Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| dcc:pdpsol:pseudonymization [2026/02/19 15:12] – add figure marlon | dcc:pdpsol:pseudonymization [2026/02/24 12:38] (current) – [Introduction] marlon | ||
|---|---|---|---|
| Line 2: | Line 2: | ||
| ====== Pseudonymization ====== | ====== Pseudonymization ====== | ||
| ===== Introduction ===== | ===== Introduction ===== | ||
| - | //“Pseudonymization is a de-identification procedure during which personally identifiable information is replaced by a unique alias or code (pseudonym). In some situations, the researcher maintains the link between the unique code and the data subject in a keyfile, while in other projects this connection is not necessary.”// | + | Pseudonymization is a de-identification procedure during which personally identifiable information is replaced by a unique alias or code (pseudonym). In some situations, the researcher maintains the link between the unique code and the data subject in a keyfile, while in other projects this connection is not necessary. |
| The manner in which pseudonymization is done varies between projects based on the research setup. It is good practice to describe the process of pseudonymization specific to your research either in your data management plan or a separate Pseudonymization Protocol. You can use the examples below to guide you in this process. | The manner in which pseudonymization is done varies between projects based on the research setup. It is good practice to describe the process of pseudonymization specific to your research either in your data management plan or a separate Pseudonymization Protocol. You can use the examples below to guide you in this process. | ||
| Line 26: | Line 26: | ||
| ==== Creating a keyfile ==== | ==== Creating a keyfile ==== | ||
| - | First, create a pseudonymization keyfile (e.g., in Excel or another UG approved tool available in the University Workplace) that assigns each data subject a unique pseudonymization ID. For the creation of the pseudonymization IDs, you can follow the same steps as described in // | + | First, create a pseudonymization keyfile (e.g., in Excel or another UG approved tool available in the University Workplace) that assigns each data subject a unique pseudonymization ID. For the creation of the pseudonymization IDs, you can follow the same steps as described in // |
| - | Figure 2: Pseudonymization | + | **Figure 2: Pseudonymization |
| ---- | ---- | ||
| - | {{: | + | {{: |
| ==== Managing the keyfile ==== | ==== Managing the keyfile ==== | ||
| You must store the keyfile securely in your [[https:// | You must store the keyfile securely in your [[https:// | ||
| Line 42: | Line 43: | ||
| This approach reduces the risk of re-identification and protects sensitive information throughout the data transfer process. For guidance on implementing this protocol, contact your [[https:// | This approach reduces the risk of re-identification and protects sensitive information throughout the data transfer process. For guidance on implementing this protocol, contact your [[https:// | ||
| + | |||
| + | **Figure 3: Pseudonymization with double coding** | ||
| + | |||
| + | ---- | ||
| + | {{: | ||
| [[dcc: | [[dcc: | ||