The European Union Agency for Cybersecurity has released "Pseudonymisation Techniques and Best Practices," a report that explores how to shape technology in accordance with data protection and privacy provisions. The report discusses how data protection, utility, scalability and recovery each carry potential influence on implementing pseudonymization techniques. Specific case use, including IP addresses, email addresses and complex datasets, are explored, as well. "One of the main outcomes of the report is that there is no single easy solution to pseudonymisation that works for all approaches in all possible scenarios," ENISA wrote.
Full Story
Comments
If you want to comment on this post, you need to login.