Perform de-identification using validated algorithms and software that is validated to implement the algorithms.