Anonymization vs Pseudonymization: What GDPR Actually Requires

The legal distinction that determines whether GDPR applies to your processed data.

Many organizations confuse anonymization with pseudonymization. The distinction matters enormously: anonymized data falls completely outside GDPR's scope, while pseudonymized data remains personal data subject to all GDPR obligations. Using the wrong method means either false compliance security or unnecessary regulatory burden.

Anonymization (Recital 26)
"Anonymous information, namely information which does not relate to an identified or identifiable natural person or to personal data rendered anonymous in such a manner that the data subject is not or no longer identifiable."

GDPR does not apply to anonymous information. The data subject cannot be re-identified. No lawful basis, no consent, no DPA required.
Pseudonymization (Art. 4(5))
"The processing of personal data in such a manner that the personal data can no longer be attributed to a specific data subject without the use of additional information, provided that such additional information is kept separately."

GDPR fully applies to pseudonymized data. Re-identification remains possible. Art. 6 lawful basis required.

The Re-identification Test

The decisive question under GDPR Recital 26 is whether re-identification is reasonably likely given available means, effort, and technology:

This means: encryption alone does not anonymize data. A decryption key exists. The data is pseudonymized. The same applies to tokenization, hashing with known salt values, and k-anonymity approaches that do not adequately address re-identification risk.

Practical Comparison

MethodReversible?GDPR Statusanonym.plus Operator
Replace with generic labelNoAnonymized — outside GDPR scopeReplace
Remove entirelyNoAnonymized — outside GDPR scopeRedact
SHA-256 hash (no salt)No (for most inputs)Effectively anonymous for complex values; risky for predictable inputs (e.g. phone numbers)Hash
Partial masking (***-***-1234)NoDepends — may be identifiable if combined with other dataMask
AES-256-GCM encryptionYes (with key)Pseudonymized — GDPR appliesEncrypt
Tokenization (lookup table)Yes (with table)Pseudonymized — GDPR appliesn/a

When to Use Anonymization vs Pseudonymization

Use anonymization (Replace / Redact / Hash) when:

Use pseudonymization (Encrypt) when:

What Anonymization Actually Unlocks Under GDPR

True anonymization provides significant practical compliance benefits:

Ready to achieve true anonymization? Read the GDPR anonymization guide →

Frequently Asked Questions

What is the difference between anonymization and pseudonymization under GDPR?

Anonymization makes re-identification effectively impossible — the data exits GDPR scope entirely (Recital 26). Pseudonymization replaces identifiers with codes but re-identification remains possible with additional information — the data stays within GDPR scope (Art. 4(5)).

Is encrypted data anonymized under GDPR?

No. Encrypted data is pseudonymized because a decryption key exists. True anonymization requires that re-identification be effectively impossible. Use Replace, Redact, or Hash operators for true GDPR anonymization.

What operators in anonym.plus produce true anonymization?

Replace (generic label substitution), Redact (removal), and Hash (SHA-256/SHA-512) produce anonymization. The Encrypt operator produces pseudonymization. Mask (partial hide) may or may not be sufficient depending on the remaining data's re-identification risk.

Does pseudonymized data still need a GDPR Data Processing Agreement?

Yes. Pseudonymized data is still personal data. If a processor handles it on your behalf, an Art. 28 DPA is required. Anonymized data does not require a DPA since it falls outside GDPR scope.