Skip to main content
. 2009 Jul-Aug;62(4):307–319. doi: 10.4212/cjhp.v62i4.812

Figure 1.

Figure 1.

Overview of the risk assessment methodology used in this study. If no additional controls can be imposed and no solution is found, then the data custodian will give up, and the data will not be released.