{"id":7310,"date":"2018-03-28T00:00:00","date_gmt":"2018-03-28T00:00:00","guid":{"rendered":"https:\/\/www.esecurityplanet.com\/2018\/03\/28\/how-pseudonymization-can-help-you-comply-with-gdpr\/"},"modified":"2021-01-28T16:21:55","modified_gmt":"2021-01-28T16:21:55","slug":"how-pseudonymization-can-help-you-comply-with-gdpr","status":"publish","type":"post","link":"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/","title":{"rendered":"How Pseudonymization Can Help You Comply with GDPR"},"content":{"rendered":"<div id=\"article-content\">\n<div id=\"article-ads\">\n<div class=\"hidden-xs\">\n<div id=\"daily-newsletter\" class=\"row\">\n<div class=\"text-center\">\n<div class=\"col-md-6 col-md-offset-3\">\n<div id=\"namecard-input-groupwz\" class=\"input-group\">\n<span class=\"input-group-btn\"><\/p>\n<p><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n<p>Pseudonymization is one strategy that could help businesses struggling to comply with the European Union&#8217;s <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/how-to-comply-with-gdpr\/\">General Data Protection Regulation (GDPR)<\/a>.<\/p>\n<p>GDPR goes into effect on May 25, bringing with it stringent new data privacy protections for companies with European customers \u2013 and steep penalties for failing to comply with those regulations.<\/p>\n<p>One recent report found that a quarter of U.S. companies aren&#8217;t sure if they&#8217;re ready to meet GDPR compliance standards. &#8220;The challenge is due in part to confusion on behalf of many companies, primarily because there is not one software solution to buy that can help each corporation comply with the standard,&#8221; said Kory Willis, senior director of IT at partner relationship management (PRM) provider Impartner. &#8220;Rather, it is up to each company to make sure that each technology vendor they use can comply with the standard.&#8221;<\/p>\n<p>Indeed, there are a number of <a href=\"https:\/\/www.esecurityplanet.com\/compliance\/technologies-that-can-help-with-gdpr-compliance\/\">technologies that can help companies comply with GDPR<\/a>, among them data protection, managed file transfer, data mapping, privacy impact assessments, and individual rights compliance tools.<\/p>\n<p>But Willis says the key to complying with GDPR is pseudonymization.<\/p>\n<h2>What is pseudonymization?<\/h2>\n<p>Pseudonymization is a form of data masking. It refers to a safeguard that can render a user&#8217;s personally identifiable data, well, less personally identifiable.<\/p>\n<p>The term can be found within the text of the law itself. Here&#8217;s how <a href=\"https:\/\/gdpr-info.eu\/art-4-gdpr\/\" target=\"_blank\" rel=\"noopener noreferrer\">Article 4 of the GDPR<\/a> defines pseudonymization:<\/p>\n<p>&#8220;&#8216;[P]seudonymization&#8217; means the processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately and is subject to technical and organizational measures to ensure that the personal data are not attributed to an identified or identifiable natural person.&#8221;<\/p>\n<p>It&#8217;s a mouthful, but what does it mean for data controllers and IT teams?<\/p>\n<p>&#8220;Simply put, pseudonymization means storing an individual&#8217;s information in many separate files, under many different names, so that no hacker could ever grab one file and have anyone&#8217;s full information,&#8221; Willis said. &#8220;If your information isn&#8217;t pseudonymized, you&#8217;re not compliant, and you could face huge consequences in just a few short months.&#8221;<\/p>\n<p>If a user&#8217;s data record is pseudonymized, one file would not yield an attacker enough information to complete the user&#8217;s record. Data must be stored in more than one data repository so an individual&#8217;s total set of details would be protected if one file of information is ever breached, Willis said.<\/p>\n<p>Pseudonymized data is different from anonymized data in some crucial respects.<\/p>\n<p>Anonymous data is irreversibly altered so that the &#8220;data subject is not or no longer identifiable,&#8221; states GDPR <a href=\"https:\/\/gdpr-info.eu\/recitals\/no-26\/\" target=\"_blank\" rel=\"noopener noreferrer\">Recital 26<\/a>, one of 173 such sections outlining the thinking behind the law. In short, there is no way of reassembling a user record if it&#8217;s anonymized and therefore GDPR does not apply to the processing of such information used for research purposes. Pseudonymized data, however, may be reassembled with the use of a key or other additional information.<\/p>\n<p>It seems fairly straightforward, but Willis cautions that organizations that aren&#8217;t already pseudonymizing user data will face some added complexity implementing the privacy-enhancing procedure. It&#8217;s not completely foolproof; there&#8217;s still the risk of a persistent attacker being able to piece together a record if lax safeguards and security policies expose pseudonymization keys. But if properly used alongside <a href=\"https:\/\/www.esecurityplanet.com\/networks\/encryption\/\">data encryption<\/a>, it can go a long way toward ensuring GDPR compliance.<\/p>\n<h2>How to implement pseudonymization<\/h2>\n<p>Pseudonymization involves much more than masking data on a technical level, Willis said. Here are some tips for IT teams looking to implement pseudonymization.<\/p>\n<ul>\n<li><strong>Examine what kinds of data you&#8217;re storing:<\/strong> Identify how and where you&#8217;re storing personal data. Take a thorough inventory of the databases and systems where affected records are kept before even considering pseudonymizing them.<\/li>\n<li><strong>Do you need the data that you think you need?<\/strong> If you&#8217;re hanging on to personal data that doesn&#8217;t add value or your organization simply doesn&#8217;t need, consider getting rid of it, Willis said. Pseudonymization comes at a cost and adds complexity to your enterprise data management and governance operations. Why incur those burdens if the data isn&#8217;t worth it to your organization?<\/li>\n<li><strong>Enact good privacy policies:<\/strong> Clear and unambiguous privacy policies will not only help your European users know where they stand in terms of their personal data, it governs how your organization protects that data. Pseudonymization can help give those policies some much-needed bite.<\/li>\n<li><strong>Target your databases:<\/strong> Look at your database and talk to your engineers, Willis advised. Besides making the case for data pseudonymization as it applies to GDPR, you&#8217;ll need the expertise of your IT experts and database administrators to implement pseudonymization techniques.<\/li>\n<\/ul>\n<h2>Pseudonymization vendors<\/h2>\n<p>There are several database vendors and data-masking specialists that can help businesses pseudonymize sensitive data. Here&#8217;s a sampling:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.anonos.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Anonos<\/strong><\/a>: The company&#8217;s BigPrivacy platform can be used to transform data into a pseudonymized format.<\/li>\n<li><a href=\"https:\/\/www.iri.com\/products\/fieldshield\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>IRI<\/strong><\/a>: IRI FieldShield is a classification and masking tool for personally identifiable information stored in databases and files. It supports various methods of protecting user data, including pseudonymization.<\/li>\n<li><a href=\"https:\/\/www.protegrity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Protegrity<\/strong><\/a>: The data protection specialist&#8217;s tokenization technology enables data pseudonymization for organizations that value data privacy.<\/li>\n<li><a href=\"https:\/\/www.oracle.com\/technetwork\/database\/security\/wp-security-dbsec-gdpr-3073228.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Oracle<\/strong><\/a>: Oracle suggests that customers use Oracle Data Redaction policies and Oracle Database Vault to pseudonymize data stored in its business database products.<\/li>\n<li><a href=\"https:\/\/www.striim.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Striim<\/strong><\/a>: The data integration and streaming analytics provider announced in January 2018 that it had added data pseudonymization to its platform. Striim 3.8 includes built-in data masking functionality that the company claims can be easily implemented using the solution&#8217;s interface.<\/li>\n<\/ul>\n<\/div>\n\n\n<div id=\"ta-campaign-widget-66d6f76d146eb-popup-wrapper\" class=\"ta-campaign-widget__popup-wrapper\">\n    \n<div\n    style=\"\n        --ta-campaign-plugin-primary: #3545ed;\n        --ta-campaign-plugin-button-text: #fff;\n        --ta-campaign-plugin-button-hover-background: #3231b4;\n        --ta-campaign-plugin-button-hover-text: #fff;\n        --ta-campaign-plugin-button-toggle-background: #3231b4;\n        --ta-campaign-plugin-button-toggle-text: #3231B4;\n    \"\n    data-ajax-url=\"https:\/\/www.esecurityplanet.com\/wp\/wp-admin\/admin-ajax.php\">\n    <div\n        id=\"ta-campaign-widget-66d6f76d146eb\"\n        class=\"ta-campaign-widget ta-campaign-widget--popup\"\n        data-campaign-fields='{\"properties\":{\"campaign_type\":\"popup\",\"campaign_category\":false,\"sailthru_list\":[\"cybersecurity-insider\"],\"popup_type\":\"exit_intent\",\"appearance\":{\"colors\":{\"primary_color\":\"#3545ed\",\"button\":{\"button_text_color\":\"#fff\",\"hover\":{\"button_hover_background_color\":\"#3231b4\",\"button_hover_text_color\":\"#fff\"},\"toggle\":{\"button_toggle_background_color\":\"#3231b4\",\"button_toggle_text_color\":\"#3231B4\"}}},\"custom_scss\":\"\"},\"behavior\":{\"opt_in_enabled\":true},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}},\"identifier\":\"66d6f76d146eb\",\"campaign_id\":26045,\"campaign_type\":\"popup\",\"popup_type\":\"exit_intent\",\"newsletters\":[\"cybersecurity-insider\"],\"behavior\":{\"opt_in_enabled\":true},\"appearance\":{\"colors\":{\"primary\":\"#3545ed\",\"button\":{\"text\":\"#fff\",\"hover\":{\"background\":\"#3231b4\",\"text\":\"#fff\"},\"toggle\":{\"background\":\"#3231b4\",\"text\":\"#3231B4\"}}},\"custom_css\":\"\"},\"language\":{\"tagline\":\"Get the Free Cybersecurity Newsletter\",\"subtagline\":\"\",\"content\":\"Strengthen your organization&#39;s IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday\",\"email_placeholder\":\"Work Email Address\",\"opt_in\":\"By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.\",\"subscribe_button\":\"Subscribe\"}}'>\n\n                <div class=\"ta-campaign-widget__exit\">\n            <svg class=\"w-8\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.5\" viewBox=\"0 0 24 24\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\">\n                <path stroke-linecap=\"round\" stroke-linejoin=\"round\" d=\"M6 18L18 6M6 6l12 12\"><\/path>\n            <\/svg>\n        <\/div>\n        \n        <div class=\"ta-campaign-widget__wrapper\">\n            <div class=\"ta-campaign-widget__header mb-6\">\n                                <h3 class=\"ta-campaign-widget__tagline\">\n                    Get the Free Cybersecurity Newsletter                <\/h3>\n                \n                \n                                <p class=\"ta-campaign-widget__content mt-6\">\n                    Strengthen your organization's IT security defenses by keeping up to date on the latest cybersecurity news, solutions, and best practices. Delivered every Monday, Tuesday and Thursday                <\/p>\n                            <\/div>\n\n            <form class=\"ta-campaign-widget__form\">\n                <div class=\"ta-campaign-widget__input mb-4\"  data-field=\"email\">\n                    <label\n                        class=\"sr-only\"\n                        for=\"email-66d6f76d146eb\">\n                        Email Address\n                    <\/label>\n                    <input\n                        class=\"ta-campaign-widget__input__text\"\n                        placeholder=\"Work Email Address\"\n                        id=\"email-66d6f76d146eb\"\n                        name=\"email\"\n                        type=\"email\">\n                <\/div>\n\n                                <div class=\"ta-campaign-widget__checkbox mb-4\" data-field=\"opt_in\">\n                    <div class=\"flex items-start\">\n                        <input\n                            id=\"opt-in-66d6f76d146eb\"\n                            class=\"ta-campaign-widget__checkbox__input mr-2\"\n                            name=\"opt-in\"\n                            type=\"checkbox\"\/>\n                        <label\n                            class=\"ta-campaign-widget__checkbox__label\"\n                            for=\"opt-in-66d6f76d146eb\">\n                            By signing up to receive our newsletter, you agree to our Terms of Use and Privacy Policy. You can unsubscribe at any time.                        <\/label>\n                    <\/div>\n                <\/div>\n                \n                <button class=\"ta-campaign-widget__button\" type=\"submit\" >\n                    Subscribe                <\/button>\n            <\/form>\n        <\/div>\n    <\/div>\n<\/div>\n\n<style>\n<\/style><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Pseudonymization is one strategy that could help businesses struggling to comply with the European Union&#8217;s General Data Protection Regulation (GDPR). GDPR goes into effect on May 25, bringing with it stringent new data privacy protections for companies with European customers \u2013 and steep penalties for failing to comply with those regulations. One recent report found [&hellip;]<\/p>\n","protected":false},"author":228,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_gazelle_contributing_experts":"","footnotes":""},"categories":[14],"tags":[4633,26264,30610],"b2b_audience":[33],"b2b_industry":[],"b2b_product":[253,143],"class_list":["post-7310","post","type-post","status-publish","format-standard","hentry","category-networks","tag-compliance","tag-gdpr","tag-general-data-protection-regulation","b2b_audience-awareness-and-consideration","b2b_product-regulatory-compliance","b2b_product-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Pseudonymization Helps You Meet GDPR Requirements<\/title>\n<meta name=\"description\" content=\"A look at how pseudonymization can help enterprises comply with the EU&#039;s tough new data privacy law.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Pseudonymization Helps You Meet GDPR Requirements\" \/>\n<meta property=\"og:description\" content=\"A look at how pseudonymization can help enterprises comply with the EU&#039;s tough new data privacy law.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/\" \/>\n<meta property=\"og:site_name\" content=\"eSecurity Planet\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-28T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-28T16:21:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pedro Hernandez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:site\" content=\"@eSecurityPlanet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pedro Hernandez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/\"},\"author\":{\"name\":\"Pedro Hernandez\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4372da8a1f45988c5b2714062b2b4816\"},\"headline\":\"How Pseudonymization Can Help You Comply with GDPR\",\"datePublished\":\"2018-03-28T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:21:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/\"},\"wordCount\":947,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"keywords\":[\"compliance\",\"GDPR\",\"General Data Protection Regulation\"],\"articleSection\":[\"Networks\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/\",\"url\":\"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/\",\"name\":\"How Pseudonymization Helps You Meet GDPR Requirements\",\"isPartOf\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\"},\"datePublished\":\"2018-03-28T00:00:00+00:00\",\"dateModified\":\"2021-01-28T16:21:55+00:00\",\"description\":\"A look at how pseudonymization can help enterprises comply with the EU's tough new data privacy law.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.esecurityplanet.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Pseudonymization Can Help You Comply with GDPR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#website\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"name\":\"eSecurity Planet\",\"description\":\"Industry-leading guidance and analysis for how to keep your business secure.\",\"publisher\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.esecurityplanet.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#organization\",\"name\":\"eSecurityPlanet\",\"url\":\"https:\/\/www.esecurityplanet.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png\",\"width\":1134,\"height\":375,\"caption\":\"eSecurityPlanet\"},\"image\":{\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/eSecurityPlanet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4372da8a1f45988c5b2714062b2b4816\",\"name\":\"Pedro Hernandez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/9Cld8Y2u_400x400-150x150.jpg\",\"contentUrl\":\"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/9Cld8Y2u_400x400-150x150.jpg\",\"caption\":\"Pedro Hernandez\"},\"description\":\"Pedro Hernandez is a contributor to eSecurity Planet, eWEEK, and the IT Business Edge Network. Previously, he served as a managing editor for the Internet.com network of IT-related websites and as the Green IT curator for GigaOM Pro.\",\"url\":\"https:\/\/www.esecurityplanet.com\/author\/pedro-hernandez-esp\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Pseudonymization Helps You Meet GDPR Requirements","description":"A look at how pseudonymization can help enterprises comply with the EU's tough new data privacy law.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/","og_locale":"en_US","og_type":"article","og_title":"How Pseudonymization Helps You Meet GDPR Requirements","og_description":"A look at how pseudonymization can help enterprises comply with the EU's tough new data privacy law.","og_url":"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/","og_site_name":"eSecurity Planet","article_published_time":"2018-03-28T00:00:00+00:00","article_modified_time":"2021-01-28T16:21:55+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/eSecurity_redesign_badgecolor.png","type":"image\/png"}],"author":"Pedro Hernandez","twitter_card":"summary_large_image","twitter_creator":"@eSecurityPlanet","twitter_site":"@eSecurityPlanet","twitter_misc":{"Written by":"Pedro Hernandez","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/#article","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/"},"author":{"name":"Pedro Hernandez","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4372da8a1f45988c5b2714062b2b4816"},"headline":"How Pseudonymization Can Help You Comply with GDPR","datePublished":"2018-03-28T00:00:00+00:00","dateModified":"2021-01-28T16:21:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/"},"wordCount":947,"commentCount":0,"publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"keywords":["compliance","GDPR","General Data Protection Regulation"],"articleSection":["Networks"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/","url":"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/","name":"How Pseudonymization Helps You Meet GDPR Requirements","isPartOf":{"@id":"https:\/\/www.esecurityplanet.com\/#website"},"datePublished":"2018-03-28T00:00:00+00:00","dateModified":"2021-01-28T16:21:55+00:00","description":"A look at how pseudonymization can help enterprises comply with the EU's tough new data privacy law.","breadcrumb":{"@id":"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.esecurityplanet.com\/networks\/how-pseudonymization-can-help-you-comply-with-gdpr\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.esecurityplanet.com\/"},{"@type":"ListItem","position":2,"name":"How Pseudonymization Can Help You Comply with GDPR"}]},{"@type":"WebSite","@id":"https:\/\/www.esecurityplanet.com\/#website","url":"https:\/\/www.esecurityplanet.com\/","name":"eSecurity Planet","description":"Industry-leading guidance and analysis for how to keep your business secure.","publisher":{"@id":"https:\/\/www.esecurityplanet.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esecurityplanet.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esecurityplanet.com\/#organization","name":"eSecurityPlanet","url":"https:\/\/www.esecurityplanet.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/10\/eSecurity_logo_MainLogo.png","width":1134,"height":375,"caption":"eSecurityPlanet"},"image":{"@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/eSecurityPlanet"]},{"@type":"Person","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/4372da8a1f45988c5b2714062b2b4816","name":"Pedro Hernandez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esecurityplanet.com\/#\/schema\/person\/image\/","url":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/9Cld8Y2u_400x400-150x150.jpg","contentUrl":"https:\/\/assets.esecurityplanet.com\/uploads\/2020\/12\/9Cld8Y2u_400x400-150x150.jpg","caption":"Pedro Hernandez"},"description":"Pedro Hernandez is a contributor to eSecurity Planet, eWEEK, and the IT Business Edge Network. Previously, he served as a managing editor for the Internet.com network of IT-related websites and as the Green IT curator for GigaOM Pro.","url":"https:\/\/www.esecurityplanet.com\/author\/pedro-hernandez-esp\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7310"}],"collection":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/users\/228"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/comments?post=7310"}],"version-history":[{"count":0,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/posts\/7310\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/media?parent=7310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/categories?post=7310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/tags?post=7310"},{"taxonomy":"b2b_audience","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_audience?post=7310"},{"taxonomy":"b2b_industry","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_industry?post=7310"},{"taxonomy":"b2b_product","embeddable":true,"href":"https:\/\/www.esecurityplanet.com\/wp-json\/wp\/v2\/b2b_product?post=7310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}