References
For additional reading, check out the following books and articles:
- Pseudonymization, Anonymization and the GDPR (https://www.termsfeed.com/blog/gdpr-pseudonymization-anonymization/)
 - Symmetric and Asymmetric Encryption (https://medium.com/hackernoon/symmetric-and-asymmetric-encryption-5122f9ec65b1)
 - Cryptography with Python Tutorial (https://www.tutorialspoint.com/cryptography_with_python/)
 - Encryption in R with cyphr (https://docs.ropensci.org/cyphr/articles/cyphr.html)