In a recent compliance know how past, we already addressed the future data protection regulation. The term pseudonymization is infrequently used in this subject area. This means that individual-related data is not linked explicitly to a person, but a pseudonym.

According to Suetonius, Julius Caesar used it with a shift of three to protect messages of military significance. Cryptology textbooks cite this so-called Caesar cipher often as a canonical example of weak encryption, because it's easy to crack using a simple frequency analysis. A simple pseudonymization can hardly satify serious data protection requirements.

shutterstock 195935006 384

Complete Revision of the Federal Data Protection Act

The complete revision's draft of the Federal Data Protection Act is currently in political consultation. Data Protection is to be increased by giving people more control over their private data as well as reinforcing transparancy regarding the handling of confidential data.

Links: draft, report

Eurospider Information Technology AG
Winterthurerstrasse 92
8006 Zürich


Cookies make it easier for us to provide you with our services. With the usage of our services you permit us to use cookies.
More information Ok Decline