4. Anonymization and re-identification
When, for one reason or another, it is no longer possible to store personal data in its original form, anonymization can be seen as an interesting alternative, enabling a different use to be made of information that has theoretically become risk-free for the people concerned. Nevertheless, effective anonymization is impossible in all cases, and it is essential to be aware of the problems associated with anonymization, which is necessarily imperfect, and with the possible re-identification of individuals.
4.1 Anonymity, pseudonymity and anonymous databases
The ISO/IEC Common Criteria for Information Systems Security Assessment provide normative definitions for the notions of anonymity and pseudonymity for users of a system. Anonymity enables a user to exploit...
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference
This article is included in
Software technologies and System architectures
This offer includes:
Knowledge Base
Updated and enriched with articles validated by our scientific committees
Services
A set of exclusive tools to complement the resources
Practical Path
Operational and didactic, to guarantee the acquisition of transversal skills
Doc & Quiz
Interactive articles with quizzes, for constructive reading
Anonymization and re-identification
Bibliography
- (1) - Article 29 Data Protection Working Party - Guidelines on the implementation of the Court of Justice of the European Union judgment on « Google Spain and Inc v. Agencia Española de Protección de Datos (AEPD), Mario Costeja González » CC-131/12. - Technical report, European Commission, November 2014.
- ...
Websites
Agence Nationale de la Sécurité des Systèmes d'Information. https://www. ssi.gouv.fr/ . (page consulted on March 2, 2018).
Commission Nationale de l'Informatique et des Libertés. https://www.cnil.fr/ . (page consulted on March 2, 2018)....
Norms, standards and recommendations
Agence Nationale de la Sécurité des Systèmes d'Information. Référentiel général de sécurité (RGS). http://www.ssi.gouv.fr/administration/reglementation/administration-electronique/le-referentiel-general-de-securite-rgs/...
Regulations
Council of Europe. Convention for the Protection of Human Rights and Fundamental Freedoms. CETS no. 005, November 4, 1950.
The European Parliament and the Council. Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications)....
Exclusive to subscribers. 97% yet to be discovered!
You do not have access to this resource.
Click here to request your free trial access!
Already subscribed? Log in!
The Ultimate Scientific and Technical Reference