You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To make the synthetic data, differential privacy, and de-identification chapters more concrete, it would be nice to add code examples to make things more concrete. I already have some examples for de-identification, for the synthetic data and differential privacy I'd have to ask one of the engineers for examples (we can also refer elsewhere for examples instead of embedding it in the handbook itself)
Action required
Discuss if this is a good idea
Experiment with how this looks in the Handbook for the deidentification code I already have
Check with research engineer colleagues for other examples
Implement in the DPH
Who can help?
UB and ITS colleagues, perhaps colleagues in the faculties if they have nice tips.
Code of Conduct
I agree to follow this project's Code of Conduct
The text was updated successfully, but these errors were encountered:
Description
To make the synthetic data, differential privacy, and de-identification chapters more concrete, it would be nice to add code examples to make things more concrete. I already have some examples for de-identification, for the synthetic data and differential privacy I'd have to ask one of the engineers for examples (we can also refer elsewhere for examples instead of embedding it in the handbook itself)
Action required
Who can help?
UB and ITS colleagues, perhaps colleagues in the faculties if they have nice tips.
Code of Conduct
The text was updated successfully, but these errors were encountered: