Recommendations on shaping technology according to GDPR provisions (Registro nro. 4894)

000 -LEADER
fixed length control field 03010nam a22004097a 4500
001 - CONTROL NUMBER
control field 00004894
003 - CONTROL NUMBER IDENTIFIER
control field ES-MaONT
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220119165422.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190206t2019 ||||frt||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 978-92-9204-281-3
024 ## - OTHER STANDARD IDENTIFIER
Source of number or code doi
Standard number or code 10.2824/74954
Additional codes following the standard number or code .
040 ## - CATALOGING SOURCE
Transcribing agency CDO
110 2# - MAIN ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element European Union Agency for Network and Information Security
9 (RLIN) 2344
245 00 - TITLE STATEMENT
Title Recommendations on shaping technology according to GDPR provisions
Remainder of title An overview on data pseudonymisation
Statement of responsibility, etc. enisa
250 ## - EDITION STATEMENT
Remainder of edition statement Prokopios Drogkaris ; Athena Bourka
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Attiki, Greece
Name of publisher, distributor, etc. ENISA
Date of publication, distribution, etc. november 2018
300 ## - PHYSICAL DESCRIPTION
Extent 43 p.
Type of unit 1 fichero .pdf
336 ## - CONTENT TYPE
Content type term texto (visual)
Source isbdcontent
337 ## - MEDIA TYPE
Media type term electrónico
Source isbdmedia
338 ## - CARRIER TYPE
Carrier type term recurso en línea
Source rdacarrier
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Contiene bibliografía
520 ## - SUMMARY, ETC.
Summary, etc. Pseudonymisation is an established and accepted de-identification process that has gained additional attention following the adoption of the General Data Protection Regulation (GDPR), where it is referenced as both a security and data protection by design mechanism. As a result, in the GDPR context, pseudonymisation can motivate the relaxation to a certain degree of data controllers’ legal obligations if properly applied. In this report, we present an overview of the notion and main techniques of pseudonymisation in correlation with its new role under GDPR. In particular, starting from the definition of pseudonymisation (as well as its differences from other key techniques, such as anonymization and encryption), the report first discusses its core data protection benefits. Following this analysis, the report then addresses some techniques that may be utilised for pseudonymisation, such as hashing, hashing with key or salt, encryption and other cryptographic mechanisms, tokenization, as well as other relevant approaches. Last, certain pseudonymisation use cases and best practices are discussed, focusing especially on the area of mobile apps and revisiting some of the earlier discussed techniques. Although the report does not seek to conduct a detailed analysis of the different aspects related to specific pseudonymisation methods and implementations, it touches upon some of the key issues in this regard. However, further research is needed, as well as practical experience, involving all stakeholders in the field
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Tecnologías habilitadoras digitales
9 (RLIN) 18
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term computer network
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term data protection
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term data-processing law
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term digital technology
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term information storage
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term information technology
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term Internet access provider
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term mobile phone
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term protection of privacy
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term regulation of telecommunications
653 ## - INDEX TERM--UNCONTROLLED
Uncontrolled term software
856 4# - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://publications.europa.eu/en/publication-detail/-/publication/0e1ca64f-29c7-11e9-8d04-01aa75ed71a1/language-en/format-PDF/source-86095141">https://publications.europa.eu/en/publication-detail/-/publication/0e1ca64f-29c7-11e9-8d04-01aa75ed71a1/language-en/format-PDF/source-86095141</a>
Nonpublic note Abierto
Link text Acceso a la publicación
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Informes
Existencias
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Collection code Home library Current library Shelving location Date acquired Total Checkouts Barcode Date last seen Price effective from Koha item type Public note
      Informe   Acceso libre online Colección digital CDO CDO   06/02/2019   1000020175276 06/02/2019 06/02/2019 Informes .pdf
Copyright© ONTSI. Todos los derechos reservados.
x
Esta web está utilizando la política de Cookies de la entidad pública empresarial Red.es, M.P. se detalla en el siguiente enlace: aviso-cookies. Acepto