{"id":33278,"date":"2015-02-06T15:56:19","date_gmt":"2015-02-06T14:56:19","guid":{"rendered":"https:\/\/blogs.bmj.com\/bmj\/?p=33278"},"modified":"2015-02-09T09:50:04","modified_gmt":"2015-02-09T08:50:04","slug":"khaled-el-emam-is-it-safe-to-anonymize-data","status":"publish","type":"post","link":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/","title":{"rendered":"Khaled El Emam: Is it safe to anonymize data?"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.bmj.com\/bmj\/files\/2013\/10\/khaled_e_emam.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-29620\" src=\"https:\/\/blogs.bmj.com\/bmj\/files\/2013\/10\/khaled_e_emam.jpg\" alt=\"khaled_e_emam\" width=\"110\" height=\"160\" \/><\/a>Recently an article was published in<a href=\"http:\/\/m.sciencemag.org\/content\/347\/6221\/536.full\"> Science<\/a> claiming that it is easy to re-identify credit card transaction data that has been anonymized. While this is not health data, the authors generalize their conclusions to all other human behavior data. Credit card transactions can, however, leak health information if the store is a pharmacy, for example. The authors then, in media interviews, make broader claims about all personal information, for example stating that \u201c<a href=\"http:\/\/m.sciencemag.org\/content\/347\/6221\/468.full\">the open sharing of raw data sets is not the future.<\/a>\u201d\u00a0<!--more--><\/p>\n<p>This is alarming as there are significant efforts to share raw health data, for example, in the context of <a href=\"http:\/\/www.bmj.com\/open-data\">clinical trials<\/a>. Furthermore, the authors argue that the foundation of privacy laws in the US and EU, the concept of personally identifiable information, is \u201cinadequate:\u201d quite a sweeping statement. Given that we are in the midst of changes to the <a href=\"http:\/\/www.statewatch.org\/news\/2014\/dec\/eu-council-dp-reg-15395-14.pdf\">EU\u2019s data protection directive<\/a>, and there are efforts to change the privacy provisions under <a href=\"http:\/\/energycommerce.house.gov\/sites\/republicans.energycommerce.house.gov\/files\/114\/Analysis\/Cures\/20150127-Cures-Discussion-Document.pdf\">HIPAA in the US<\/a>, it is timely and important to have accurate and evidence based debates about the effectiveness of various approaches to protect data when it is being shared.<\/p>\n<p>It is therefore also necessary to understand the nontrivial limitations of this study, and to caution against drawing such broad and all-encompassing conclusions.<\/p>\n<p><strong>What the study did<br \/>\n<\/strong><br \/>\nUsing credit card data from 1.1 million individuals shopping in 10,000 stores over three months from a single bank in an unnamed OECD country, the authors analyzed these individuals\u2019 transaction traces. If a person is the only one in that data set with a particular transaction trace of a certain size then that individual is considered unique. For example, if individual number 7, Sally, shopped at a shoe store on 26 December and bought something for $20, and then shopped at a grocery store on 27 December and purchased items worth $35, and this is the only individual in the data set who has that exact trace, then that individual is unique. In this particular example, that individual had a trace of 2 transactions.<br \/>\nThe authors then compute that 90% of individuals in their specific data set are unique with a trace of 4 transactions, with each transaction containing the exact location of the store and date of the transaction. If the price of the purchase is included in the analysis then all individuals are unique. If the granularity of the information is reduced, for example, by grouping adjacent stores or combining days, then the percentage of unique individuals would also go down, but the uniqueness numbers were still considered high.<\/p>\n<p><strong>What is wrong with this study?<br \/>\n<\/strong><br \/>\nThere are some fundamental challenges in the assumptions and methods used in this study. My commentary can only be based on what was in the published article and associated supplementary materials \u2013 it is not possible to speculate about unstated assumptions or techniques.<\/p>\n<p>1. The 1.1 million people are a sample of the population in that country. Let\u2019s say that the country has 5.5 million adult citizens who shop with credit cards, then there is a 1 in 5 chance that an individual is even in the data set. But it also means that the computations of uniqueness are potentially severely exaggerated because, in the context of measuring re-identification risk, uniqueness needs to be computed (or estimated) for the population. Since, based on the information in the article, that was not done here, all of these numbers are likely inflated: <a href=\"http:\/\/www.biomedcentral.com\/1472-6947\/12\/66\">sample uniqueness does not equal population uniqueness<\/a>. The authors do not acknowledge this in their article \u2013 that\u2019s a big problem. In Sally\u2019s case, there may be another individual who uses a different bank in that country with the exact trace as her. Sally may not really be unique.<\/p>\n<p>2. The underlying assumption was that this data set is going to be shared openly with no controls whatsoever. In practice, I would be very surprised if a data set like this would be converted into a public use file. Such data, in practice, would be disclosed with contractual, security, and privacy controls in place. From a risk measurement perspective, these controls reduce the overall probability of re-identification considerably. The impact of controls was not considered in the published analysis. Stating that such a data set can be re-identified assumes a somewhat unrealistic data sharing use case.<\/p>\n<p>3. Uniqueness does not equal re-identification. Uniqueness is one condition for re-identification, but it is not even a necessary one. It is easy for a data set to have a high probability of re-identification even if uniqueness is not high. The media narrative from this study was \u201c<a href=\"http:\/\/blogs.scientificamerican.com\/observations\/2015\/01\/29\/shopping-habits-reveal-personal-details-in-anonymized-data\/\">the researchers identified 90 percent of the individuals in the data set. When they added the exact prices of transactions to the mix, they increased their ability to re-identify anonymous records by 22 percent.<\/a>\u201d In fact, the authors do not actually re-identify anyone. But they do repeatedly characterize and describe the results as a successful re-identification in their article, which is simply not true.<\/p>\n<p>4. As the authors note, the original anonymization performed on that data set was somewhat simple. More <a href=\"http:\/\/www.iom.edu\/Activities\/Research\/SharingClinicalTrialData.aspx\">sophisticated anonymization techniques<\/a>, had they been applied to this data, would have produced a data set with an acceptable level of re-identification risk.<\/p>\n<p><strong>What Have We Learned?<\/strong><\/p>\n<p>There are key things that we can learn from this study.<\/p>\n<p>Data with the individual names and addresses removed will have a high risk of re-identification. This is called pseudonymized data. We already know that <a href=\"https:\/\/blogs.bmj.com\/bmj\/2014\/11\/20\/khaled-e-emam-pseudonymous-data-is-not-anonymous-data\/\">pseudonymized data should be treated as personal information<\/a>. The Science study re-enforces that point. This is an important lesson because in the context of changes to the EU Data Protection Regulation, there are proposals to allow the use of pseudonymized data for secondary purposes without consent: \u201c<a href=\"http:\/\/data.consilium.europa.eu\/doc\/document\/ST-14705-2014-INIT\/en\/pdf\">where further processing takes place by using measures of pseudonymisation, it should not be considered as incompatible with the purpose for which the data have been initially collected as long as the data subject is not identified or identifiable<\/a>.\u201d<\/p>\n<p>The authors of the Science article emphasize the need for quantitative measures of the likelihood of re-identification. This is good general advice \u2013 but the measurement needs to be based on sound metrics. A recent report from the <a href=\"http:\/\/www.iom.edu\/Activities\/Research\/SharingClinicalTrialData.aspx\">Institute of Medicine on clinical trial data sharing<\/a> provides somewhat detailed guidance on such measurement.<\/p>\n<p><em><strong>Khaled El Emam<\/strong> is the Canada Research Chair in Electronic Health Information at the University of Ottawa, an Associate Professor in the Department of Pediatrics, and is cross-appointed to the School of Electrical Engineering and Computer Science.<\/em><\/p>\n<p><em><strong>Competing Interests:<\/strong>\u00a0I have read and understood the BMJ Group policy on declaration of interests and declare the following interests: I have financial interests in Privacy Analytics Inc, a University of Ottawa and Children&#8217;s Hospital of Eastern Ontario spin-off company which develops anonymization software for the health sector.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently an article was published in Science claiming that it is easy to re-identify credit card transaction data that has been anonymized. While this is not health data, the authors [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/\">More&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5744],"tags":[],"class_list":["post-33278","post","type-post","status-publish","format-standard","hentry","category-open-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Khaled El Emam: Is it safe to anonymize data? - The BMJ<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Khaled El Emam: Is it safe to anonymize data? - The BMJ\" \/>\n<meta property=\"og:description\" content=\"Recently an article was published in Science claiming that it is easy to re-identify credit card transaction data that has been anonymized. While this is not health data, the authors [...]More...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/\" \/>\n<meta property=\"og:site_name\" content=\"The BMJ\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/bmjdotcom\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-02-06T14:56:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-02-09T08:50:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.bmj.com\/bmj\/files\/2013\/10\/khaled_e_emam.jpg\" \/>\n<meta name=\"author\" content=\"BMJ\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bmj_latest\" \/>\n<meta name=\"twitter:site\" content=\"@bmj_latest\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"BMJ\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2015\\\/02\\\/06\\\/khaled-el-emam-is-it-safe-to-anonymize-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2015\\\/02\\\/06\\\/khaled-el-emam-is-it-safe-to-anonymize-data\\\/\"},\"author\":{\"name\":\"BMJ\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#\\\/schema\\\/person\\\/ba3da426ed20e8f1d933ca367d8216fe\"},\"headline\":\"Khaled El Emam: Is it safe to anonymize data?\",\"datePublished\":\"2015-02-06T14:56:19+00:00\",\"dateModified\":\"2015-02-09T08:50:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2015\\\/02\\\/06\\\/khaled-el-emam-is-it-safe-to-anonymize-data\\\/\"},\"wordCount\":1120,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2015\\\/02\\\/06\\\/khaled-el-emam-is-it-safe-to-anonymize-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/files\\\/2013\\\/10\\\/khaled_e_emam.jpg\",\"articleSection\":[\"Open data\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2015\\\/02\\\/06\\\/khaled-el-emam-is-it-safe-to-anonymize-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2015\\\/02\\\/06\\\/khaled-el-emam-is-it-safe-to-anonymize-data\\\/\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2015\\\/02\\\/06\\\/khaled-el-emam-is-it-safe-to-anonymize-data\\\/\",\"name\":\"Khaled El Emam: Is it safe to anonymize data? - The BMJ\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2015\\\/02\\\/06\\\/khaled-el-emam-is-it-safe-to-anonymize-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2015\\\/02\\\/06\\\/khaled-el-emam-is-it-safe-to-anonymize-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/files\\\/2013\\\/10\\\/khaled_e_emam.jpg\",\"datePublished\":\"2015-02-06T14:56:19+00:00\",\"dateModified\":\"2015-02-09T08:50:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2015\\\/02\\\/06\\\/khaled-el-emam-is-it-safe-to-anonymize-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2015\\\/02\\\/06\\\/khaled-el-emam-is-it-safe-to-anonymize-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2015\\\/02\\\/06\\\/khaled-el-emam-is-it-safe-to-anonymize-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/files\\\/2013\\\/10\\\/khaled_e_emam.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/files\\\/2013\\\/10\\\/khaled_e_emam.jpg\",\"width\":110,\"height\":160},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/2015\\\/02\\\/06\\\/khaled-el-emam-is-it-safe-to-anonymize-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Khaled El Emam: Is it safe to anonymize data?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#website\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/\",\"name\":\"The BMJ\",\"description\":\"Helping doctors make better decisions.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#organization\",\"name\":\"The BMJ\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/files\\\/2018\\\/05\\\/The-BMJ-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/files\\\/2018\\\/05\\\/The-BMJ-logo.jpg\",\"width\":852,\"height\":568,\"caption\":\"The BMJ\"},\"image\":{\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/bmjdotcom\\\/\",\"https:\\\/\\\/x.com\\\/bmj_latest\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/#\\\/schema\\\/person\\\/ba3da426ed20e8f1d933ca367d8216fe\",\"name\":\"BMJ\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4d8f39281bcae118348a1c027347b8e53b82d42520e774a8b50dd9a6ac6c01d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4d8f39281bcae118348a1c027347b8e53b82d42520e774a8b50dd9a6ac6c01d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b4d8f39281bcae118348a1c027347b8e53b82d42520e774a8b50dd9a6ac6c01d?s=96&d=mm&r=g\",\"caption\":\"BMJ\"},\"sameAs\":[\"https:\\\/\\\/blogs.bmj.com\\\/\"],\"url\":\"https:\\\/\\\/blogs.bmj.com\\\/bmj\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Khaled El Emam: Is it safe to anonymize data? - The BMJ","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/","og_locale":"en_US","og_type":"article","og_title":"Khaled El Emam: Is it safe to anonymize data? - The BMJ","og_description":"Recently an article was published in Science claiming that it is easy to re-identify credit card transaction data that has been anonymized. While this is not health data, the authors [...]More...","og_url":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/","og_site_name":"The BMJ","article_publisher":"https:\/\/www.facebook.com\/bmjdotcom\/","article_published_time":"2015-02-06T14:56:19+00:00","article_modified_time":"2015-02-09T08:50:04+00:00","og_image":[{"url":"https:\/\/blogs.bmj.com\/bmj\/files\/2013\/10\/khaled_e_emam.jpg","type":"","width":"","height":""}],"author":"BMJ","twitter_card":"summary_large_image","twitter_creator":"@bmj_latest","twitter_site":"@bmj_latest","twitter_misc":{"Written by":"BMJ","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/#article","isPartOf":{"@id":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/"},"author":{"name":"BMJ","@id":"https:\/\/blogs.bmj.com\/bmj\/#\/schema\/person\/ba3da426ed20e8f1d933ca367d8216fe"},"headline":"Khaled El Emam: Is it safe to anonymize data?","datePublished":"2015-02-06T14:56:19+00:00","dateModified":"2015-02-09T08:50:04+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/"},"wordCount":1120,"commentCount":1,"publisher":{"@id":"https:\/\/blogs.bmj.com\/bmj\/#organization"},"image":{"@id":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.bmj.com\/bmj\/files\/2013\/10\/khaled_e_emam.jpg","articleSection":["Open data"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/","url":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/","name":"Khaled El Emam: Is it safe to anonymize data? - The BMJ","isPartOf":{"@id":"https:\/\/blogs.bmj.com\/bmj\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/#primaryimage"},"image":{"@id":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.bmj.com\/bmj\/files\/2013\/10\/khaled_e_emam.jpg","datePublished":"2015-02-06T14:56:19+00:00","dateModified":"2015-02-09T08:50:04+00:00","breadcrumb":{"@id":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/#primaryimage","url":"https:\/\/blogs.bmj.com\/bmj\/files\/2013\/10\/khaled_e_emam.jpg","contentUrl":"https:\/\/blogs.bmj.com\/bmj\/files\/2013\/10\/khaled_e_emam.jpg","width":110,"height":160},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.bmj.com\/bmj\/2015\/02\/06\/khaled-el-emam-is-it-safe-to-anonymize-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.bmj.com\/bmj\/"},{"@type":"ListItem","position":2,"name":"Khaled El Emam: Is it safe to anonymize data?"}]},{"@type":"WebSite","@id":"https:\/\/blogs.bmj.com\/bmj\/#website","url":"https:\/\/blogs.bmj.com\/bmj\/","name":"The BMJ","description":"Helping doctors make better decisions.","publisher":{"@id":"https:\/\/blogs.bmj.com\/bmj\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.bmj.com\/bmj\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blogs.bmj.com\/bmj\/#organization","name":"The BMJ","url":"https:\/\/blogs.bmj.com\/bmj\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.bmj.com\/bmj\/#\/schema\/logo\/image\/","url":"https:\/\/blogs.bmj.com\/bmj\/files\/2018\/05\/The-BMJ-logo.jpg","contentUrl":"https:\/\/blogs.bmj.com\/bmj\/files\/2018\/05\/The-BMJ-logo.jpg","width":852,"height":568,"caption":"The BMJ"},"image":{"@id":"https:\/\/blogs.bmj.com\/bmj\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/bmjdotcom\/","https:\/\/x.com\/bmj_latest"]},{"@type":"Person","@id":"https:\/\/blogs.bmj.com\/bmj\/#\/schema\/person\/ba3da426ed20e8f1d933ca367d8216fe","name":"BMJ","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b4d8f39281bcae118348a1c027347b8e53b82d42520e774a8b50dd9a6ac6c01d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b4d8f39281bcae118348a1c027347b8e53b82d42520e774a8b50dd9a6ac6c01d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4d8f39281bcae118348a1c027347b8e53b82d42520e774a8b50dd9a6ac6c01d?s=96&d=mm&r=g","caption":"BMJ"},"sameAs":["https:\/\/blogs.bmj.com\/"],"url":"https:\/\/blogs.bmj.com\/bmj\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/posts\/33278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/comments?post=33278"}],"version-history":[{"count":0,"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/posts\/33278\/revisions"}],"wp:attachment":[{"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/media?parent=33278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/categories?post=33278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.bmj.com\/bmj\/wp-json\/wp\/v2\/tags?post=33278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}