Sensitive information can be protected from misuse through Encryption, Pseudonymization and Anonymization controls, converting plain text to an unusable format.
Only authorized users with the proper key/source should be able to see sensitive data (or in the case of Anonymization, not at all). Each of these methods work differently, as summarized below.
