Protecting Personally Identifiable Information
SHA 256 - Hash
The Wikipedia explanation . . .
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA). Cryptographic hash functions are mathematical operations run on digital data; by comparing the computed “hash” (the output from execution of the algorithm) to a known and expected hash value
Staying within the boundary of personal data protection
The Industry Accepted Standard
In simpler terms . . .
email addresses are converted into a code (or a hash) and most importantly the code will always be the same for every email address. That means when we SHA256 your email address we get the same hash as everyone else. If Facebook have your email address, then they also have your SHA256 hash. If we give them the hash, they know exactly who the person is on the individual level…..so they can then initiate a targeted marketing campaign.
Using NSA Technology to secure data
Personally identifiable information (PII), as used in information security and privacy laws, is information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.
Since we only deliver SHA-256 hash lists and no information that could be used to identify consumers directly we ensure compliance and data protection.
Personally Identifiable Informationdirectly from the DOL…….. Guidance on the Protection of Personal Identifiable Information Guidance on the Protection of Personal Identifiable Information Personal Identifiable Information (PII) is defined as: Any representation of information that permits the identity of an individual to whom the information applies to be reasonably inferred by either direct or indirect means. Further, PII […]