{"id":16243,"date":"2022-10-12T14:25:58","date_gmt":"2022-10-12T18:25:58","guid":{"rendered":"https:\/\/www.iri.com\/blog\/?p=16243"},"modified":"2022-10-12T14:33:59","modified_gmt":"2022-10-12T18:33:59","slug":"consistent-self-updating-and-secure-pseudonymization","status":"publish","type":"post","link":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/","title":{"rendered":"Consistent, Self-Updating and Secure Pseudonymization"},"content":{"rendered":"<h5><b>What is Pseudonymization?<\/b><\/h5>\n<p><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\/pseudonymize\"><span style=\"font-weight: 400;\">Pseudonymization<\/span><\/a><span style=\"font-weight: 400;\"> is a data masking method involving the replacement of one or more original source values in a column in a table, file, or in free-floating text with another, usually consistent \u201csynthetic\u201d value. Pseudonymization is used most often for anonymizing sensitive values like names and complies with the GDPR when the pseudonyms cannot be reversed.<\/span><\/p>\n<p><a href=\"http:\/\/tinyurl.com\/whichIRIshield\"><span style=\"font-weight: 400;\">IRI data masking tools<\/span><\/a><span style=\"font-weight: 400;\"> like FieldShield and DarkShield use lookup values that may or may not be reversible. For the pseudonyms to be consistent and\/or reversible, however, the original values must be paired with a list of replacement values in a two-column set file called a pseudonym replacement set (or pseudo set) file.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The pseudo set file is used to consistently replace a source value with a replacement value whenever the source value is the same as a value in the lookup column of the pseudonym replacement set file. This is how consistent pseudonymization replacement occurs.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-16246 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2022\/08\/Two-column-pseudonym-file-300x157.png\" alt=\"\" width=\"431\" height=\"226\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/Two-column-pseudonym-file-300x157.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/Two-column-pseudonym-file.png 596w\" sizes=\"(max-width: 431px) 100vw, 431px\" \/><\/p>\n<h5><b>Limitations of Normal Pseudonymization<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">As stated previously, consistent replacement requires a lookup list. The reliance on a lookup list to find matches places limitations and restraints on pseudonymization. This is because for any number of unique names present in your source\u2019s table or file they must also be present among the lookup list, lest the event of no match found occurs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the case where no match is found, a default or empty string will be returned for the replacement value. The problem with this is that you have several values matched to a single default replacement value.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is, for this reason, it is suggested to frequently update the pseudonym replacement set file if you have a column of names that frequently receive new entries.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-16247 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2022\/08\/look-up-value-300x212.jpg\" alt=\"\" width=\"314\" height=\"222\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/look-up-value-300x212.jpg 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/look-up-value.jpg 323w\" sizes=\"(max-width: 314px) 100vw, 314px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Failure to update lookup sets when LAST_NAME column receives new entries.<\/span><\/i><\/p>\n<h5><b>Pseudonym Hash Replacement Rule<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Aware of the shortcomings of normal pseudonym replacement, <\/span><a href=\"https:\/\/www.iri.com\/products\/fieldshield\"><span style=\"font-weight: 400;\">IRI FieldShield<\/span><\/a><span style=\"font-weight: 400;\"> now supports a new more flexible, and secure form of pseudonym replacement, in the form of a Pseudonym <\/span><i><span style=\"font-weight: 400;\">Hash <\/span><\/i><span style=\"font-weight: 400;\">Replacement Rule. This rule also uses a lookup list to find exact matches and replace a value when a match occurs from a list of replacement values.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, unlike normal pseudo replacement, the new rule uses <\/span><i><span style=\"font-weight: 400;\">hashed <\/span><\/i><span style=\"font-weight: 400;\">values as the lookup values. These lookup values are used to either find exact matches or the next closest match.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Pseudonym Hash Replacement Rule is considered flexible because it can consistently map multiple values to a single replacement value. This many-to-one relationship releases users from the tethers of having to continuously update and maintain their pseudonym replacement set files whenever more unique entries are added to their source\u2019s columns in tables or files.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Another point to note is the increase in security this new rule brings. Normally, a pseudonym replacement set file contains a column with a lookup list that matches against values in a table or flat files. This means that the values in the lookup list may have real names.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In certain situations, it may be necessary to secure the set file containing the lookup list to prevent the leak of PII from the lookup list. A pseudonym replacement set file with hashed values for the lookup is secure because any potential PII has already been hashed.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, unlike encryption which supports decryption (reversal of encryption), hashing is typically irreversible. Only under certain circumstances <\/span><a href=\"https:\/\/www.johndcook.com\/blog\/2019\/01\/24\/reversing-an-md5-hash\/\"><span style=\"font-weight: 400;\">could it be possible<\/span><\/a><span style=\"font-weight: 400;\"> to determine the original value, such as if the input length is small enough and by comparing hashed values to known hashed values of strings.<\/span><\/p>\n<h5><b>How Hash Lookup and Replacements Occur<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Before the original source value of a table or flat file is matched against the hashed lookup values in the lookup list of a pseudonym replacement set file, the original source value must first be preprocessed.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Using the same type of hashing function applied to the lookup values of the pseudonym replacement set file, the original source value is hashed. Then, the new hashed value is used to search for a match in the lookup list.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By providing the SEARCH parameter of LE (less than or equal) or GE (greater than or equal) in the IRI data masking program, occurrences, where exact matches do not occur in the lookup list, can be handled (pseudonymized).<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16248\" src=\"\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-replacement-300x98.jpg\" alt=\"\" width=\"669\" height=\"219\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-replacement-300x98.jpg 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-replacement-768x251.jpg 768w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-replacement.jpg 774w\" sizes=\"(max-width: 669px) 100vw, 669px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Example One<\/span><\/i><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16249\" src=\"\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-replacement-example-2-300x102.jpg\" alt=\"\" width=\"662\" height=\"225\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-replacement-example-2-300x102.jpg 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-replacement-example-2.jpg 760w\" sizes=\"(max-width: 662px) 100vw, 662px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Example Two<\/span><\/i><\/p>\n<h5><b>How to Create a Pseudonym Hash Replacement Rule<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">To create a Pseudonym Hash Replacement Rule we can use the new wizard in IRI Workbench.<\/span><\/p>\n<p><b>Steps:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">\u00a01. In the IRI Workbench click the down arrow next to the blue icon designated as the<\/span><b> IRI Menu<\/b><span style=\"font-weight: 400;\">. After the dropdown menu expands click <\/span><b>New Rule<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-16254 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2022\/08\/hash_rule1-300x75.png\" alt=\"\" width=\"587\" height=\"147\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/hash_rule1-300x75.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/hash_rule1.png 751w\" sizes=\"(max-width: 587px) 100vw, 587px\" \/><br \/>\n2. From the new window select <i>Field Rules<\/i> and click <b>Next<\/b>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-16255 aligncenter\" src=\"\/blog\/wp-content\/uploads\/2022\/08\/hash_rule2-300x261.png\" alt=\"\" width=\"457\" height=\"398\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/hash_rule2-300x261.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/hash_rule2.png 510w\" sizes=\"(max-width: 457px) 100vw, 457px\" \/><\/p>\n<p>3. Select <i>Automatic Replacement for New Original Values<\/i> from the displayed tree view inside the <i>Pseudonym Replacement<\/i> directory. Then provide the project\u2019s location and desired name for the new rule.<\/p>\n<p><span style=\"font-weight: 400;\">Once finished, click <\/span><b>Next<\/b><span style=\"font-weight: 400;\"> to open a wizard that will be used to generate the new rule.<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16256\" src=\"\/blog\/wp-content\/uploads\/2022\/08\/FieldAutomaticRule-236x300.jpg\" alt=\"\" width=\"416\" height=\"529\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/FieldAutomaticRule-236x300.jpg 236w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/FieldAutomaticRule.jpg 567w\" sizes=\"(max-width: 416px) 100vw, 416px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">4. In the newly opened wizard. The user can now start selecting options that will be used in the new rule. The user will need to select a hash function, the search type, and a two-column pseudonym replacement set file that has hashed values for the lookup list.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">IRI currently supports three different hash functions, MD5, SHA1, and SHA2. It is important that the hash function chosen for the Pseudonym Hash Replacement Rule is the same hash function<\/span> used on the lookup values in the hashed pseudonym replacement set file.<\/p>\n<p><span style=\"font-weight: 400;\">A search type must also be specified. Depending on the selection the replacement value results will vary when an exact match to the lookup column does not exist.<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16257\" src=\"\/blog\/wp-content\/uploads\/2022\/08\/hash_rule4-283x300.png\" alt=\"\" width=\"413\" height=\"438\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/hash_rule4-283x300.png 283w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/hash_rule4.png 507w\" sizes=\"(max-width: 413px) 100vw, 413px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">5. Like a normal Pseudonym Replacement Rule, the Pseudonym Hash Replacement Rule relies on a two-column set file for the lookup values list (this list needs to be in a hashed format for the Pseudo Hash Replacement Rule) and the replacement values list. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">If the set file has already been created, click the <\/span><b>Browse<\/b><span style=\"font-weight: 400;\"> button to select the file. If a file has not been created yet, click <\/span><b>Create<\/b><span style=\"font-weight: 400;\">. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this case, the Pseudonym Hash Set File Creation Wizard will open and allow you to create the necessary set file. At completion, a path to the set file will be provided.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For a walkthrough on how to use the Pseudonym Hash Set File Creation Wizard, follow steps #3-13 in <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/pseudonym-hash-set-file-creation-wizard\/\"><span style=\"font-weight: 400;\">this article<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">6. If the user is satisfied with their selections they can then click <\/span><b>Finish<\/b><span style=\"font-weight: 400;\"> to generate the\u00a0 Pseudonym Hash Replacement Rule in a Data Class Rule Library of their selected project.<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16258\" src=\"\/blog\/wp-content\/uploads\/2022\/08\/pseudo_rule_6-282x300.png\" alt=\"\" width=\"430\" height=\"458\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudo_rule_6-282x300.png 282w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudo_rule_6.png 507w\" sizes=\"(max-width: 430px) 100vw, 430px\" \/><\/p>\n<h5><b>Results<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">A Pseudonym Hash Replacement Rule is actually a special type of rule called a <\/span><i><span style=\"font-weight: 400;\">Linked Chain Rule<\/span><\/i><span style=\"font-weight: 400;\">. This is a rule that actually has two or more rules linked together. The individual links of a <\/span><i><span style=\"font-weight: 400;\">Linked Chain Rule<\/span><\/i><span style=\"font-weight: 400;\"> can be located in separate sections of a job script.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the case of the Pseudonym Hash Replacement Rule we have a link in the chain applying a hashing function in the <\/span><b>\/INREC<\/b><span style=\"font-weight: 400;\"> section of a script and a Pseudonym Replacement Rule is applied in the<\/span><b> \/OUTFILE<\/b><span style=\"font-weight: 400;\"> section of the script.<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16259\" src=\"\/blog\/wp-content\/uploads\/2022\/08\/lib_rule_1.png\" alt=\"\" width=\"279\" height=\"180\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">The Pseudonym Hash Replacement Rule creates a two-part rule that is chained together.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Once the rule is created, it can then be applied like any other rule via the SortCL job script editor in IRI Workbench or through a Fieldshield masking job.<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-16260\" src=\"\/blog\/wp-content\/uploads\/2022\/08\/result_hash_rule-300x123.png\" alt=\"\" width=\"695\" height=\"285\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/result_hash_rule-300x123.png 300w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/result_hash_rule-768x315.png 768w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/result_hash_rule.png 892w\" sizes=\"(max-width: 695px) 100vw, 695px\" \/><\/p>\n<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">A FieldShield job script has been generated.<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">In the image above, there is a FieldShield job script that has been generated with the Pseudonym Hash Replacement Rule applied to a field called <\/span><i><span style=\"font-weight: 400;\">FIRST_NAME<\/span><\/i><span style=\"font-weight: 400;\">. Because the Pseudonym Hash Replacement Rule consists of multiple rules linked together, they modify fields in both the <\/span><b>\/INREC<\/b><span style=\"font-weight: 400;\"> and the <\/span><b>\/OUTFILE <\/b><span style=\"font-weight: 400;\">sections.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is easy to determine which rules are links in a <\/span><i><span style=\"font-weight: 400;\">Linked Chain Rule <\/span><\/i><span style=\"font-weight: 400;\">by looking for the keyword <\/span><i><span style=\"font-weight: 400;\">LINK_{NUMBER}<\/span><\/i><span style=\"font-weight: 400;\"> in the field names. If you have any questions about this, please email <\/span><a href=\"mailto:fieldshield@iri.com\"><span style=\"font-weight: 400;\">fieldshield@iri.com<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h5><b>In Closing<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">With this new process of producing pseudonym replacements, users are no longer burdened with the continual maintenance and expansion of their pseudonym replacement set files.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Furthermore, unlike in normal a pseudonym replacement file where the lookup list could possibly display sensitive values, a lookup list with hashed values prevents gleaning any meaningful data from the lookup list.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Pseudonymization? Pseudonymization is a data masking method involving the replacement of one or more original source values in a column in a table, file, or in free-floating text with another, usually consistent \u201csynthetic\u201d value. Pseudonymization is used most often for anonymizing sensitive values like names and complies with the GDPR when the pseudonyms<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/\" title=\"Consistent, Self-Updating and Secure Pseudonymization\">Read More<\/a><\/div>\n","protected":false},"author":152,"featured_media":16253,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,91,29],"tags":[14,21,22],"class_list":["post-16243","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-iri-workbench","category-test-data","tag-data-masking","tag-data-pseudonymization","tag-pseudonymization"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Consistent, Self-Updating and Secure Pseudonymization - IRI<\/title>\n<meta name=\"description\" content=\"What is Pseudonymization? Pseudonymization is a data masking method involving the replacement of one or more original source values in a column in a table, file, or in free-floating text with another, usually consistent \u201csynthetic\u201d value. Pseudonymization is used most often for anonymizing sensitive values like names and complies with the GDPR when the pseudonyms cannot be reversed.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Consistent, Self-Updating and Secure Pseudonymization - IRI\" \/>\n<meta property=\"og:description\" content=\"What is Pseudonymization? Pseudonymization is a data masking method involving the replacement of one or more original source values in a column in a table, file, or in free-floating text with another, usually consistent \u201csynthetic\u201d value. Pseudonymization is used most often for anonymizing sensitive values like names and complies with the GDPR when the pseudonyms cannot be reversed.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-12T18:25:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-12T18:33:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-face.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adam Lewis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Lewis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/\"},\"author\":{\"name\":\"Adam Lewis\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e\"},\"headline\":\"Consistent, Self-Updating and Secure Pseudonymization\",\"datePublished\":\"2022-10-12T18:25:58+00:00\",\"dateModified\":\"2022-10-12T18:33:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/\"},\"wordCount\":1370,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-face.png\",\"keywords\":[\"data masking\",\"data pseudonymization\",\"pseudonymization\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Workbench\",\"Test Data\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/\",\"name\":\"Consistent, Self-Updating and Secure Pseudonymization - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-face.png\",\"datePublished\":\"2022-10-12T18:25:58+00:00\",\"dateModified\":\"2022-10-12T18:33:59+00:00\",\"description\":\"What is Pseudonymization? Pseudonymization is a data masking method involving the replacement of one or more original source values in a column in a table, file, or in free-floating text with another, usually consistent \u201csynthetic\u201d value. Pseudonymization is used most often for anonymizing sensitive values like names and complies with the GDPR when the pseudonyms cannot be reversed.\",\"breadcrumb\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#primaryimage\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-face.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-face.png\",\"width\":1110,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beta.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consistent, Self-Updating and Secure Pseudonymization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beta.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e\",\"name\":\"Adam Lewis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g\",\"caption\":\"Adam Lewis\"},\"url\":\"https:\/\/beta.iri.com\/blog\/author\/adaml\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Consistent, Self-Updating and Secure Pseudonymization - IRI","description":"What is Pseudonymization? Pseudonymization is a data masking method involving the replacement of one or more original source values in a column in a table, file, or in free-floating text with another, usually consistent \u201csynthetic\u201d value. Pseudonymization is used most often for anonymizing sensitive values like names and complies with the GDPR when the pseudonyms cannot be reversed.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/","og_locale":"en_US","og_type":"article","og_title":"Consistent, Self-Updating and Secure Pseudonymization - IRI","og_description":"What is Pseudonymization? Pseudonymization is a data masking method involving the replacement of one or more original source values in a column in a table, file, or in free-floating text with another, usually consistent \u201csynthetic\u201d value. Pseudonymization is used most often for anonymizing sensitive values like names and complies with the GDPR when the pseudonyms cannot be reversed.","og_url":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/","og_site_name":"IRI","article_published_time":"2022-10-12T18:25:58+00:00","article_modified_time":"2022-10-12T18:33:59+00:00","og_image":[{"width":1110,"height":533,"url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-face.png","type":"image\/png"}],"author":"Adam Lewis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adam Lewis","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#article","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/"},"author":{"name":"Adam Lewis","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e"},"headline":"Consistent, Self-Updating and Secure Pseudonymization","datePublished":"2022-10-12T18:25:58+00:00","dateModified":"2022-10-12T18:33:59+00:00","mainEntityOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/"},"wordCount":1370,"commentCount":0,"publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-face.png","keywords":["data masking","data pseudonymization","pseudonymization"],"articleSection":["Data Masking\/Protection","IRI Workbench","Test Data"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/","url":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/","name":"Consistent, Self-Updating and Secure Pseudonymization - IRI","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#primaryimage"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-face.png","datePublished":"2022-10-12T18:25:58+00:00","dateModified":"2022-10-12T18:33:59+00:00","description":"What is Pseudonymization? Pseudonymization is a data masking method involving the replacement of one or more original source values in a column in a table, file, or in free-floating text with another, usually consistent \u201csynthetic\u201d value. Pseudonymization is used most often for anonymizing sensitive values like names and complies with the GDPR when the pseudonyms cannot be reversed.","breadcrumb":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#primaryimage","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-face.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-face.png","width":1110,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beta.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Consistent, Self-Updating and Secure Pseudonymization"}]},{"@type":"WebSite","@id":"https:\/\/beta.iri.com\/blog\/#website","url":"https:\/\/beta.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beta.iri.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beta.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/beta.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e","name":"Adam Lewis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g","caption":"Adam Lewis"},"url":"https:\/\/beta.iri.com\/blog\/author\/adaml\/"}]}},"jetpack_featured_media_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2022\/08\/pseudonym-face.png","_links":{"self":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/16243"}],"collection":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/users\/152"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=16243"}],"version-history":[{"count":7,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/16243\/revisions"}],"predecessor-version":[{"id":16337,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/16243\/revisions\/16337"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media\/16253"}],"wp:attachment":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=16243"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=16243"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=16243"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}