Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| dcc:pdpsol:pseudonymization [2026/01/15 12:37] – [Introduction] marlon | dcc:pdpsol:pseudonymization [2026/02/24 12:38] (current) – [Introduction] marlon | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | {{indexmenu_n> | ||
| ====== Pseudonymization ====== | ====== Pseudonymization ====== | ||
| ===== Introduction ===== | ===== Introduction ===== | ||
| - | //“Pseudonymization is a de-identification procedure during which personally identifiable information is replaced by a unique alias or code (pseudonym). In some situations, the researcher maintains the link between the unique code and the data subject in a keyfile, while in other projects this connection is not necessary.”// | + | Pseudonymization is a de-identification procedure during which personally identifiable information is replaced by a unique alias or code (pseudonym). In some situations, the researcher maintains the link between the unique code and the data subject in a keyfile, while in other projects this connection is not necessary. |
| The manner in which pseudonymization is done varies between projects based on the research setup. It is good practice to describe the process of pseudonymization specific to your research either in your data management plan or a separate Pseudonymization Protocol. You can use the examples below to guide you in this process. | The manner in which pseudonymization is done varies between projects based on the research setup. It is good practice to describe the process of pseudonymization specific to your research either in your data management plan or a separate Pseudonymization Protocol. You can use the examples below to guide you in this process. | ||
| Line 9: | Line 10: | ||
| This is the simplest form of pseudonymization, | This is the simplest form of pseudonymization, | ||
| - | First, assign each data subject in your dataset a unique pseudonymization ID. That ID must be unique, non-informative, | + | First, assign each data subject in your dataset a unique pseudonymization ID. That ID must be unique, non-informative, |
| **Warning: | **Warning: | ||
| + | |||
| + | **Figure 1: Pseudonymization without a keyfile** | ||
| + | |||
| + | ---- | ||
| + | |||
| + | {{: | ||
| + | |||
| + | |||
| ===== Pseudonymization with a keyfile ===== | ===== Pseudonymization with a keyfile ===== | ||
| - | In this approach, you create pseudonymization IDs and securely store them in a separate | + | In this approach, you create pseudonymization IDs and securely store them together with contact details of your participants or other sensitive data in a keyfile. The dataset itself will only include the pseudonymization IDs, while the keyfile is kept apart and protected. |
| ==== Creating a keyfile ==== | ==== Creating a keyfile ==== | ||
| - | First, create a pseudonymization keyfile (e.g., in Excel or another UG approved tool available in the University Workplace) that assigns each data subject a unique pseudonymization ID. For the creation of the pseudonymization IDs, you can follow the same steps as described in // | + | First, create a pseudonymization keyfile (e.g., in Excel or another UG approved tool available in the University Workplace) that assigns each data subject a unique pseudonymization ID. For the creation of the pseudonymization IDs, you can follow the same steps as described in // |
| + | |||
| + | **Figure 2: Pseudonymization with keyfile** | ||
| + | ---- | ||
| + | {{: | ||
| ==== Managing the keyfile ==== | ==== Managing the keyfile ==== | ||
| Line 30: | Line 43: | ||
| This approach reduces the risk of re-identification and protects sensitive information throughout the data transfer process. For guidance on implementing this protocol, contact your [[https:// | This approach reduces the risk of re-identification and protects sensitive information throughout the data transfer process. For guidance on implementing this protocol, contact your [[https:// | ||
| + | |||
| + | **Figure 3: Pseudonymization with double coding** | ||
| + | |||
| + | ---- | ||
| + | {{: | ||
| [[dcc: | [[dcc: | ||