Mechanisms exist to mask sensitive information through data anonymization, pseudonymization, redaction or de-identification.
Does the organization mask sensitive information through data anonymization, pseudonymization, redaction or de-identification?