← Back to Skills

Pseudonymisation Patterns Expert

Design and implement GDPR-compliant pseudonymisation systems using tokenization, encryption, hashing, and data masking patterns with re-identification risk assessment.

Gold
v1.0.00 activationsSecurityEngineeringexpert

SupaScore

83.5
Research Quality (15%)
8.5
Prompt Engineering (25%)
8.4
Practical Utility (15%)
8.3
Completeness (10%)
8.3
User Satisfaction (20%)
8.2
Decision Usefulness (15%)
8.4

Best for

  • GDPR Article 4(5) compliant pseudonymisation system architecture for customer analytics
  • Medical device HIPAA pseudonymisation with re-identification risk assessment
  • Financial services PCI DSS tokenization vault implementation with format-preserving encryption
  • Multi-jurisdiction data sharing with k-anonymity and l-diversity statistical disclosure control
  • Cross-border clinical trial data pseudonymisation meeting EMA and FDA requirements

What you'll get

  • Technical architecture diagram with tokenization vault, HMAC-SHA-256 pseudonym generation, and k≥5 anonymity validation for each data processing stage
  • Risk assessment matrix quantifying re-identification probability using Sweeney's k-anonymity model with specific mitigation controls
  • Implementation code patterns for AES-256 format-preserving encryption with NIST FF1/FF3-1 standards and key rotation procedures
Not designed for ↓
  • ×Full data anonymisation (irreversible removal of all identifiers)
  • ×Generic encryption of data at rest or in transit without pseudonymisation patterns
  • ×Basic password hashing or salting for authentication systems
  • ×Legal interpretation of GDPR recitals or regulatory compliance advice
Expects

Detailed data inventory with direct/quasi-identifiers, processing purposes, data flows, and specific regulatory requirements (GDPR, HIPAA, PCI DSS).

Returns

Complete technical architecture with pseudonymisation technique selection, implementation patterns, re-identification risk metrics, and regulatory compliance mapping.

Evidence Policy

Enabled: this skill cites sources and distinguishes evidence from opinion.

pseudonymisationdata-privacygdprtokenizationencryptiondata-maskingk-anonymityre-identificationprivacy-engineeringdata-protection

Research Foundation: 7 sources (3 official docs, 2 paper, 1 academic, 1 industry frameworks)

This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.

Version History

v1.0.02/16/2026

Initial release

Prerequisites

Use these skills first for best results.

Works well with

Need more depth?

Specialist skills that go deeper in areas this skill touches.

Common Workflows

Privacy-Compliant Analytics Pipeline

Map personal data inventory, implement pseudonymisation controls, then audit for regulatory compliance before production deployment

Data Catalog Architectpseudonymisation-patterns-expertGDPR Compliance Auditor

Activate this skill in Claude Code

Sign up for free to access the full system prompt via REST API or MCP.

Start Free to Activate This Skill

© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice