In a recent compliance know how past, we already addressed the future data protection regulation. The term pseudonymization is infrequently used in this subject area. This means that individual-related data is not linked explicitly to a person, but a pseudonym.

According to Suetonius, Julius Caesar used it with a shift of three to protect messages of military significance. Cryptology textbooks cite this so-called Caesar cipher often as a canonical example of weak encryption, because it's easy to crack using a simple frequency analysis. A simple pseudonymization can hardly satify serious data protection requirements.

shutterstock 195935006 384

Complete Revision of the Federal Data Protection Act

Complete Revision of the Federal Data Protection Act: „As of 15th September 2017, draft and report for a completely revised Federal Data Protection Act is public. In a first step parliament and the people agreed to adaptations in order to be compliant with EU law. The second part of the revision is debated by the parliament since September 2019. Data Protection is to be increased by giving people more control over their private data as well as reinforcing transparency regarding the handling of confidential data.”


Eurospider Information Technology AG
Winterthurerstrasse 92
8006 Zürich


Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
More information Ok Decline