This book, written by two leading experts in de-identification, explains how to adhere to regulations in a defensible way to protect sensitive patient data. Numerous case studies are included from settings that range from typical clinical treatment to disease registries.[...]