Pseudonymisation
Pseudonymisation is the process of replacing personal data with fictional identifiers (pseudonyms), such as unique codes or numbers, while preserving the possibility of reconstructing the original information if necessary to achieve the objectives of the research. This process can be carried out manually or with the help of IT tools.
Choice of pseudonymisation strategy
Pseudonymisation can be implemented using different methods. Depending on the type of data and the objectives of the research, the most appropriate strategy should be chosen.
|
Key table: key file; lookup table; coding table) |
Hash function |
Encryption (English: encryption) |
| Manually entered |
✔ |
|
|
| Technically simple |
✔ |
|
|
| Pseudonymisation is based on an algorithm |
|
✔ |
✔ |
| Suitable for large volumes of data |
|
✔ |
✔ |
| Feedback |
✔ |
|
✔ |
| Control over the choice of pseudonym |
✔ |
|
|
| Higher risk of re-identification |
✔ |
|
|
Both key tables and algorithmically generated aliases are valuable tools for data protection. Key tables offer simplicity and direct control, but can be difficult to use for large amounts of data. Algorithmic aliases offer efficiency and consistency over large data sets, but can be more technically complex and, if not implemented correctly, can reveal patterns that can facilitate identity recovery (de-anonymisation).