De-identification 301
Three Adversaries Who Could Attack Your Data
Data breaches and re-identification attacks compromise the personal privacy of individuals and both are on the rise. Re-identification results when a record is correctly tied to the person behind that data, even if the data was thought to have been made anonymous.
Re-identification attacks occur because an attacker has the skills, resources and the motivation to do so. Motivations can vary but are usually the result of curiosity or a desire for personal gain. Demonstration attacks happen when a researcher or journalist aims to show that a dataset has been insufficiently de-identified and wants to prove that re-identification is possible.
This white paper is the third part of our De-identification 101 series, but can stand alone.
You might also like:

De-identification 101
De-identification 101, your primer on protecting health information (PHI).

De-identification 201
De-identification 201 builds on the fundamentals of health data de-identification.

De-identification 401
An Optimal Approach to Data De-identification Critics who question the value of de-identification often overlook the quality of the de-identification process. The…