Examples of using Pseudonymization in English and their translations into Bulgarian
{-}
-
Colloquial
-
Official
-
Medicine
-
Ecclesiastic
-
Ecclesiastic
-
Computer
(c) Pseudonymization and Encryption.
We use methods such as encryption and pseudonymization of information;
The pseudonymization and encryption of personal data;
Including inter alia as appropriate:(a) the pseudonymization and encryption of personal data.”.
Pseudonymization and encryption of personal data;
Emphasis should be given to two measures: encryption and data pseudonymization.
In particular, according to Google, a pseudonymization procedure is used in re-marketing.
(e) the existence of adequate safeguards,which may include encryption or pseudonymization.
Pseudonymization, encryption and clear appointment of staff who will have access to personal data.
Privacy-enhancing technologies such as pseudonymization and anonymization;
This does not apply if you have expressly permitted Google to process the data without pseudonymization.
Pseudonymization may be envisaged for individual categories of data at the proposal of the Data Protection Officer.
This does not apply if a User has given Google express consent to process the data without pseudonymization.
Pseudonymization may be envisaged for individual categories of data at the proposal of the Data Protection Officer.
This does not apply if a user Google has explicitly allowed to process the data without this pseudonymization.
On the other hand,we apply technical measures such as encryption, pseudonymization and anonymization of personal data collected.
This does not apply, if a Google user has expressly allowed the data to be processed without this pseudonymization.
ELKO Group must apply anonymization or pseudonymization to personal data if possible to reduce the risks to the data subjects concerned.
Of the GDPR lists some exemplary, but not mandatory measures such as pseudonymization, encryption, etc.
In this case, pseudonymization is performed- your personal data is processed in such a way that it can not be linked to you and you can not be identified.
As part of the data protection measures,we use the method of pseudonymization for part of the data.
Introduction of pseudonymization, as well as any other processing whose parameters are different from those described in these rules, shall be recorded by creating protocols containing the following information.
As part of the envisaged data protection measures,we use the pseudonymization method of part of the data.
For the purposes of ensuring maximum security when processing, transferring and storing your data,we may use additional protection mechanisms such as encryption, pseudonymization, etc.
We attempt to protect your data from unauthorized access by third parties by means of precautions such as pseudonymization, data economy, observing deletion periods and in consideration of the current state of the art technology.
Hence, replacing identifiers with other meaningless reference numbers is not anonymization but pseudonymization; e.g.
Technical safeguards include pseudonymization, encryption, and various capabilities for identifying and blocking data breaches, ensuring data security, and automatically identifying and classifying personal data.
Prevent unauthorized access to personal data by applying adequate measures where necessary- pseudonymization, encryption, anonymity, randomisation.
Pseudonymization: the replacement of information which directly or indirectly identifies a natural person, with one or more artificial identifiers(“pseudonyms”), so that the person cannot be identified without access to the additional information which shall be separately kept and which shall be confidential.
Such security measures include authentication tools, firewalls,monitoring of IT systems and networks, pseudonymization and encryption of personal data.