Chapter 6: Anonymizing and Pseudonymizing Your Data in Power BI
It happens very often to those who develop a specific software product for a client to want to repackage it and sell it to another client who is interested in similar features. However, if you want to show a few screenshots of the software in a demo to the new client, you should avoid showing any data that might be sensitive. Getting in there and trying to mask the data from a copy of the original software database by hand was definitely one of the tasks the poor hapless developer found themselves having to do in the past, maybe even a few days before the demo.
The scenario described does not require data to be shared with a third-party recipient but aims to successfully demo a product to the customer by displaying simulated data. Therefore, there is no concern about a possible brute force attack by professional analysts with the goal of deriving the original data prior to the de-identification operation.
Things...