Anonymization vs. pseudonymization

Anonymization vs. pseudonymization: the difference

In the context of data protection, anonymization and pseudonymization are often equated. In fact, these are two fundamentally different concepts, each with their own legal and practical consequences.

Anonymize texts and documents

Why the distinction between anonymization and pseudonymization matters

Choosing the right method has a direct impact on whether or not data continues to fall under the GDPR. Miscalculations can lead to significant data protection risks.

Legal situation

Personal reference determines the applicability of the GDPR

Anonymized data are no longer considered personal data, as the identification of the data subject is no longer possible. Pseudonymized data, by contrast, remain personal data because re-identification is still possible through additional information and therefore continue to be subject to all GDPR requirements.

Risk

Incorrect classification increases liability and audit costs

When pseudonymization is equated with anonymization, essential protective measures, documentation duties, and legal bases may be underestimated, creating potential compliance risks.

What is anonymization?

Anonymization aims to completely and permanently remove the personal reference from data.

When is data considered anonymous?

Data is only considered anonymous if it are permanently outside of any identifiability. This means that neither individual characteristics nor their combinations may make it possible to assign them to a person. The decisive factor is whether re-identification is ruled out under realistic conditions — even in the case of additional knowledge or further technical processing.

Legal classification of anonymized data

If data is effectively anonymized, it loses its personal character. It therefore no longer falls under the provisions of the GDPR. Obligations such as purpose limitation, storage limitation, and data subject rights only apply as long as a link to a specific person exists. However, this requires that the anonymization is technically robust and permanently effective.

Grafik zeigt die Anonymisierung ohne Token-Tabelle, bei der keine Rückführung der Daten möglich ist
Grafik zeigt die Pseudonymisierung mit Token-Tabelle zur kontrollierten Rückführung anonymisierter Daten

What is pseudonymization?

Pseudonymization replaces identifying attributes with identifiers or placeholders, but does not fully remove the link to an individual. In principle, re-identification remains possible as long as additional information is available. In practice, this is often achieved through a so-called mapping table, in which the identifiers used are linked to the original identifiers, enabling re-identification.

A typical example of such pseudonymization is shown in the illustration, where original identifiers are replaced with neutral values without fully anonymizing the underlying data structure.

Pseudonymization as a security measure

Within the GDPR, pseudonymization is a recommended measure to reduce risks. It simplifies data handling but does not replace a legal basis.

Why pseudonymized data is still personal

In principle, re-identification remains possible, for example via keys, additional data or organizational access. As a result, all GDPR requirements continue to apply.

Direct comparison of anonymization and pseudonymization

The two concepts differ in objective, risk and legal effect.

Aim

Re-identifiability

Anonymization completely removes the personal reference. Pseudonymization reduces it, but generally allows reassignment.

Law

GDPR applicability

Anonymized data falls outside the scope of the GDPR. Pseudonymized data remains personal and must continue to be protected, documented and legally justified.

Practice

Typical areas of application

Anonymization is used for transfer, evaluation or archiving. Pseudonymization is suitable for internal analyses and processes with limited access.

Which method is appropriate in which situation?

The decision depends heavily on the respective use case, the purpose of data processing and the legal requirements.

Anonymization

Anonymization during transfer and evaluation

As soon as data is to be passed on to third parties or evaluated over a longer period of time, complete anonymization is crucial in order to reliably comply with data protection obligations and to exclude any continuing personal reference.

Pseudonymization

Pseudonymization during internal processing

For internal processes, test environments, or analyses with restricted access, pseudonymization can reduce the risk of unauthorized identification of individuals without completely eliminating the business data reference.

Grafik zeigt, dass optische Schwärzung personenbezogene Daten nicht vollständig entfernt und Informationen im Quellcode weiterhin enthalten sein können

Common misconceptions in practice

Many companies overestimate the protective effect of pseudonymization or implement anonymization incorrectly.

1st myth

Pseudonymization = anonymization

The exchange of names or identifiers does not result in anonymity. Pseudonymized data remains personal and continues to require compliance with all data protection requirements.

2nd myth

Optical redaction replaces anonymization

Visual redaction often doesn't remove data from the file. Re-identification remains possible without technical adjustment.

Anonymization vs. pseudonymization — the next step

Explore specific questions in more detail or examine which formats and use cases are relevant for your company. We would be happy to assist you with an individual assessment.

Further information

Document types & formats

Overview of formats, risks and appropriate anonymization channels.

Anonymize large amounts of data

Classification of risks and requirements for large amounts of data.

Further steps

Would you like to learn more about use cases, document types or the use of Project A? Get in touch with us — we will give you individual advice and show you the appropriate next steps.

Receive an offer
When you go to “Accept all” click, you agree to the storage of cookies on your device to improve navigation and support our marketing efforts. For more information, see our privacy policy.

Publications

Experiences, insights and more

Career portal

Vacancies

Project A

Anonymize texts and files

RESA

Transferring data to your SAP system