Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| dcc:pdpsol:pseudonymization [2026/02/19 15:25] – marlon | dcc:pdpsol:pseudonymization [2026/02/24 12:38] (current) – [Introduction] marlon | ||
|---|---|---|---|
| Line 2: | Line 2: | ||
| ====== Pseudonymization ====== | ====== Pseudonymization ====== | ||
| ===== Introduction ===== | ===== Introduction ===== | ||
| - | //“Pseudonymization is a de-identification procedure during which personally identifiable information is replaced by a unique alias or code (pseudonym). In some situations, the researcher maintains the link between the unique code and the data subject in a keyfile, while in other projects this connection is not necessary.”// | + | Pseudonymization is a de-identification procedure during which personally identifiable information is replaced by a unique alias or code (pseudonym). In some situations, the researcher maintains the link between the unique code and the data subject in a keyfile, while in other projects this connection is not necessary. |
| The manner in which pseudonymization is done varies between projects based on the research setup. It is good practice to describe the process of pseudonymization specific to your research either in your data management plan or a separate Pseudonymization Protocol. You can use the examples below to guide you in this process. | The manner in which pseudonymization is done varies between projects based on the research setup. It is good practice to describe the process of pseudonymization specific to your research either in your data management plan or a separate Pseudonymization Protocol. You can use the examples below to guide you in this process. | ||
| Line 44: | Line 44: | ||
| This approach reduces the risk of re-identification and protects sensitive information throughout the data transfer process. For guidance on implementing this protocol, contact your [[https:// | This approach reduces the risk of re-identification and protects sensitive information throughout the data transfer process. For guidance on implementing this protocol, contact your [[https:// | ||
| - | **Figure 3: Pseudonymization | + | **Figure 3: Pseudonymization with double coding** |
| ---- | ---- | ||
| - | {{: | + | {{: |
| [[dcc: | [[dcc: | ||