Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization

The topic of pseudonymization of personal data has shown, that theoretical and methodological basics in sphere of automatized systems have just started to gain general trend. The majority of studies in this sphere are, commonly, about personal data in general, rarely touching the topic of pseudonymi...

Full description

Bibliographic Details
Main Authors: Gazizov Andrey, Gazizov Evgeny, Gazizova Svetlana
Format: Article
Language:English
Published: EDP Sciences 2020-01-01
Series:E3S Web of Conferences
Online Access:https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/70/e3sconf_itse2020_11001.pdf
id doaj-239159d304904a8384b52dfab8a042e7
record_format Article
spelling doaj-239159d304904a8384b52dfab8a042e72021-04-02T16:19:55ZengEDP SciencesE3S Web of Conferences2267-12422020-01-012101100110.1051/e3sconf/202021011001e3sconf_itse2020_11001Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymizationGazizov Andrey0Gazizov Evgeny1Gazizova Svetlana2Don State Technical UniversityKazan state agrarian UniversityKazan (Volga region) Federal UniversityThe topic of pseudonymization of personal data has shown, that theoretical and methodological basics in sphere of automatized systems have just started to gain general trend. The majority of studies in this sphere are, commonly, about personal data in general, rarely touching the topic of pseudonymization and depersonalization. Therefore, the topic of pseudonymization has not fully assimilated in enterprise systems and has not grown any popularity, because enterprises tend to choose reliable tools and methods of information security while depersonalization is only beginning its way and is not common for big corporations. This leads to disinterestedness in solving known issues and goals of pseudonymization, universal methods have not been researched. However, low cost and simplicity of this method of personal data protection is turning our attention on it and ask ourselves a question: “Should we have a deep dive in it?”. Answer is obvious – yes. Certainly, this method has its disadvantages and it is not an ideal solution. But it certainly should be distributed worldwide.https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/70/e3sconf_itse2020_11001.pdf
collection DOAJ
language English
format Article
sources DOAJ
author Gazizov Andrey
Gazizov Evgeny
Gazizova Svetlana
spellingShingle Gazizov Andrey
Gazizov Evgeny
Gazizova Svetlana
Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization
E3S Web of Conferences
author_facet Gazizov Andrey
Gazizov Evgeny
Gazizova Svetlana
author_sort Gazizov Andrey
title Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization
title_short Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization
title_full Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization
title_fullStr Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization
title_full_unstemmed Theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization
title_sort theoretical aspects of the protection of personal data of employees of the enterprise by the method of pseudonymization
publisher EDP Sciences
series E3S Web of Conferences
issn 2267-1242
publishDate 2020-01-01
description The topic of pseudonymization of personal data has shown, that theoretical and methodological basics in sphere of automatized systems have just started to gain general trend. The majority of studies in this sphere are, commonly, about personal data in general, rarely touching the topic of pseudonymization and depersonalization. Therefore, the topic of pseudonymization has not fully assimilated in enterprise systems and has not grown any popularity, because enterprises tend to choose reliable tools and methods of information security while depersonalization is only beginning its way and is not common for big corporations. This leads to disinterestedness in solving known issues and goals of pseudonymization, universal methods have not been researched. However, low cost and simplicity of this method of personal data protection is turning our attention on it and ask ourselves a question: “Should we have a deep dive in it?”. Answer is obvious – yes. Certainly, this method has its disadvantages and it is not an ideal solution. But it certainly should be distributed worldwide.
url https://www.e3s-conferences.org/articles/e3sconf/pdf/2020/70/e3sconf_itse2020_11001.pdf
work_keys_str_mv AT gazizovandrey theoreticalaspectsoftheprotectionofpersonaldataofemployeesoftheenterprisebythemethodofpseudonymization
AT gazizovevgeny theoreticalaspectsoftheprotectionofpersonaldataofemployeesoftheenterprisebythemethodofpseudonymization
AT gazizovasvetlana theoreticalaspectsoftheprotectionofpersonaldataofemployeesoftheenterprisebythemethodofpseudonymization
_version_ 1721556984367415296