{"id":9196,"date":"2016-03-22T15:52:03","date_gmt":"2016-03-22T19:52:03","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=9196"},"modified":"2026-02-23T15:02:22","modified_gmt":"2026-02-23T20:02:22","slug":"consistent-cross-table-data-pseudonymization","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/","title":{"rendered":"Consistent Pseudonyms for Databases"},"content":{"rendered":"<p style=\"font-weight: bold; text-align: left;\"><strong><em>Applying a Pseudonym Rule in the IRI Workbench GUI for FieldShield or Voracity<\/em><\/strong><\/p>\n<p>To create pseudonym values that will be consistent across tables &#8212; and keep up with changing data in those tables &#8212; the <a href=\"http:\/\/www.iri.com\/products\/workbench\" target=\"_blank\" rel=\"noopener\">IRI Workbench<\/a>\u00a0GUI for <a href=\"http:\/\/www.iri.com\/products\/fieldshield\" target=\"_blank\" rel=\"noopener\">FieldShield<\/a> and <a href=\"http:\/\/www.iri.com\/products\/voracity\" target=\"_blank\" rel=\"noopener\">Voracity<\/a> offers a few methods. The most recent, as of 2024, includes a new rule for self-updating consistent pseudonyms using a hash table. Please see <a href=\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-self-updating-and-secure-pseudonymization\/\">this article<\/a> to learn more about the rule, and the wizard for creating the hash table.<\/p>\n<p>Alternatively, you can assure consistent pseudonym replacements through an older method, as explained in this article &#8212; a Flow Diagram Palette item for <a href=\"http:\/\/www.iri.com\/solutions\/data-masking\/de-identification\/pseudonymize\" target=\"_blank\" rel=\"noopener\">pseudonymization<\/a> in IRI Workbench. Adding this item creates a centralized pseudonym file (and optionally, a restore set) by shuffling all the chosen source column values that exist when the flow executes.<\/p>\n<p>Previously, you had to use the wizard to create a new pseudo set file every time you made changes to your data.\u00a0<span style=\"font-weight: 400;\">Now, the core set file will be current (since it is made seconds before being applied) and also contains no duplicates. Therefore, any field with that set file applied to it will be replaced with the same value. For instance, John Smith is always replaced by Mike Jones. <\/span><\/p>\n<p style=\"font-weight: bold;\"><span style=\"font-weight: bold;\"><span style=\"font-weight: bold;\">Sample\u00a0Sources<\/span><\/span><\/p>\n<p>Per the image below, two tables are being used (CHIEFS and CUSTOMERS_FLOW) as the sources of my pseudo set file. The CHIEFS table contains information about US Presidents, while the CUSTOMERS_FLOW table contains information on customers. Although this is not necessary, the set file will be applied back to these two tables.<\/p>\n<p><a title=\"Consistent, Cross-Table Data Pseudonymization - Claudia Irvine 0.jpg\" href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-0.jpg\" rel=\"prettyPhoto\"><img decoding=\"async\" style=\"width: 624px; height: 430px;\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-0.jpg\" alt=\"\" \/><\/a><\/p>\n<p>The pseudo flow block will be added to the flow diagram. The output of the two Transform Mapping Blocks (TMB) were designated as flat files to ease the display of results.<\/p>\n<p><span style=\"font-weight: bold;\"><span style=\"font-weight: bold;\">Define the Pseudo Set<\/span><\/span><\/p>\n<p>To use the Pseudo block, drag it from the Utilities section of the palette and place it before your TMBs. This allows you to use that new set file in any following blocks. Upon dropping the Pseudo block, a wizard will start by asking you if you also want to create a restore set. In this particular example, the answer is yes.<span style=\"line-height: 1.5;\">\u00a0<\/span><\/p>\n<p>The wizard page allows you to select the tables and columns that you want to use for your set file. You can select any number of columns from any number of tables in a single database. In this case, a field called PRESIDENT from the CHIEFS table is used, along with the field NAME from CUSTOMERS_FLOW.<span style=\"line-height: 1.5;\">\u00a0<\/span><\/p>\n<p><a title=\"Consistent, Cross-Table Data Pseudonymization - Claudia Irvine 1.jpg\" href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-1.jpg\" rel=\"prettyPhoto\"><img decoding=\"async\" style=\"width: 624px; height: 438px;\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-1.jpg\" alt=\"\" \/><\/a><\/p>\n<p>After clicking finish, a Pseudo block is displayed in the flow diagram showing the inputs and outputs. Select any of those items in the block to see their details in the properties screen. You can edit the block by double-clicking it, and changing the info using the same screen as above.<\/p>\n<p><a title=\"Consistent, Cross-Table Data Pseudonymization - Claudia Irvine 2.jpg\" href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-2.jpg\" rel=\"prettyPhoto\"><img decoding=\"async\" style=\"width: 624px; height: 430px;\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-2.jpg\" alt=\"\" \/><\/a><\/p>\n<p style=\"font-weight: bold;\"><span style=\"font-weight: bold;\"><span style=\"font-weight: bold;\">Apply the Pseudo Set<\/span><\/span><\/p>\n<p>You will need to copy the file name of the set you will be using since it does not yet exist (but is merely planned at this point). Open the TMBs of the fields that will use the set file. When you double-click on the field you want to pseudonymize, then the Target Field (column) Editor dialog appears.<\/p>\n<p>As you see in the screen below, the work is being done in the \u201cValue\u201d tab since a pseudonym will modify the output column values. This tab is used, as opposed to the Pseudonymize and Restore tab next to it, because that tab is used for static data, not dynamic.<\/p>\n<p>In the Transformation Type combo box, select \u201cSet: File\u201d to specify that a lookup (pseudonym) value will be used. Using the \u201cBrowse\u201d button, navigate to the project folder containing your flow. Then, paste the name of the set file into the File name box and click Finish. Using the \u201cLook-up Value\u201d button, add the field where you will be replacing values.<span style=\"line-height: 1.5;\">\u00a0<\/span><\/p>\n<p>A default value was also added in case a replacement value is not found. This doesn\u2019t apply to the current data, since the source of the set and the source of the changed value are the same. However, it is important when using a set that was populated from another source.<\/p>\n<p>It is also important to change the Field Name to distinguish it from the original field. This avoids confusion between the original and derived values, and supports data lineage efforts by exposing and labeling the changes in values. Repeat this renaming procedure for all the fields being pseudonymized.<\/p>\n<p>The newPRESIDENT field now has a different colored mapping connection and a new icon to show it is a derived field. You can also see the set file in the Field Attributes section. On a side-note, the original PRESIDENT field was left there, and any unnecessary fields were removed to better show the replacement output.<\/p>\n<p><a title=\"Consistent, Cross-Table Data Pseudonymization - Claudia Irvine 3.jpg\" href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-3.jpg\" rel=\"prettyPhoto\"><img decoding=\"async\" style=\"width: 624px; height: 430px;\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-3.jpg\" alt=\"\" \/><\/a><\/p>\n<p><span style=\"font-weight: bold;\"><span style=\"font-weight: bold;\">Run the Job<\/span><\/span><\/p>\n<p>Close the TMB and add connections between the Start block, Pseudo block, and TMBs so that all these blocks are executed. When you are ready to execute the flow, click the white background of the Flow diagram, select IRI Diagram Actions, and Export Flow Component. Enter information on location, name, and Platform on this screen.<span style=\"line-height: 1.5;\">\u00a0<\/span><\/p>\n<p>Clicking Finish will create the scripts and batch file (when using Windows). You can then run the batch file to pseudonymize the PRESIDENT and NAME fields to produce the outputs below.<\/p>\n<p><a title=\"Consistent, Cross-Table Data Pseudonymization - Claudia Irvine 4.jpg\" href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-4.jpg\" rel=\"prettyPhoto\"><img decoding=\"async\" style=\"width: 624px; height: 430px;\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-4.jpg\" alt=\"\" \/><\/a><\/p>\n<p>The pseudo set file is shown at the top and indicates that any field with the value of \u201cBush, George H.W.\u201d will be replaced with \u201cWilson, Woodrow\u201d and \u201cButcher, Martin\u201d replaced with \u201cDobos, Cristina.\u201d These replacement values are seen in the side-by-side screens comparing the two files.<\/p>\n<p>In the future, you can simply re-export and run the batch file each time your data changes, without having to further modify the flow file.<\/p>\n<p><strong>Closing Note<\/strong>: <em>This article covered one of the ways to pseudonymize data in SQL environments using an older method in the IRI FieldShield data masking tool &#8230; which continues to support functions like PII pseudonymization for data security. You can learn more about modern pseudonymization rules, as well as larger concepts around various data masking vs. pseudonymization functions in <a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\">this<\/a> section of the IRI website.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Applying a Pseudonym Rule in the IRI Workbench GUI for FieldShield or Voracity To create pseudonym values that will be consistent across tables &#8212; and keep up with changing data in those tables &#8212; the IRI Workbench\u00a0GUI for FieldShield and Voracity offers a few methods. The most recent, as of 2024, includes a new rule<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/\" title=\"Consistent Pseudonyms for Databases\">Read More<\/a><\/div>\n","protected":false},"author":43,"featured_media":9205,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,91,2255],"tags":[1007,2072,71,1005,92,520,789,850,2073,1004,22,1006,941],"class_list":["post-9196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-iri-workbench","category-archived-articles","tag-cross-table-data","tag-data-masking-vs-pseudonymization","tag-eclipse","tag-flow-diagram","tag-gui","tag-iri-fieldshield","tag-iri-voracity","tag-iri-workbench","tag-pii-pseudonymization","tag-pseudonym-rule","tag-pseudonymization","tag-tmb","tag-transform-mapping-block"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Consistent Pseudonyms for Databases - IRI<\/title>\n<meta name=\"description\" content=\"Learn how to apply a pseudonym rule in the IRI FieldShield GUI for consistent and secure data pseudonymization in SQL database environments.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Consistent Pseudonyms for Databases\" \/>\n<meta property=\"og:description\" content=\"Learn how to apply a pseudonym rule in the IRI FieldShield GUI for consistent and secure data pseudonymization in SQL database environments.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-22T19:52:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-23T20:02:22+00:00\" \/>\n<meta name=\"author\" content=\"Claudia Irvine\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Claudia Irvine\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/\"},\"author\":{\"name\":\"Claudia Irvine\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0\"},\"headline\":\"Consistent Pseudonyms for Databases\",\"datePublished\":\"2016-03-22T19:52:03+00:00\",\"dateModified\":\"2026-02-23T20:02:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/\"},\"wordCount\":1024,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-3.jpg\",\"keywords\":[\"cross-table data\",\"data masking vs. pseudonymization\",\"Eclipse\",\"flow diagram\",\"GUI\",\"IRI FieldShield\",\"IRI Voracity\",\"IRI Workbench\",\"PII pseudonymization\",\"pseudonym rule\",\"pseudonymization\",\"TMB\",\"transform mapping block\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Workbench\",\"Archived Articles\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/\",\"name\":\"Consistent Pseudonyms for Databases - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-3.jpg\",\"datePublished\":\"2016-03-22T19:52:03+00:00\",\"dateModified\":\"2026-02-23T20:02:22+00:00\",\"description\":\"Learn how to apply a pseudonym rule in the IRI FieldShield GUI for consistent and secure data pseudonymization in SQL database environments.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-3.jpg\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-3.jpg\",\"width\":624,\"height\":430},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Consistent Pseudonyms for Databases\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0\",\"name\":\"Claudia Irvine\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g\",\"caption\":\"Claudia Irvine\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/claudiai\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Consistent Pseudonyms for Databases - IRI","description":"Learn how to apply a pseudonym rule in the IRI FieldShield GUI for consistent and secure data pseudonymization in SQL database environments.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/","og_locale":"en_US","og_type":"article","og_title":"Consistent Pseudonyms for Databases","og_description":"Learn how to apply a pseudonym rule in the IRI FieldShield GUI for consistent and secure data pseudonymization in SQL database environments.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/","og_site_name":"IRI","article_published_time":"2016-03-22T19:52:03+00:00","article_modified_time":"2026-02-23T20:02:22+00:00","author":"Claudia Irvine","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Claudia Irvine","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/"},"author":{"name":"Claudia Irvine","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0"},"headline":"Consistent Pseudonyms for Databases","datePublished":"2016-03-22T19:52:03+00:00","dateModified":"2026-02-23T20:02:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/"},"wordCount":1024,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-3.jpg","keywords":["cross-table data","data masking vs. pseudonymization","Eclipse","flow diagram","GUI","IRI FieldShield","IRI Voracity","IRI Workbench","PII pseudonymization","pseudonym rule","pseudonymization","TMB","transform mapping block"],"articleSection":["Data Masking\/Protection","IRI Workbench","Archived Articles"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/","name":"Consistent Pseudonyms for Databases - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-3.jpg","datePublished":"2016-03-22T19:52:03+00:00","dateModified":"2026-02-23T20:02:22+00:00","description":"Learn how to apply a pseudonym rule in the IRI FieldShield GUI for consistent and secure data pseudonymization in SQL database environments.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-3.jpg","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-3.jpg","width":624,"height":430},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/consistent-cross-table-data-pseudonymization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Consistent Pseudonyms for Databases"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/72af50bbb317610e193e96392081f9b0","name":"Claudia Irvine","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fb33dee44756bd13ac23f1342c2bb7b2?s=96&d=blank&r=g","caption":"Claudia Irvine"},"url":"https:\/\/www.iri.com\/blog\/author\/claudiai\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/03\/t_Consistent-Cross-Table-Data-Pseudonymization-Claudia-Irvine-3.jpg","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9196"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=9196"}],"version-history":[{"count":19,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9196\/revisions"}],"predecessor-version":[{"id":18336,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9196\/revisions\/18336"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/9205"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=9196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=9196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=9196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}