GDPR pseudonymization techniques

The full data is broken to identifiable information and non-identifiable information in the pseudonymization process. The identifiable information is subjected to stricter access control and audits.

Anonymization vs pseudonymization

Pseudonymized data can be attributed when the identity is added to the data
When we cannot associate an identity with the data it is anonymized

Pseudonymization techniques

Hashing vs Encryption

Just having a hash value, there is no way you can guess the original data
Data is encrypted using a key
The key can be used to decrypt the data to its original form.

Event sourcing

--

--

I’ve moved to Substack: https://blog.alexewerlof.com

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store