Personally identifiable information, or PII, is pretty intuitive. If you know someone's phone, Social Security number or credit card number, you have a direct link to their identity.

Hackers use these identifiers, along with a few more personal details, as keys to unlock data, steal identities, and ultimately take money. The lines between PII and non-PII data are blurring. It's been known for at least 10 years that there are specific pieces of data which may appear anonymous, but when they're taken together are just as effective at identifying a person as traditional PII.

The easiest to understand of these so called quasi-PIIs is the trio of full birth date, ZIP code and gender. If a company had published a dataset that had been "de-identified" by removing all the standard PIIs, but left those three data items alone, a smart hacker could with very high likelihood find the name and address of the person behind that data.

Complete your profile to continue reading and get FREE access to CUTimes.com, part of your ALM digital membership.

  • Critical CUTimes.com information including comprehensive product and service provider listings via the Marketplace Directory, CU Careers, resources from industry leaders, webcasts, and breaking news, analysis and more with our informative Newsletters.
  • Exclusive discounts on ALM and CU Times events.
  • Access to other award-winning ALM websites including Law.com and GlobeSt.com.
NOT FOR REPRINT

© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.