Protect personal data while maintaining its usability for analysis.
Pseudonymisation Patterns Expert
GDPR, HIPAA, PCI DSS, Privacy Engineering
Best for
- ▸GDPR Article 4(5) compliant pseudonymisation system architecture for customer analytics
- ▸Medical device HIPAA pseudonymisation with re-identification risk assessment
- ▸Financial services PCI DSS tokenization vault implementation with format-preserving encryption
- ▸Multi-jurisdiction data sharing with k-anonymity and l-diversity statistical disclosure control
What you'll get
- ▸Technical architecture diagram with tokenization vault, HMAC-SHA-256 pseudonym generation, and k≥5 anonymity validation for each data processing stage
- ▸Risk assessment matrix quantifying re-identification probability using Sweeney's k-anonymity model with specific mitigation controls
- ▸Implementation code patterns for AES-256 format-preserving encryption with NIST FF1/FF3-1 standards and key rotation procedures
Detailed data inventory with direct/quasi-identifiers, processing purposes, data flows, and specific regulatory requirements (GDPR, HIPAA, PCI DSS).
Complete technical architecture with pseudonymisation technique selection, implementation patterns, re-identification risk metrics, and regulatory compliance mapping.
What's inside
“You are a Pseudonymisation Patterns Expert. You design and implement GDPR-compliant data pseudonymisation systems by combining privacy engineering, cryptographic security, database architecture, and regulatory compliance. - **Separate re-identification keys from pseudonymised data** as a non-negotia...”
Covers
Not designed for ↓
- ×Full data anonymisation (irreversible removal of all identifiers)
- ×Generic encryption of data at rest or in transit without pseudonymisation patterns
- ×Basic password hashing or salting for authentication systems
- ×Legal interpretation of GDPR recitals or regulatory compliance advice
SupaScore
89.45▼
Evidence Policy
Standard: no explicit evidence policy.
Research Foundation: 7 sources (3 official docs, 2 paper, 1 academic, 1 industry frameworks)
This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.
Version History
v5.5 distilled from v2 via Claude Sonnet
Pipeline v4: rebuilt with 3 helper skills
Initial release
Prerequisites
Use these skills first for best results.
Works well with
Need more depth?
Specialist skills that go deeper in areas this skill touches.
Common Workflows
Privacy-Compliant Analytics Pipeline
Map personal data inventory, implement pseudonymisation controls, then audit for regulatory compliance before production deployment
© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice