← Back to Skills
SecurityEngineeringPlatinum

Protect personal data while maintaining its usability for analysis.

Pseudonymisation Patterns Expert

GDPR, HIPAA, PCI DSS, Privacy Engineering

expertv5.0

Best for

  • GDPR Article 4(5) compliant pseudonymisation system architecture for customer analytics
  • Medical device HIPAA pseudonymisation with re-identification risk assessment
  • Financial services PCI DSS tokenization vault implementation with format-preserving encryption
  • Multi-jurisdiction data sharing with k-anonymity and l-diversity statistical disclosure control

What you'll get

  • Technical architecture diagram with tokenization vault, HMAC-SHA-256 pseudonym generation, and k≥5 anonymity validation for each data processing stage
  • Risk assessment matrix quantifying re-identification probability using Sweeney's k-anonymity model with specific mitigation controls
  • Implementation code patterns for AES-256 format-preserving encryption with NIST FF1/FF3-1 standards and key rotation procedures
Expects

Detailed data inventory with direct/quasi-identifiers, processing purposes, data flows, and specific regulatory requirements (GDPR, HIPAA, PCI DSS).

Returns

Complete technical architecture with pseudonymisation technique selection, implementation patterns, re-identification risk metrics, and regulatory compliance mapping.

What's inside

You are a Pseudonymisation Patterns Expert. You design and implement GDPR-compliant data pseudonymisation systems by combining privacy engineering, cryptographic security, database architecture, and regulatory compliance. - **Separate re-identification keys from pseudonymised data** as a non-negotia...

Covers

What You Do DifferentlyMethodologyWatch For
Not designed for ↓
  • ×Full data anonymisation (irreversible removal of all identifiers)
  • ×Generic encryption of data at rest or in transit without pseudonymisation patterns
  • ×Basic password hashing or salting for authentication systems
  • ×Legal interpretation of GDPR recitals or regulatory compliance advice

SupaScore

89.45
Research Quality (15%)
9.25
Prompt Engineering (25%)
8.85
Practical Utility (15%)
8.7
Completeness (10%)
9.4
User Satisfaction (20%)
8.9
Decision Usefulness (15%)
8.8

Evidence Policy

Standard: no explicit evidence policy.

pseudonymisationdata-privacygdprtokenizationencryptiondata-maskingk-anonymityre-identificationprivacy-engineeringdata-protection

Research Foundation: 7 sources (3 official docs, 2 paper, 1 academic, 1 industry frameworks)

This skill was developed through independent research and synthesis. SupaSkills is not affiliated with or endorsed by any cited author or organisation.

Version History

v5.03/25/2026

v5.5 distilled from v2 via Claude Sonnet

v2.02/26/2026

Pipeline v4: rebuilt with 3 helper skills

v1.0.02/16/2026

Initial release

Prerequisites

Use these skills first for best results.

Works well with

Need more depth?

Specialist skills that go deeper in areas this skill touches.

Common Workflows

Privacy-Compliant Analytics Pipeline

Map personal data inventory, implement pseudonymisation controls, then audit for regulatory compliance before production deployment

Data Catalog Architectpseudonymisation-patterns-expertGDPR Compliance Auditor

© 2026 Kill The Dragon GmbH. This skill and its system prompt are protected by copyright. Unauthorised redistribution is prohibited. Terms of Service · Legal Notice