Announcing Agent Commander - The First Integrated solution from Veeam + Securiti.ai enabling the scaling of safe AI agents

View

When Does Pseudonymized Data Constitute Personal Data Under GDPR?

(EDPS v SRB)

Contributors

Aiman Kanwal

Assoc. Data Privacy Analyst at Securiti

Syed Tatheer Kazmi

Data Privacy Analyst

CIPP/Europe

Listen to the content

1. Introduction

On September 4, 2025, the Court of Justice of the European Union established binding principles on when pseudonymized data constitutes personal data under the GDPR. The ruling came in European Data Protection Supervisor v. Single Resolution Board (Case C-413/23 P). In September 2025, the CJEU partially set aside the General Court's decision and resolved the legal questions at issue. The Court remanded the case to the General Court for reconsideration. On December 19, 2025, the parties withdrew the matter from the General Court. Despite this withdrawal, the CJEU's legal determinations remain authoritative precedent, clarifying a question that has proven contentious in GDPR enforcement across member states.

The timing is particularly significant. The European Data Protection Board (EDPB) adopted its first comprehensive Pseudonymization Guidelines in January 2025, while the European Commission's Digital Omnibus proposal advances with provisions that would possibly codify the current ruling's pseudonymization principles and relativity approach to personal data into the GDPR itself. These developments will shape the framework for handling pseudonymised data in the future.

2. Background of the Case

The dispute originated from the Single Resolution Board's 2017 decision regarding the resolution of Banco Popular Español. The SRB initially made preliminary determinations about compensating creditors and shareholders without stakeholders'  input. Following criticism, the SRB established a mechanism for affected parties to submit comments on the valuation reports.

The SRB then transferred those comments to Deloitte in pseudonymized form for independent assessment of how the resolution affected stakeholders' interests. The European Data Protection Supervisor investigated the matter following complaints from stakeholders and, in 2020, found that the SRB had violated the GDPR on two grounds:

  1. The pseudonymized comments still constituted personal data, and
  2. The Stakeholders were not informed that their comments would be shared with a third party.

The SRB challenged this decision before the General Court, which in 2023 ruled in the SRB's favor. The General Court concluded that the data received by Deloitte did not constitute personal data because Deloitte lacked the means to re-identify individuals. The court also faulted the EDPS for failing to examine whether the content of the comments themselves revealed personal information.

The EDPS appealed to the CJEU, which in September 2025 partially overturned the General Court and established that pseudonymized data constitutes personal data depending on the specific recipient's ability to re-identify data subjects.

3. Reasoning of the Court

The CJEU addressed three central questions regarding pseudonymized data under the GDPR.

a. Personal Opinions Constitute Personal Data

The CJEU held that personal opinions are inherently personal data under the GDPR. The Court found that the General Court had erred by requiring the EDPS to examine whether the stakeholders' comments related to natural persons by their content, purpose, or effect. According to the CJEU, personal opinions or views, as expressions of a person's thinking, are necessarily closely linked to that person and therefore qualify as personal data without further analysis.

This principle builds on the Court's earlier reasoning in Nowak v. Data Protection Commissioner (Case C-434/16). In that case, the Court held that written answers on an exam script, along with comments and marks, constitute personal data relating to the candidate. Importantly, the Court extended this to hold that the examiner's comments also constitute personal data relating to the examiner, as they reflect that examiner's assessment and intellectual evaluation. Applying this same logic in the present case, the CJEU concluded that stakeholder comments on the SRB's valuation reports reflect those stakeholders' views and are therefore inherently personal data relating to the authors.

b. The Relative Nature of Pseudonymized Data

The CJEU established that pseudonymized data should not automatically be considered personal data in all cases and for every person. According to the Court, whether such data qualifies as personal data depends on the specific recipient's ability to re-identify individuals. Where pseudonymization effectively prevents recipients other than the original controller from identifying data subjects, the data subject is not or is no longer identifiable for those recipients.

The Court clarified that the test turns on whether the specific recipient has "means reasonably likely to be used" to identify individuals. In applying this test, the Court referenced Recital 26 of the GDPR, which provides that identifiability should account for all objective factors, including costs, time required, and available technology.

c. Transparency Obligations at the Point of Collection

The CJEU clarified that controllers must assess identifiability and fulfill transparency obligations at the moment of data collection, from the controller's own perspective. The Court rejected the General Court's approach, which had assessed identifiability from the recipient's viewpoint when evaluating obligations of disclosing the recipient under Article 15(1)(d) of Regulation 2018/1725.

The General Court had asked the wrong question: Can Deloitte identify individuals from the pseudonymized data it received? The correct question, according to the CJEU, is: Could the SRB identify individuals when it collected their comments? Since the SRB could identify stakeholders at collection, it had a duty to inform them that their data would be shared with Deloitte. This duty existed regardless of the subsequent pseudonymization.

4. Implications for Organizations

The CJEU's three core principles create specific compliance obligations for organizations using pseudonymization.

  1. Organizations must recognize that personal opinions constitute personal data regardless of pseudonymization. This applies to employee surveys, customer feedback, stakeholder consultations, and similar contexts where individuals express subjective views. Organizations cannot avoid GDPR obligations by removing direct identifiers from opinion data.
  2. Organizations must inform data subjects about third-party recipients at the point of data collection, evaluated from the controller's perspective. If the controller can identify data subjects at collection, the duty to inform arises before pseudonymization or transfer occurs. Organizations cannot defer or avoid this obligation by arguing that data becomes non-personal after pseudonymization for recipients.
  3. Organizations must assess pseudonymization effectiveness from each recipient's perspective. Whether pseudonymized data constitutes personal data depends on the specific recipient's ability to re-identify individuals. What constitutes personal data for the transferring organization may differ from what constitutes personal data for recipients.

To implement these principles effectively, legal analysts recommend several practical measures. Organizations should conduct context-specific assessments of whether their pseudonymization techniques effectively prevent reidentification, given who will access the data, what other information recipients possess, and what technical capabilities they have. Organizations should document their pseudonymization methods and the rationale for determining whether data remains personal data for specific recipients.

5. Conclusion

The CJEU's judgment in European Data Protection Supervisor v. Single Resolution Board settles a longstanding question in EU data protection law by establishing the definitive framework for evaluating pseudonymized data. The ruling's relativity principle directly informs the European Commission's Digital Omnibus proposal, which seeks to codify this approach by amending the GDPR's definition of personal data.

Despite the withdrawal at the General Court level, the CJEU's legal determinations remain authoritative precedent. Organizations that implement these principles will be better positioned to use pseudonymization effectively while maintaining GDPR compliance.

Analyze this article with AI

Prompts open in third-party AI tools.
Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox


Share

More Stories that May Interest You
Videos
View More
Rehan Jalil, Veeam on Agent Commander : theCUBE + NYSE Wired: Cyber Security Leaders
Following Veeam’s acquisition of Securiti, the launch of Agent Commander marks an important step toward helping enterprises adopt AI agents with greater confidence. In...
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...

Spotlight Talks

Spotlight
Future-Proofing for the Privacy Professional
Watch Now View
Spotlight 50:52
From Data to Deployment: Safeguarding Enterprise AI with Security and Governance
Watch Now View
Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Latest
View More
Building Sovereign AI with HPE Private Cloud AI and Veeam Securiti Gencore AI
How HPE Private Cloud AI, NVIDIA acceleration, and Veeam Securiti Gencore AI support secure, governed enterprise AI with policy enforcement across RAG, assistant, and agentic workflows.
View More
Securiti.ai Names Accenture as 2025 Partner of the Year
In a continued celebration of impactful collaboration in DataAI Security, Securiti.ai, a Veeam company, has honored Accenture as its 2025 Partner of the Year....
Largest Fine In CCPA History_ What The Latest CCPA Enforcement Action Teaches Businesses View More
Largest Fine In CCPA History: What The Latest CCPA Enforcement Action Teaches Businesses
Businesses can take some vital lessons from the recent biggest enforcement action in CCPA history. Securiti’s blog covers all the important details to know.
View More
AI & HIPAA: What It Means and How to Automate Compliance
Explore how the Health Insurance Portability and Accountability Act (HIPAA) applies to Artificial Intelligence (AI) in securing Protected Health Information (PHI). Learn how to...
View More
Minimize What You Expose: Privacy Guardrails for AI Agents and Copilots
Minimize data exposure in AI agents and copilots. Apply privacy guardrails like data minimization, access controls, masking, and policy enforcement to prevent leakage and...
View More
From Data Visibility to AI Velocity
Access the whitepaper and discover how unified DataAI security turns data governance into a business enabler, boosting AI innovation with visibility, compliance, and risk...
View More
Agent Commander: Solution Brief
Learn how Agent Commander detects AI agents, protects enterprise data with runtime guardrails, and undoes AI errors - enabling secure, compliant AI adoption at...
Compliance with CCPA Amendments with Securiti View More
Compliance with CCPA Amendments with Securiti
Stay compliant with 2026 CCPA amendments using Securiti, covering updated consent requirements, expanded sensitive data definitions, enhanced consumer rights, and readiness assessments.
View More
Take the Data Risk Out of AI
Learn how to prepare enterprise data for safe Gemini Enterprise adoption with upstream governance, sensitive data discovery, and pre-index policy controls.
View More
Navigating HITRUST: A Guide to Certification
Securiti's eBook is a practical guide to HITRUST certification, covering everything from choosing i1 vs r2 and scope systems to managing CAPs & planning...
What's
New