{"id":5191,"date":"2020-08-10T13:59:15","date_gmt":"2020-08-10T11:59:15","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/dot\/?p=5191"},"modified":"2025-11-18T15:19:55","modified_gmt":"2025-11-18T14:19:55","slug":"anonymization-best-practices-to-put-in-place","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/","title":{"rendered":"Anonymization: best practices to put in place"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"940\" height=\"350\" alt=\"Anonymization Best Practices\" title=\"anonymization-best-practices\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg\" class=\"lazyload img-responsive wp-image-13088\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices-200x74.jpg 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices-400x149.jpg 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices-600x223.jpg 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices-800x298.jpg 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg 940w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:left;\"><p><strong>Anonymizing<\/strong> individual data can be a real headache for organizations. Because the rules laid down by the <strong>GDPR<\/strong> are extremely restrictive and because complete anonymization is very complex and costly (if not impossible), many organizations opt for partial anonymization (pseudonymization) that is dynamic and well adapted to the real risks in their specific context.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">1. Choosing pseudonymization and a progressive approach<\/h2><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:left;\"><p>The first guideline when it comes to data anonymization is not to adopt an all-or-nothing attitude. It is almost impossible to anonymize data to the level demanded by the GDPR, but this is no reason not to act and to fail to initiate a progressive and pragmatic anonymization process. Such a process is known as partial anonymization, or <strong>pseudonymization.<\/strong><\/p>\n<p>The main goal of pseudonymization is to reduce data exposure to only those who need it for processing (information processors). Such access de facto prohibits what can be considered as total anonymization, but in reality is largely sufficient in terms of protection for most organizations.<\/p>\n<p><strong>Anonymization<\/strong> is a gradual and iterative process. It is important to bear in mind that actions taken early are a worthy investment that will ultimately consolidate and optimize the anonymization and security of user data over the long term.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:#29c9ce;--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p><strong>GDPR : Data Masking and Anonymisation: Why manage your personal data with Data Masking and Anonymization?<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#29c9ce;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#105378;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/ressources\/white-papers\/masquage-de-donnees-et-anonymisation-white-paper\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Read the White Paper<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">2. Customized anonymization to reduce attack surfaces<\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:left;\"><p>When it comes to data anonymization, each organization is unique and must be examined in context. It is the specific risks of each entity that should guide the best practices to use to protect user data, as this is ultimately the objective of any anonymization process.<\/p>\n<p>Finally, to be effective, the anonymization process must determine which attack surfaces to address in order to protect the data. In most cases, these are not the production environments, but the organization\u2019s entire digital ecosystem, including its website or related applications.<\/p>\n<p>It is by identifying their levels of risk and weaknesses upstream that organizations are most effective in achieving optimal data anonymization. This is essential to meet specific challenges of each organization, even in the case of a partial pseudonymization process.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:560px;--awb-max-height:315px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"Iv-vbM6J3FE\" class=\"landscape\" params=\"wmode=transparent&autoplay=1rel=0&amp;enablejsapi=1\" title=\"YouTube video player 1\" data-button-label=\"Play Video\" width=\"560\" height=\"315\" data-thumbnail-size=\"auto\" data-no-cookie=\"on\"><\/lite-youtube><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In order to comply with the GDPR, it is essential to initiate a process of anonymization of individual data<\/p>\n","protected":false},"author":5,"featured_media":13088,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113],"tags":[],"class_list":["post-5191","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Anonymization: best practices to put in place | ARCAD Software<\/title>\n<meta name=\"description\" content=\"In order to comply with the GDPR, it is essential to initiate a data anonymization process.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anonymization: best practices to put in place | ARCAD Software\" \/>\n<meta property=\"og:description\" content=\"In order to comply with the GDPR, it is essential to initiate a data anonymization process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T11:59:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T14:19:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"headline\":\"Anonymization: best practices to put in place\",\"datePublished\":\"2020-08-10T11:59:15+00:00\",\"dateModified\":\"2025-11-18T14:19:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/\"},\"wordCount\":3093,\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/\",\"name\":\"Anonymization: best practices to put in place | ARCAD Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg\",\"datePublished\":\"2020-08-10T11:59:15+00:00\",\"dateModified\":\"2025-11-18T14:19:55+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"description\":\"In order to comply with the GDPR, it is essential to initiate a data anonymization process.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/#primaryimage\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg\",\"contentUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg\",\"width\":940,\"height\":350,\"caption\":\"Anonymization Best Practices\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\",\"name\":\"Myriam Goutte\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Anonymization: best practices to put in place | ARCAD Software","description":"In order to comply with the GDPR, it is essential to initiate a data anonymization process.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/","og_locale":"en_US","og_type":"article","og_title":"Anonymization: best practices to put in place | ARCAD Software","og_description":"In order to comply with the GDPR, it is essential to initiate a data anonymization process.","og_url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2020-08-10T11:59:15+00:00","article_modified_time":"2025-11-18T14:19:55+00:00","og_image":[{"width":940,"height":350,"url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg","type":"image\/jpeg"}],"author":"Myriam Goutte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"headline":"Anonymization: best practices to put in place","datePublished":"2020-08-10T11:59:15+00:00","dateModified":"2025-11-18T14:19:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/"},"wordCount":3093,"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/","url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/","name":"Anonymization: best practices to put in place | ARCAD Software","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg","datePublished":"2020-08-10T11:59:15+00:00","dateModified":"2025-11-18T14:19:55+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"description":"In order to comply with the GDPR, it is essential to initiate a data anonymization process.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/anonymization-best-practices-to-put-in-place\/#primaryimage","url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg","contentUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2020\/08\/anonymization-best-practices.jpg","width":940,"height":350,"caption":"Anonymization Best Practices"},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2","name":"Myriam Goutte"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/5191","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/comments?post=5191"}],"version-history":[{"count":5,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/5191\/revisions"}],"predecessor-version":[{"id":13089,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/5191\/revisions\/13089"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media\/13088"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media?parent=5191"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/categories?post=5191"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/tags?post=5191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}