Contact:
    
    Peter-Paul de Wolf 
    Statistics Netherlands 
    P.O. Box 24500 
    2490 HA The Hague 
    The Netherlands 
    Phone: +31 70 337 5060 
     
     
     
Last update: 10 Oct 2011
    
   | 
  Handbook on Statistical Disclosure Control
 One of the major results of the Cenex-project was the start of a handbook on Statistical Disclosure Control.
 Much effort has been put in the production of this version of the handbook. We hope that you will find it useful,
 but on the other hand we realise that it is not yet the final version.  
 In the ESSnet project we continued to work on this handbook and produced a more final version. 
 You can download a copy of the handbook 
  here
  
This is the final ESSnet version of the handbook.
In addition to the handbook and in order to illustrate the methods described we have also started a section of case studies. 
 
 As we are in the process of extending and improving the handbook we will appreciate to receive your comments.
 
     
 
 Contents of the handbook
  - 1	Introduction
 
  
   - 1.1	Preface	
 
   - 1.2	Introduction	
 
   - 1.3	Concepts and Definitions	
 
   - 1.4	An approach to Statistical Disclosure Control
 
   - 1.5	The chapters of the handbook	
 
   - 1.6	References	
 
   
  - 2	Regulations, a general Background	
 
  
   - 2.1	Introduction	
 
   - 2.2	Ethical codes	
 
   - 2.3	Laws	
 
   - 2.4	References	
 
   
  - 3	Microdata	
 
  
   - 3.1	Introduction	
 
   - 3.2	A roadmap to the release of a microdata file	
 
   - 3.3	Risk assessment
 
   - 3.4	Microdata protection methods	5
 
   - 3.5	Information loss in microdata protection	
 
   - 3.6	Software	
 
   - 3.7	Introductory example: rules at Statistics Netherlands	
 
   - 3.8	Further examples	
 
   
  - 4	Magnitude tabular data	
 
  
   - 4.1	Introduction	
 
   - 4.2	Disclosure Control Concepts for Magnitude Tabular Data	
 
   - 4.3	The τ-ARGUS Implementation of Cell Suppression: Methodological Background, Guidance and Recommendations	
 
   - 4.4	Methodological concepts of secondary cell suppression algorithms in τ-ARGUS	
 
   - 4.5	Controlled Tabular AdjustmentControlled Tabular Adjustment	
 
   - 4.6	References	
 
   
  - 5	Frequency tables	
 
  
   - 5.1	Introduction	
 
   - 5.2	Disclosure risks	
 
   - 5.3	Methods	
 
   - 5.4	Rounding	
 
   - 5.5	Information loss	
 
   - 5.6	Software	
 
   - 5.7	References	
 
   
  - 6	Remote access issues	
 
  
   - 6.1	Introduction	
 
   - 6.2	Research centres	
 
   - 6.3	Remote execution	
 
   - 6.4	Remote access	
 
   - 6.5	Licensing	
 
   - 6.6	Confidentiality protection of the analysis results	
 
   - 6.7	References	
 
   
  - 7	Glossary	
 
  - 8	Index
 
   
   
 
Case studies A: The release of Microdata Files for Research Purposes
Case studies B: Illustrative examples of the application of particular techniques  
 
 
  |