data sanitization

data sanitization

Making data less sensitive for testing purposes. Real company data can be sanitized in many ways: by blanking out parts of a field, by inserting X's in all but the last four digits of credit card numbers, by replacing real names with random names and by shuffling data between the columns. For example, the values in a numeric field can be shuffled and still be summed to the same total.
References in periodicals archive ?
For many levels of data destruction, specialized equipment is required and no matter how good a company's IT department may be they cannot always guarantee absolute data sanitization.
New Data Security Network Launches to Champion and Promote Data Sanitization Best Practices.
We have brought in new technologies like TERASCI for device testing and data sanitization.
A significant consideration in the implementation of such systems is the concern over securing them against threats, which can be addressed by malware detection and data sanitization solutions.
In addition, as a precautionary measure, it is a good idea to apply data sanitization to remove any active code from email attachments by changing the file format.
Tenders are invited for Data Sanitization of Media Technology
The volume covers all aspects of Java programming including input validation and data sanitization, declaration, expressions, object orientation, error behavior, threads, platform security, and the runtime environment.
Refurbishing a used product typically includes testing, data sanitization, cosmetic restoration and repackaging, and extended warranty periods have removed virtually all risks associated with buying used equipment.
Data sanitization and destruction methods available for review and be familiar with all those processes;
Many organizations outsource data sanitization and drive disposal to an external service provider.
Micro's world-class capabilities, such as auditing, testing, onsite data sanitization and environmentally-responsible disposal.
After that, companies must ensure that adequate means of protecting that data have been implemented, such as access being restricted to authorized personnel, proper authentication being used and proper procedures for backing up and archiving data and data sanitization policies being implemented to remove data when it is no longer needed or requested by customers.