Summary
In this chapter, you learned the main differences between anonymization and pseudonymization. You also learned which techniques are most commonly used to apply each de-identification process.You also applied the anonymization process through tokenization and the pseudonymization process by creating similar pseudonyms in Power BI using both Python and R.In the next chapter, you will learn how to log data derived from operations performed with Power Query in Power BI to external repositories.