Examples of using Pseudonymisation in English and their translations into Bulgarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
Pseudonymisation and encryption of personal data;
When possible, we shall apply pseudonymisation.
The pseudonymisation and encryption of personal data;
Sharing made in a secured manner(encrypting, pseudonymisation, etc.).
Encryption and pseudonymisation are used as far as applicable.
People also translate
In particular, according to Google,remarketing employs pseudonymisation.
Pseudonymisation is the processing of personal data in such a manner that.
Sharing made in a secured manner(encrypting, pseudonymisation, etc.).
Pseudonymisation is usually achieved, using a cryptographic key, applied to a database or a file.
In particular, according to Microsoft,in remarketing pseudonymisation is implemented.
Those measures may include pseudonymisation provided that we can fulfil the Purposes while doing so.
(e)the existence of appropriate safeguards,which may include encryption or pseudonymisation.
Privacy enhancing technologies such as pseudonymisation and anonymisation; and.
This does not apply,if a user expressly agrees to data being processed without pseudonymisation.
Use of pseudonymisation is implemented, wherever technically and economically justified and legally permitted.
Privacy enhancing technologies such as pseudonymisation and anonymisation;
This does not apply if the user explicitly allowed Google to process the data without pseudonymisation.
By way of example, the European Regulation refers to the pseudonymisation and encryption of personal data.
This is not the case if the user explicitly authorised Google to process the data without pseudonymisation.
Pseudonymisation and encryption of personal data are some of the security measures indicated in the Regulation.
This does not apply if a Google user has expressly permitted the data to be processed without this pseudonymisation.
Such measures may include pseudonymisation if the above-mentioned objectives can be achieved in this way.
This point does not apply if a user has expressly authorized the processing of the data without this pseudonymisation.
Using techniques such as data minimisation and pseudonymisation will be discussed, when applicable and appropriate.
For maximum security when processing your data,we may use additional protection mechanisms such as pseudonymisation, encryption, and more.
Use of techniques such as data minimisation and pseudonymisation will be considered where applicable and appropriate.
For the data that remains, consider whether it needs to be kept in its raw format, andhow quickly you can begin the process of anonymisation and pseudonymisation.
Moreover, we apply technical measures such as encryption, pseudonymisation and anonymisation of the collected personal data.
Account must be taken in particular of the reasonable expectations of the data subject vis-à-vis the company regarding such further processing, the type of data used,the consequences for the data subject and the possibilities of encryption and pseudonymisation.
The explicit introduction of pseudonymisation in the GDPR is NOT intended to preclude any other measures of data protection.