-
Pseudonymisation techniques and best practices
-
This report explores further the basic notions of pseudonymisation, as well as technical solutions that can support implementation in practice. Starting from a number of pseudonymisation scenarios, the report defines first the main actors that can be involved in the process of pseudonymisation along with their possible roles. It then analyses the different adversarial models and attacking techniques against pseudonymisation, such as brute force attack, dictionary search and guesswork. Moreover, it presents the main pseudonymisation techniques and policies available today.
Located in
Publications
-
Cybersecurity to the Rescue: Pseudonymisation for Personal Data Protection
-
ENISA’s new report explores pseudonymisation techniques and use cases for healthcare and information sharing in cybersecurity
Located in
News
/
ENISA News
-
ENISA proposes Best Practices and Techniques for Pseudonymisation
-
The European Union Agency for Cybersecurity (ENISA) published a new report on “Pseudonymisation Techniques and Best Practices”, which explores the basic notions of pseudonymisation, as well as technical solutions that can support implementation in practice.
Located in
News
/
ENISA News
-
Securing Personal Data: a risk-based approach
-
To mark Data Protection Day 2020 on 28 January, the EU Agency for Cybersecurity launches an online platform to assist in the security of personal data processing; this platform implements a risk-based approach to personal data security as a means to underpin trust.
Located in
News
/
ENISA News
-
GDPR & deploying pseudonymisation techniques
-
On 12 November 2019, ENISA, the European Union Agency for Cybersecurity, co-organised a workshop on “Pseudonymisation and relevant security techniques” with the Unabhängige Landeszentrum für Datenschutz Schleswig-Holstein (ULD), the Data Protection Authority of the German Federal State of Schleswig-Holstein.
Located in
News
/
ENISA News