Data De-identification: Removing or encrypting PII such as names, addresses, and social security numbers. Use of Codes: Assigning unique codes to participants instead of using their real names. Secure Storage: Storing data in secure databases with restricted access. Informed Consent: Informing participants about how their data will be used and ensuring they agree to these terms.