1:"$Sreact.fragment" 2:I[44,["173","static/chunks/173-27a806994970872f.js","970","static/chunks/970-c892a6def1146b6d.js","773","static/chunks/773-f1dc7142c56170e9.js","177","static/chunks/app/layout-53564f1418e58ac3.js"],"default"] 3:I[5244,[],""] 4:I[3866,[],""] 5:I[9278,["173","static/chunks/173-27a806994970872f.js","970","static/chunks/970-c892a6def1146b6d.js","773","static/chunks/773-f1dc7142c56170e9.js","177","static/chunks/app/layout-53564f1418e58ac3.js"],"default"] 7:I[6213,[],"OutletBoundary"] 9:I[6213,[],"MetadataBoundary"] b:I[6213,[],"ViewportBoundary"] d:I[4835,[],""] :HL["/_next/static/media/569ce4b8f30dc480-s.p.woff2","font",{"crossOrigin":"","type":"font/woff2"}] :HL["/_next/static/media/93f479601ee12b01-s.p.woff2","font",{"crossOrigin":"","type":"font/woff2"}] :HL["/_next/static/css/1f9048d090ff279c.css","style"] :HL["/_next/static/css/232238176c13379f.css","style"] :HL["/_next/static/css/071ef4251d5a8f85.css","style"] :HL["/_next/static/css/e8af24773ae2eb12.css","style"] 0:{"P":null,"b":"WRd5dHM9_AXp0VcMkxyJY","p":"","c":["","news","tutorial-of-pvi"],"i":false,"f":[[["",{"children":["news",{"children":[["slug","tutorial-of-pvi","d"],{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],["",["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/1f9048d090ff279c.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","link","1",{"rel":"stylesheet","href":"/_next/static/css/232238176c13379f.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","link","2",{"rel":"stylesheet","href":"/_next/static/css/071ef4251d5a8f85.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","html",null,{"lang":"en","children":["$","body",null,{"className":"__variable_4d318d __variable_ea5f4b antialiased","children":[["$","$L2",null,{}],["$","$L3",null,{"parallelRouterKey":"children","segmentPath":["children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[],[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]]],"forbidden":"$undefined","unauthorized":"$undefined"}],["$","$L5",null,{}]]}]}]]}],{"children":["news",["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","segmentPath":["children","news","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["slug","tutorial-of-pvi","d"],["$","$1","c",{"children":[null,["$","$L3",null,{"parallelRouterKey":"children","segmentPath":["children","news","children","$0:f:0:1:2:children:2:children:0","children"],"error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L4",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":["__PAGE__",["$","$1","c",{"children":["$L6",[["$","link","0",{"rel":"stylesheet","href":"/_next/static/css/e8af24773ae2eb12.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}]],["$","$L7",null,{"children":"$L8"}]]}],{},null,false]},null,false]},null,false]},null,false],["$","$1","h",{"children":[null,["$","$1","Y6uBo4u5mjnSxqy0h00kx",{"children":[["$","$L9",null,{"children":"$La"}],["$","$Lb",null,{"children":"$Lc"}],["$","meta",null,{"name":"next-size-adjust","content":""}]]}]]}],false]],"m":"$undefined","G":["$d","$undefined"],"s":false,"S":true} c:[["$","meta","0",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] e:I[4614,["173","static/chunks/173-27a806994970872f.js","970","static/chunks/970-c892a6def1146b6d.js","247","static/chunks/247-74e40b4e4814b08d.js","129","static/chunks/129-a883c1546a0b055f.js","120","static/chunks/app/news/%5Bslug%5D/page-f006adb2b73da0ab.js"],"default"] 6:["$","div",null,{"children":["$","div",null,{"className":"max-w-[2000px] mx-auto px-4 md:px-16 py-6","children":["$","$Le",null,{"blogpost":{"description":"Two Methods to Scan for Personally Identifiable Information (PII) in Data Warehouses","mainImage":{"asset":{"url":"https://cdn.sanity.io/images/503tkegr/production/9db9d8dce75f143f7af704c8eb3cfb3aec9d3bb0-1584x1003.png"}},"body":[{"style":"h1","_key":"e285050c7846","markDefs":[],"children":[{"_key":"3e4559d125a30","_type":"span","marks":[],"text":"Two Methods to Scan for Personally Identifiable Information (PII) in Data Warehouses"}],"_type":"block"},{"_key":"8c71ceffc084","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Rajat Venkatesh — 12/1/2021 — 4 Min Read","_key":"ad104eb3ed330"}],"_type":"block","style":"normal"},{"children":[{"_type":"span","marks":[],"text":"","_key":"c24e95d7b48c"}],"_type":"block","style":"normal","_key":"52e9f332772e","markDefs":[]},{"_type":"image","_key":"7c40a9e91a30","asset":{"_ref":"image-9db9d8dce75f143f7af704c8eb3cfb3aec9d3bb0-1584x1003-png","_type":"reference"},"markDefs":null},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"A vital step towards data privacy and protection is finding and cataloging sensitive PII or PHI data in a data warehouse. Open-source data catalogs like Datahub (https://datahubproject.io/) and Amundsen (https://www.amundsen.io/) enable the cataloging of information in warehouses but lack the framework to scan, detect and tag tables or columns that contain such sensitive information.","_key":"3b438f1829a70"}],"_type":"block","style":"normal","_key":"c705fd0fe0ac"},{"children":[{"text":"This post describes two strategies to scan and detect PII, introducing the open-source project PII Catcher (https://tokern.io/piicatcher/), a tool to segregate information stored in a data warehouse.","_key":"4cae4918efb80","_type":"span","marks":[]}],"_type":"block","style":"normal","_key":"f877aa6a5989","markDefs":[]},{"_type":"block","style":"normal","_key":"92e83ebb282c","markDefs":[],"children":[{"text":"","_key":"e97ce30abf1b","_type":"span","marks":[]}]},{"_type":"image","alt":"PII","_key":"e8785f35090d","asset":{"_ref":"image-b152b41cd5b63dbc9826f46a959e284fcb15fd23-911x409-jpg","_type":"reference"},"markDefs":null},{"_type":"block","style":"h3","_key":"bdf88d6157a7","markDefs":[],"children":[{"text":"What is Personally Identifiable Information (PII)?","_key":"f8795dce90cb0","_type":"span","marks":[]}]},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"","_key":"a79a6e6a734f"}],"_type":"block","style":"normal","_key":"06b4207526c1"},{"children":[{"_type":"span","marks":[],"text":"PII or Personally Identifiable Information is any information that enables the identification of a specific individual. Traditional PII examples include email addresses, social security numbers, personal document IDs, and financial account information. With the evolution of technology, PII now extends to login IDs, IP addresses, geolocation, and biometrics.","_key":"9ea77ccf0aa40"}],"_type":"block","style":"normal","_key":"a5685aae8048","markDefs":[]},{"_key":"42e1dfde0728","markDefs":[],"children":[{"marks":[],"text":"","_key":"0467dd763d90","_type":"span"}],"_type":"block","style":"normal"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"PII falls into two types:","_key":"fab2b5f21bc00"}],"_type":"block","style":"h4","_key":"1a11d571180b"},{"_key":"27e5806ff08b","markDefs":[],"children":[{"_type":"span","marks":[],"text":"","_key":"8a27dec5a04b"}],"_type":"block","style":"normal"},{"markDefs":[],"children":[{"_type":"span","marks":["strong"],"text":"Sensitive:","_key":"4b33e958d7db0"},{"_type":"span","marks":[],"text":" any data that is linked directly to your identity (Credit Card Info, Passport Number, SSN, Legal Name)","_key":"4b33e958d7db1"}],"level":1,"_type":"block","style":"normal","_key":"31e5a4ee7e6f","listItem":"bullet"},{"children":[{"text":"Non-sensitive:","_key":"f94245fde9a70","_type":"span","marks":["strong"]},{"_type":"span","marks":[],"text":" any data that can identify an individual and is potentially obtainable from the internet (Address, Ethnicity, IP address)","_key":"f94245fde9a71"}],"level":1,"_type":"block","style":"normal","_key":"0ec68f756b03","listItem":"bullet","markDefs":[]},{"style":"normal","_key":"95fe77059df7","markDefs":[],"children":[{"_key":"317250059098","_type":"span","marks":[],"text":""}],"_type":"block"},{"children":[{"_type":"span","marks":[],"text":"Compliance laws worldwide have similar definitions of what composes PII:","_key":"99a24eb317780"}],"_type":"block","style":"h4","_key":"9a2345bda7dd","markDefs":[]},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"","_key":"26332d5e66eb"}],"_type":"block","style":"normal","_key":"9206c112b331"},{"_type":"block","style":"normal","_key":"9bf79f4ae802","markDefs":[],"children":[{"_type":"span","marks":["strong"],"text":"General Data Protection Regulation (GDPR) (European Union):","_key":"6dbcdf68d0260"},{"_type":"span","marks":[],"text":" PII is any data that can help identify an individual. Some examples that have traditionally been considered personally identifiable information include national insurance numbers in the UK, your mailing address, email address, and phone numbers ","_key":"6dbcdf68d0261"},{"_key":"6dbcdf68d0262","_type":"span","marks":["strong"],"text":"California Consumer Protection Act (CCPA) (United States):"},{"_type":"span","marks":[],"text":" The CCPA maintains a broad definition of “personal information” or PI, referring to it as “information that identifies, relates to, describes, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household.” Other Compliance Laws, including PDPA (Singapore & Thailand), PIPL (China), and CPPA (Canada), refer to PII in similar ways.","_key":"6dbcdf68d0263"}]},{"children":[{"_key":"3af3a83158080","_type":"span","marks":[],"text":"Besides these general definitions, businesses may have specific PII data collected for their unique requirements. For instance, firms in the healthcare sector collect Personal Health Information (PHI), whereas bank account or crypto-currency wallet IDs are relevant to the financial sector. Regardless of industry, there is a basic PII that any organization will need to manage:"}],"_type":"block","style":"normal","_key":"f42f4c0f7c9b","markDefs":[]},{"style":"normal","_key":"2de96dd8a638","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Phone","_key":"dbaeb19920090"}],"level":1,"_type":"block"},{"children":[{"text":"Email","_key":"8fc597f3c5700","_type":"span","marks":[]}],"level":1,"_type":"block","style":"normal","_key":"8234246ac8a5","listItem":"bullet","markDefs":[]},{"listItem":"bullet","markDefs":[],"children":[{"marks":[],"text":"Credit Card","_key":"3a50285666070","_type":"span"}],"level":1,"_type":"block","style":"normal","_key":"a999a2883f81"},{"_type":"block","style":"normal","_key":"b00b93208938","listItem":"bullet","markDefs":[],"children":[{"marks":[],"text":"Address","_key":"753af096b0e40","_type":"span"}],"level":1},{"_type":"block","style":"normal","_key":"f04d5373a2b2","listItem":"bullet","markDefs":[],"children":[{"marks":[],"text":"Person/Name","_key":"c9ad69ccca520","_type":"span"}],"level":1},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Location","_key":"e6df15b326260"}],"level":1,"_type":"block","style":"normal","_key":"1e1851ffcb27","listItem":"bullet"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"Date","_key":"08d1eea26b690"}],"level":1,"_type":"block","style":"normal","_key":"98d0a5f663bc","listItem":"bullet"},{"_type":"block","style":"normal","_key":"3d3d1e83c832","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Gender","_key":"1bcc7b483d0b0"}],"level":1},{"children":[{"_type":"span","marks":[],"text":"Nationality","_key":"4791befb2e6f0"}],"level":1,"_type":"block","style":"normal","_key":"20c0e09d4788","listItem":"bullet","markDefs":[]},{"_key":"c29bfcaa29fe","listItem":"bullet","markDefs":[],"children":[{"text":"IP Address","_key":"f34f30f940620","_type":"span","marks":[]}],"level":1,"_type":"block","style":"normal"},{"level":1,"_type":"block","style":"normal","_key":"3d38eb537a29","listItem":"bullet","markDefs":[],"children":[{"text":"SSN","_key":"487b57796aff0","_type":"span","marks":[]}]},{"listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"User Name","_key":"886fc858aa2e0"}],"level":1,"_type":"block","style":"normal","_key":"7c4975bbe369"},{"style":"normal","_key":"4d92be53e5e6","listItem":"bullet","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Password","_key":"2d6f0bf7ed540"}],"level":1,"_type":"block"},{"children":[{"_type":"span","marks":[],"text":"Challenges with scanning for PII","_key":"b21aef6d257c0"}],"_type":"block","style":"h3","_key":"fb18aa016aac","markDefs":[]},{"style":"normal","_key":"916ef1d63022","markDefs":[],"children":[{"_type":"span","marks":[],"text":"","_key":"9439b95ec7fb"}],"_type":"block"},{"_key":"893c52a2a1dd","markDefs":[],"children":[{"text":"Shown below is an example record in the patients table in Synthetic Patient Records with COVID-19:","_key":"b2b8c7ffa4830","_type":"span","marks":[]}],"_type":"block","style":"normal"},{"children":[{"_key":"45c80e0af5090","_type":"span","marks":[],"text":""}],"_type":"block","style":"normal","_key":"8a4bec6accee","markDefs":[]},{"alt":"PII","_key":"94e9595637ca","asset":{"_ref":"image-411b25819d3c7978c446bf24cfeef9acbdc5ee46-1714x1330-png","_type":"reference"},"markDefs":null,"_type":"image"},{"markDefs":[],"children":[{"_type":"span","marks":[],"text":"","_key":"95bf76bc73cf"}],"_type":"block","style":"normal","_key":"3eea062273f4"},{"_key":"d8fecc9352cb","markDefs":[],"children":[{"_type":"span","marks":[],"text":"Most of the fields in this table store PII, but it can be confusing to even detect if a column stores PII and if so, the type of that PII. For instance, if the scanner only scans the data in the SSN field, the SSN may be detected as a phone number. Similarly, textual information on its own, such as “M” or “F” in the gender field, or “white” in the race field, does not provide sufficient context to determine the type of PII. In both these cases, it would be more efficient to scan the field headers. However, there are instances where the actual data requires scanning. Therefore, the technique employed to scan a data warehouse is dependent on the context of the field in question.\n","_key":"80cfc29ffd9b"}],"_type":"block","style":"normal"}],"title":"Tutorial of PVI","tag":["Stella","Satellite","Space","Space Mission"],"author":{"name":"Faizan","title":"Creator","image":{"asset":{"url":"https://cdn.sanity.io/images/503tkegr/production/78a0ea7100f855420990413271fa2f48574e4b64-640x853.png"}},"bio":[{"markDefs":[],"children":[{"marks":[],"text":"Worked as an content creator","_key":"47eafec80d37","_type":"span"}],"_type":"block","style":"normal","_key":"c60a0052219f"}]},"categories":[{"title":"Wireless Devices","_id":"2640b5f8-c46b-469f-80f8-ad067cc56b3e","slug":{"_type":"slug","current":"wireless-devices"},"imageUrl":null}],"relatedPosts":[{"title":"USAT Technology","slug":{"current":"usat-technology","_type":"slug"},"imageUrl":"https://cdn.sanity.io/images/503tkegr/production/4cf51754d60d94b592d408161420c8914f7cc45e-661x495.svg","time":"2025-01-15T14:44:49Z"},{"title":"Handheld","slug":{"current":"handheld","_type":"slug"},"imageUrl":"https://cdn.sanity.io/images/503tkegr/production/8d9541ce20aa4b3b3667d9b96679f8f721d12357-699x540.svg","time":"2025-01-14T19:53:48Z"},{"title":"Drive With me","slug":{"current":"drive","_type":"slug"},"imageUrl":"https://cdn.sanity.io/images/503tkegr/production/174672e08c196f87494dea26cf200ef3d2b29dc4-1280x813.webp","time":"2025-01-24T21:28:21Z"}],"_id":"bac0d3c4-3356-4069-b83b-710ccc58a4bd"},"slug":"tutorial-of-pvi"}]}]}] a:[["$","meta","0",{"charSet":"utf-8"}],["$","title","1",{"children":"Tutorial of PVI"}],["$","meta","2",{"name":"description","content":"Two Methods to Scan for Personally Identifiable Information (PII) in Data Warehouses"}],["$","link","3",{"rel":"icon","href":"/favicon.ico","type":"image/x-icon","sizes":"256x256"}]] 8:null