4. Anonymization and re-identification
When, for one reason or another, it is no longer possible to store personal data in its original form, anonymization can be seen as an interesting alternative, enabling a different use to be made of information that has theoretically become risk-free for the people concerned. Nevertheless, effective anonymization is impossible in all cases, and it is essential to be aware of the problems associated with anonymization, which is necessarily imperfect, and with the possible re-identification of individuals.
4.1 Anonymity, pseudonymity and anonymous databases
The ISO/IEC Common Criteria for Information Systems Security Assessment provide normative definitions for the notions of anonymity and pseudonymity for users of a system. Anonymity enables a user to exploit...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Anonymization and re-identification
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
- (1) - Article 29 Data Protection Working Party - Guidelines on the implementation of the Court of Justice of the European Union judgment on « Google Spain and Inc v. Agencia Española de Protección de Datos (AEPD), Mario Costeja González » CC-131/12. - Technical report, European Commission, November 2014.
- ...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!