Javascript must be enabled for the correct page display

Is pseudonymisation the silver bullet for compliance with the GDPR?

Jong, S. de (2017) Is pseudonymisation the silver bullet for compliance with the GDPR? Bachelor's Thesis, Computing Science.

Sander_de_Jong_Bachelor_Thesis_Final.pdf - Published Version

Download (1MB) | Preview
[img] Text
toestemming.pdf - Other
Restricted to Backend only

Download (80kB)


The GDPR imposed by the European Union will be active from May 2018 and will place more requirements on data collected for various purposes. Pseudonymisation can help protect these data. Pseudonymisation techniques include encryption, hashing and tokenisation. While tokenisation provides the best security by relying on non-mathematical principles and minimising access to the central token storage, encryption is very useful for sharing pseudonymised data. While transferring data, a private key is sent to the receiver to decrypt the data. Hashing is less secure but an adequate technique when resources are limited. Even when data is pseudonymised, it can be traced back to individuals. Therefore, consent has to be gained from selected data subjects. Even when consent has been offered, data collected should be minimilised adhering to 'data protection by design'. This principle states that in every step of data collection and processing, data minimilisation should be taken into account. Providing training to (long-term) employees will encourage the use of pseudonymisation techniques and data minimisation.

Item Type: Thesis (Bachelor's Thesis)
Degree programme: Computing Science
Thesis type: Bachelor's Thesis
Language: English
Date Deposited: 15 Feb 2018 08:31
Last Modified: 15 Feb 2018 08:31

Actions (login required)

View Item View Item