In terms of specific frameworks, as I said earlier, we did work with experts from across the country as well as even outside the country to look at the best strategies and techniques for strong de-identification.
There are a number of different strategies to approach de-identification. We employed more than one and took a bit of a belt-and-suspenders approach, but is there an actual standard of taking these 25 steps and you will have de-identified data? That doesn't exist. It is contextual, and it's more complex than that.
We have worked with all the leading experts on how to develop frameworks that are as robust as possible.