000 -LEADER |
fixed length control field |
03010nam a22004097a 4500 |
001 - CONTROL NUMBER |
control field |
00004894 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
ES-MaONT |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220119165422.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190206t2019 ||||frt||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
978-92-9204-281-3 |
024 ## - OTHER STANDARD IDENTIFIER |
Source of number or code |
doi |
Standard number or code |
10.2824/74954 |
Additional codes following the standard number or code |
. |
040 ## - CATALOGING SOURCE |
Transcribing agency |
CDO |
110 2# - MAIN ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
European Union Agency for Network and Information Security |
9 (RLIN) |
2344 |
245 00 - TITLE STATEMENT |
Title |
Recommendations on shaping technology according to GDPR provisions |
Remainder of title |
An overview on data pseudonymisation |
Statement of responsibility, etc. |
enisa |
250 ## - EDITION STATEMENT |
Remainder of edition statement |
Prokopios Drogkaris ; Athena Bourka |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Attiki, Greece |
Name of publisher, distributor, etc. |
ENISA |
Date of publication, distribution, etc. |
november 2018 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
43 p. |
Type of unit |
1 fichero .pdf |
336 ## - CONTENT TYPE |
Content type term |
texto (visual) |
Source |
isbdcontent |
337 ## - MEDIA TYPE |
Media type term |
electrónico |
Source |
isbdmedia |
338 ## - CARRIER TYPE |
Carrier type term |
recurso en línea |
Source |
rdacarrier |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Contiene bibliografía |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Pseudonymisation is an established and accepted de-identification process that has gained additional attention following the adoption of the General Data Protection Regulation (GDPR), where it is referenced as both a security and data protection by design mechanism. As a result, in the GDPR context, pseudonymisation can motivate the relaxation to a certain degree of data controllers’ legal obligations if properly applied. In this report, we present an overview of the notion and main techniques of pseudonymisation in correlation with its new role under GDPR. In particular, starting from the definition of pseudonymisation (as well as its differences from other key techniques, such as anonymization and encryption), the report first discusses its core data protection benefits. Following this analysis, the report then addresses some techniques that may be utilised for pseudonymisation, such as hashing, hashing with key or salt, encryption and other cryptographic mechanisms, tokenization, as well as other relevant approaches. Last, certain pseudonymisation use cases and best practices are discussed, focusing especially on the area of mobile apps and revisiting some of the earlier discussed techniques. Although the report does not seek to conduct a detailed analysis of the different aspects related to specific pseudonymisation methods and implementations, it touches upon some of the key issues in this regard. However, further research is needed, as well as practical experience, involving all stakeholders in the field |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Tecnologías habilitadoras digitales |
9 (RLIN) |
18 |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
computer network |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
data protection |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
data-processing law |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
digital technology |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
information storage |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
information technology |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
Internet access provider |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
mobile phone |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
protection of privacy |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
regulation of telecommunications |
653 ## - INDEX TERM--UNCONTROLLED |
Uncontrolled term |
software |
856 4# - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://publications.europa.eu/en/publication-detail/-/publication/0e1ca64f-29c7-11e9-8d04-01aa75ed71a1/language-en/format-PDF/source-86095141">https://publications.europa.eu/en/publication-detail/-/publication/0e1ca64f-29c7-11e9-8d04-01aa75ed71a1/language-en/format-PDF/source-86095141</a> |
Nonpublic note |
Abierto |
Link text |
Acceso a la publicación |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
Informes |