What is 'Data Anonymization'

Data anonymization seeks to protect private or sensitive data by deleting or encrypting personally identifiable information from a database. Data anonymization is done for the purpose of protecting an individual’s or company’s private activities while maintaining the integrity of the data gathered and shared. Data anonymization is also known as "data obfuscation," "data masking," or "data de-identification."

Breaking Down 'Data Anonymization'

Corporations generate, store, and process enormous amounts of sensitive data in the normal course of their business operations. Advancement in technology has thrived because of relevant information found in data that has been generated and shared across various sectors and countries. Financial innovation in technology (fintech) has made boundless progress in the way financial services are customized to clients, thanks to data that has been shared from sectors such as social media and e-commerce establishments. Data shared between digital media and e-commerce firms has helped both sectors better advertise products on their sites to a specific user or consumer. However, in order for shared data to be useful without compromising the identities of clients compiled in the database, anonymization must be utilized.

Data Anonymization in Practice

Data anonymization is carried out by most industries that deal with sensitive information such as the healthcare, financial, and digital media industries while promoting the integrity of data sharing. Data anonymization reduces the risk of unintended disclosure when sharing data between countries, industries, and even departments within the same company. For example, a hospital sharing confidential data on its patients to a medical research lab or pharmaceutical company would be able to do so ethically if it keeps its patients anonymous. This can be done by removing the names, Social Security Numbers, dates of birth, and addresses of its patients from the shared list while leaving the important components required for medical research like age, ailments, height, weight, gender, race, etc.

Data Anonymization Techniques

Anonymization of data is done in various ways including deletion, encryption, generalization, and a host of others. A company can either delete personally identifiable information (PII) from its data gathered or encrypt this information with a strong passphrase. A business can also decide to generalize the information collected in its database. For example, a table contains the exact gross income earned by five CEOs in the retail sector. Let's assume the recorded incomes are $520,000, $230,000, $109,000, $875,000, and $124,000. This information can be generalized into categories like “< $500,000” and “≥ $500,000”. Although, the data is obfuscated, it will still be useful to the user.

Data Anonymization Reasoning

Data anonymization is whereby classified information is sanitized and masked should be done in such a way that if a breach occurs, the data acquired is useless to the culprits. The need to protect data should be held in high priority in every organization, as classified information that falls into the wrong hands can be misused, intentionally or unintentionally. Lack of sensitivity when handling sensitive client information can come at a great cost to businesses due to regulatory authorities cracking down on gross negligence. Legal and compliance requirements like PCI DSS (Payment Card Industry Data Security Standard) impose hefty fines on financial institutions in the event of a credit card breach. PIPEDA, a Canadian Law, governs the disclosure and use of personal information by corporations. There are other multiple regulatory bodies that have been formed to monitor an organization’s use or misuse of private data.

Decoding anonymized data is possible through a process known as De-anonymization (or "re-identification"). Due to the fact that anonymized data can be decoded and unraveled, critics believe anonymization provides a false sense of security.

RELATED TERMS
  1. Anonymous (Internet Group)

    Anonymous is a loosely organized group of internet-based hackers ...
  2. Silk Road

    A digital platform that was popular for hosting money laundering ...
  3. Data Mining

    Data mining is a process used by companies to turn raw data into ...
  4. Data Science

    Data science is a field of Big Data that seeks to provide meaningful ...
  5. Société Anonyme (S.A.)

    Société anonyme (S.A.) is a French term for a public limited ...
  6. Encryption

    Encryption is a means of securing digital date using an algorithm ...
Related Articles
  1. Tech

    How Big Data Has Changed Finance

    The vast proliferation of data and increasing technological complexities continues to transform the way industries operate and compete.
  2. Tech

    An Ether Trader Made More Than $200 Million in One Month

    The anonymous trader turned $55 million in crypto assets into $283 million in just over a month.
  3. Personal Finance

    Financial data analyst: Job description and average salary

    Learn about the average salary for a financial data analyst position and the skills, education, and experience employers require of candidates.
  4. Tech

    Cryptocurrencies Could Get Their Own Central Bank

    The Bank for International Settlements considers having central banks issue their own crypto-money.
  5. Personal Finance

    Common Interview Questions for Data Integrity Analysts

    Prepare for a data integrity analyst job interview by identifying some of the key questions commonly asked and developing winning responses.
  6. Tech

    How Big Data Has Changed Marketing

    Big data has enabled marketers to enhance their customer engagement and customer retention strategies by providing insight into behavior and thoughts.
  7. Tech

    Explaining the Crypto in Cryptocurrency

    Ever wondered about the cryptography involved in cryptocurrencies?
  8. Tech

    How Big Data Has Changed Healthcare

    Like many other industries, healthcare has adapted to data analytics not only for its financial returns but also improving patient’s quality of life.
  9. Tech

    Blockchain Could Make You—Not Equifax—the Owner of Your Data

    All hype aside, blockchain technology is really good at one thing: taking out the middlemen. Leaky data brokers' days may be numbered.
  10. Tech

    The Five Most Private Cryptocurrencies

    Investopedia's list of private cryptocurrencies that claim to offer enhanced security and protection of user identity.
RELATED FAQS
  1. What is the most important type of data used in business analytics?

    Consider what makes data useful in business analytics, and why companies should search for the types of data that provide ... Read Answer >>
  2. Is Bitcoin legal in the US?

    Learn about the legality of Bitcoin as a form of payment in the United States, as well as how it is produced and concerns ... Read Answer >>
  3. How do Internet companies profit if they give away their services for free?

    Learn how companies in the Internet sector make a profit when service, content and user applications are offered at no cost ... Read Answer >>
Trading Center