Implementation Guide Designing a Security System Security for Blinded Data Security for Blinded Data This section contains the following topics: About Data Blinding, Blind Breaks, and Unblinding Blinding-Related Security Privileges Interaction of Blinding Statuses and User Privileges on Executing Jobs and Viewing Data Parent topic: Designing a Security System