Skip to main content
Hi together,
In Celonis Snap it seems that the Anonymization & Pseudonymization feature is locked. Just out of interest, how exactly does the feature look like in the enterprise edition?
So it is possible to
a.) anonymize (not possible to trace back / recover), and
b.) pseudonymize e.g. with custom string or hash (possible to trace back / recover) ?
In particular I would like to know whether its possible to trace back information of pseudonymized columns.
Thank you in advance!
Best regards,
Daniel

Hi Daniel,

 

great question. Pseudonymization is done before it leaves your network. the data gets in the Event Collection

"Celonis has taken multiple efforts to ensure compliance with GDPR within its organization, providing you with the assurance that Celonis is a trustworthy processor of all your personal data: See link for details The possibility of anonymizing data and a comprehensive authorization concept allows us to protect private employee data. All personal data and other sensitive information like vendor names can be pseudonymized before leaving the customer network.All sensible data (i.e., SAP UserID) will be directly converted so the data conversion is not traceable. The pseudonymization process happens during data extraction in the customer system. Pseudonymization is executed with the Hash-Algorithm of SHA1/2 (or if desired, SHA 512) family and is considered safe according to state-of-the-art technology. As part of its privacy by design software setup, Celonis offers different levels of pseudonymization which can be adjusted according to Customer Choices:

  • Option 1: Pseudonymization is happening directly during data extraction.

  • Option 2: All personalized data will be pseudonymized in the database, making it available in the analyses only pseudonymized."

Find more on http://celonis.com/trust-center


Thanks @gabriel.okaba11 . Regarding Task Mining how this apply? We know that TM is collecting desktop data, as mouse clicks, copy and paste, and also (including) screenshots. We are facing many concerns from customers about how sensitive data is protect. For Process Mining it´s ok but Task MIning I still have some doubts.


Thanks @gabriel.okaba11 . Regarding Task Mining how this apply? We know that TM is collecting desktop data, as mouse clicks, copy and paste, and also (including) screenshots. We are facing many concerns from customers about how sensitive data is protect. For Process Mining it´s ok but Task MIning I still have some doubts.

Hi @ricardo.basso11 ,

you will find a detailed document in the Partner Portal. Go to Learn->Library and search for Task Mining. 1b)Task Mining Data Privacy

Best,

Gabriel


Reply