This report, building on the basic pseudonymisation techniques, examines advanced solutions for more complex scenarios that can be based on asymmetric encryption, ring signatures and group pseudonyms, chaining mode, pseudonyms based on multiple identifiers, pseudonyms with proof of knowledge and secure multi-party computation. It then applies some of these techniques in the area of healthcare […]
pseudonimisation
This report explores further the basic notions of pseudonymisation, as well as technical solutions that can support implementation in practice.
Joint paper of the Spanish data protection authority, Agencia española de protección de datos (AEPD), and the European Data Protection Supervisor (EDPS) on hash techniques in data processing activities as a safeguard for personal data. This essay is intended for data controllers who wish to use hash techniques in their data processing activities as a […]
Ireland DPA’s guidance on Anonymisation and Pseudonymisation.
In the context of GDPR, part of securing Personal Data means employing multiple levels of protection to ensure that data is not lost, destroyed, or disclosed to unauthorized individuals. One GDPR principle for securing Personal Data is Pseudonymization, which is defined as “…the processing of personal data in such a way that the data can […]