Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

For each piece of PI/PII data, generate a mapping in a table of that piece to a secure random number, and store the generated random number in place of the personal data, and use that in the log.

Then, if deletion is required, simply erase the row that holds the mapping.

And finally, be sure to not store that mapping table in the same place as your backups or your logs.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: