The processing of identifiable research data must be systematic and careful. The privacy of research subjects must not be compromised, for example, by careless storage of data or unprotected electronic transfers.
 
General safeguards for the processing of personal data include pseudonymization, anonymization, and storage restrictions.
Pseudonymisation
	- Pseudonymisation is the removal or replacement of identifiable information in data with cover information or codes, which are then stored separately from the data in organisational and technical terms. Organizational measures refer to a secure physical environment for the data and administratively restricted and monitored access rights. Technical measures refer to secure storage solutions. Pseudonymous data becomes anonymous when the separately stored identifying information (code key, personal data, and information on how the modified values were formed) is destroyed.
Anonymisation
	- There is no such thing as completely anonymous data. However, anonymisation can be used to achieve a result where individual persons cannot be identified on the basis of the data provided or by combining the data with other information. The data is therefore anonymous if it can no longer be linked to the original personal data by reasonable means.
	- There is no ready-made procedure for anonymising research data that is suitable for all data. Anonymisation must always be planned on a case-by-case basis, taking into account the characteristics of the data (age, sensitivity, size of the respondent group, detail of the content), the operating environment (who uses the data and where, what external information is currently available, physical storage)  and usability (how anonymity and usability can be combined so that the data is usable for research purposes after anonymization).
	- The following questions can be used to understand the anonymization process in both quantitative and qualitative data:
	
		- What direct or indirect identifiers does the data contain?
- Does the data contain unique or rare observations?
- What combinations of data could make a person identifiable?
- Is there any external data available that could be combined with the data in such a way that the observations/research subjects could be identified?
- Consider how the data will be used and which characteristics of the data you want to preserve and which can be "sacrificed" in the anonymization process.
 
Restricting storage:
	- Personal data that is not necessary for conducting the research is deleted as soon as possible. For example, names, addresses, and similar identifiers needed during the data collection phase are destroyed as soon as they are no longer necessary for the research. Similarly, personal identification numbers needed for linking data can be destroyed when they are no longer needed.