Pseudonymization. The processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information.
Pseudonymization. Evaluations must be pseudonymized in so far as the connection to the individual is not absolutely necessary for the result. The company has implemented the requirement as follows: Client separation within the data processing system Separation of production and test systems
Pseudonymization. In principle, only the minimum data required to provide our services is collected (privacy by design). The stored data cannot be assigned to any natural person, since the only means of identification is a pseudonymized user ID. Assignment data that could allow a unique identification are exclusively managed by the client and / or its partners. Any transmission of data between these parties and Seatti is subject to TLS encryption. If data of any kind is transferred to other data processing systems for analysis purposes, it will be completely anonymized beforehand.
Pseudonymization. To the extent permitted under Applicable Data Protection Legislations, ASSA ABLOY may aggregate, deidentify, or anonymize personal information so it no longer meets the Personal Data definition, and may use such aggregated, deidentified, or anonymized data for its own research and development purposes. ASSA ABLOY will not attempt to or actually re-identify any previously aggregated, deidentified, or anonymized data and will contractually prohibit downstream data recipients from attempting to or actually re- identifying such data.
Pseudonymization. Evaluations must be pseudonymized in so far as the connection to the individual is not absolutely necessary for the result.
Pseudonymization. Processing of personal data in such a way that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that this additional information is kept separately and is subject to technical and organizational measures. - No direct pseudonymization of personal data can take place in order to fulfill the purpose of the order. - Evaluations and xxxxxxx, e.g. for statistical purposes, are carried out anonymously. - The application collects pseudonymized usage and traffic data on the server side. This information is not merged with the bearer (user) of the pseudonym.
Pseudonymization. Sentropy will, where possible and consistent with the Services, use industry standard and commercially reasonable pseudonymization techniques designed to protect Personal Data.
Pseudonymization. (1) Where possible, Juniper Data shall be pseudonymized such that Juniper Data cannot be attributed to a particular individual without use of additional information.
(2) Pseudonymization may include hashing, randomizing, obfuscating, truncating, tokenizing, and removing identifiers.
(3) The additional information needed to attribute the pseudonymized Juniper Data to an individual must be held in separate repositories by Supplier and subject to strict security measures to prevent combination of the information with the pseudonymized Juniper Data.
Pseudonymization. Company will, where possible and consistent with the Services, use industry standard and reasonable pseudonymization techniques to protect Customer’s Confidential Information.
Pseudonymization. In most cases Data Processor does not pseudonymize the personal data it processes. For End User Personal Data this would require modifications of the End User Personal Data which would mean a violation of the integrity of the End User Personal Data. For Logged Personal Data this data is required in raw and clean for the purpose of the processing activities.