where tiny groups can reveal individuals.


8. Keep the data useful
There is always a privacy-versus-utility tradeoff. If you transform too little, privacy risk stays high. If you transform too much, the data may become useless. The goal is an acceptable balance.
9. Document what you did
Keep a short record of:
- when it should be reviewed again
- why you de-identified the data
- what fields you changed
- what method you used
- what threshold you applied
- who received the data
- what controls were required
10. Review it again later
The guideline says de-identification decisions are not forever. Risk assessments should usually be reviewed every two to three years, and sooner if something material changes.
Bottom line
- The Removing names is not enough.
- Think in combinations.
- Treat public release as high risk.
- Use contracts and controls for private sharing.
- Document your method.
- Review it over time.

With thanks to the Office of the Information and Privacy Commissioner of Ontario for their excellent Deidentification Guidelines for Structured Data.
