This scenarios uses two Jobs. The first Job encrypts last names, postal codes and dates of births. The second Job decrypts back the encrypted sensitive data.
If you find any issues with this page or its content – a typo, a missing step, or a technical error – please let us know!