Table of Contents


Anonymizing Users

Administrators can anonymize inactive users' personal data to comply with privacy regulations such as GDPR. This process permanently removes or sanitizes personal information while preserving necessary system functionality.

Understanding User Anonymization

What is User Anonymization?

User anonymization is a permanent data protection process that:

  • Removes or replaces personal identifying information
  • Maintains system integrity by preserving non-personal data relationships
  • Ensures compliance with privacy regulations like GDPR
  • Cannot be reversed once completed

When to Use Anonymization

  • Privacy Compliance: GDPR or other privacy regulation requirements
  • User Requests: Data subject requests for data deletion
  • Account Cleanup: Removing inactive users while preserving historical records
  • Data Minimization: Reducing stored personal data for security purposes

Important Prerequisites

User Status Requirements

  • Users must be inactive before anonymization
  • Active users cannot be anonymized (system protection)
  • Deactivate users first if they are currently active

Impact on License Management

  • Anonymized users are automatically deactivated
  • Deactivation frees up license allocation for new users
  • Cannot reactivate anonymized users - new accounts must be created if access is needed again

Data Sanitization Process

Personal Data Removed or Changed

The following personal information is permanently sanitized:

Identity Information

  • Name: Changed to "Deleted User"
  • Username: Sanitized to remove identifying information
  • Email: Removed or sanitized
  • IP Address: Historical IP addresses removed

Profile and Social Data

  • User profile information
  • Social profile data
  • Personal preferences and settings

Activity and Engagement Data

  • Following relationships and followers
  • Personal tasks and assignments
  • Private messages and communications
  • Personal reports and analytics
  • Course assignments and progress
  • Private applications and customizations

Permissions and Access

  • Removed from sharing permissions
  • Removed from User Groups (security groups)
  • Removed from subscriptions and notifications
  • Removed from social groups and communities
  • Removed from follow lists and networking connections

Data Preserved

Certain non-personal data may be retained to maintain system integrity:

  • Anonymous activity records for reporting purposes
  • Non-identifying system logs
  • Historical records without personal attribution

Requirements

To anonymize users, you must have:

  • Administrator System Role permissions
  • Target user must be in inactive status

Anonymization Process

Step-by-Step Instructions

  1. Navigate to the Setup Home page
  2. Click Security > Manage Users
  3. Select the All Records list view to show both active and inactive users
  4. Click on the inactive user you want to anonymize
  5. Click More Actions > Anonymize
  6. Review the anonymization warning and confirm you understand the permanent nature
  7. Click Anonymize User

Process Completion

  • Anonymization is processed immediately
  • User data is permanently sanitized
  • User remains in the system as "Deleted User" for referential integrity
  • No recovery or reversal is possible

Important Considerations

Permanent Action Warning

Critical: User anonymization is completely irreversible. Once completed:

  • Personal data cannot be recovered
  • User cannot be reactivated
  • All personal history and preferences are lost
  • New user account required if person needs access again

System Impact

Referential Integrity: Anonymized users remain in the system as "Deleted User" entries to maintain:

  • Historical record relationships
  • System audit trails
  • Data consistency across modules

License Impact: Anonymization automatically deactivates users, freeing up license allocation for new users.

Best Practices

Before Anonymization

Verification Steps:

  • Confirm user is truly inactive and no longer needs access
  • Verify this is the correct user account
  • Check for any critical data or relationships that might be affected
  • Document the reason for anonymization for compliance records

Communication:

  • Notify relevant stakeholders if the user had important business relationships
  • Inform team members who might be looking for this user's historical contributions
  • Update any external systems that reference this user

Compliance Documentation

Record Keeping:

  • Document the anonymization request and authorization
  • Record the date and administrator who performed the action
  • Maintain compliance audit trail for privacy regulation requirements
  • Note any business justification for the data retention period before anonymization

Alternative Considerations

Before Anonymizing, Consider:

  • Deactivation Only: If privacy regulations don't require full anonymization, simple deactivation may be sufficient
  • Data Export: Export any business-critical information before anonymization
  • Account Transfer: Transfer ownership of shared content or resources to other users

Troubleshooting

Cannot Anonymize User:

  • Verify user is inactive (active users cannot be anonymized)
  • Confirm you have Administrator System Role permissions
  • Check that user exists and is accessible in the All Records view

System References After Anonymization:

  • "Deleted User" entries in historical records are normal and expected
  • These preserve system referential integrity while removing personal data
  • Do not attempt to delete these system references

Compliance and Legal Considerations

GDPR Compliance: User anonymization helps satisfy GDPR Article 17 (Right to Erasure) requirements when implemented as part of a comprehensive data protection strategy.

Documentation Requirements: Maintain records of anonymization actions for regulatory compliance and audit purposes.

Regular Review: Establish procedures for regular review of inactive users to identify candidates for anonymization based on your organization's data retention policies.

 


<< Managing User Groups and Auto-Segmentation | Configuring Team Access >>