{"id":7202,"date":"2022-06-29T10:24:25","date_gmt":"2022-06-29T08:24:25","guid":{"rendered":"https:\/\/www.dot-anonymizer.com\/?p=7202"},"modified":"2025-11-18T11:45:35","modified_gmt":"2025-11-18T10:45:35","slug":"what-are-the-risks-of-working-with-non-anonymized-data","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/","title":{"rendered":"What are the risks of working with non-anonymized data?"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"940\" height=\"350\" title=\"banner-blog-risque-de-travailler-avec-donnees-non-anonymisees\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png\" alt class=\"lazyload img-responsive wp-image-6932\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees-200x74.png 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees-400x149.png 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees-600x223.png 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees-800x298.png 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png 940w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:40px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\" style=\"--awb-content-alignment:left;\"><p><span data-contrast=\"none\">The 21st century is definitely the century of data. Its value is no longer in question. It's also called the new black gold. And it's a fact, every company is trying to make the most of it.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">This is why institutions are setting up highly secure production environments to protect it. But data is also used outside these environments (for archiving, training of new employees, business intelligence for marketing departments, software development or even for subcontractors), exposing it to <\/span><b><span data-contrast=\"none\">multiple risks.<\/span><\/b><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The first risk is of course the <\/span><b><span data-contrast=\"none\">leakage of confidential data <\/span><\/b><span data-contrast=\"none\">which, as <\/span><a href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/data-breaches-how-to-prevent-them\/\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">this article<\/span><\/a><span data-contrast=\"none\"> explains, is the main threat in the field of cybersecurity.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Faced with these challenges, <\/span><b><span data-contrast=\"none\">data anonymization <\/span><\/b><span data-contrast=\"none\">remains the most effective protection, transforming the data in an irreversible way, while preserving its consistency and usability.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">But some companies may be sometimes tempted to approach data protection through risk management, by assessing and prioritizing it.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">Risk management, a solution for enterprise data?<\/h2><\/div><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:left;\"><p><span data-contrast=\"none\">The assumed risk concerning the protection of personal and identifying data is clearly not an option as the consequences in terms of image, loss of business but also and above all in terms of financial penalties are important since the implementation of the <\/span><b><span data-contrast=\"none\">GDPR.<\/span><\/b><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The same is true for risk mitigation. Reducing the potentiality would mean no longer using data outside the production environment, and this is impossible today if we want to maintain a <\/span><b><span data-contrast=\"none\">competitive advantage.<\/span><\/b><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">This leaves the option of delegating the risk, which would consist of <\/span><b><span data-contrast=\"none\">entrusting the protection of one's data to a service provider.<\/span><\/b><span data-contrast=\"none\"> This option is no longer possible since the advent of the GDPR. Indeed, if a data leak were to occur at the service provider, the regulation stipulates that the responsibility of the leakage would be shared between the customer and the service provider.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Besides, service providers are no longer ready to accept this risk management, which is non-compliant and extremely risky, both from a financial point of view and in terms of image loss.\u00a0<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">They are therefore now imposing the anonymization of the data entrusted to them. In this case, we no longer speak of delegation but of <\/span><b><span data-contrast=\"none\">risk cancellation.<\/span><\/b><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:rgb(234, 80, 80);--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p><strong>Personal data and anonymization: 5 tips for a successful anonymization project<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#356897;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/resources\/guides-resources\/dot-guide-5-tips-for-a-successful-anonymization-project\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download the guide<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">Risks related to the life of a company<\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:left;\"><p><span data-contrast=\"none\">Beyond the risks of consequent financial losses and loss of image, the choice made by a company not to protect its data can strongly impact its development.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Let's take the example of a company that wants to open its capital to potential future investors. The latter will certainly want to carry out <\/span><b><span data-contrast=\"none\">an acquisition audit <\/span><\/b><span data-contrast=\"none\">beforehand, which will concern various aspects of the company, and in particular the analysis of the IS. In this case, non-compliance with the protection of personal data will undoubtedly prove to be a penalizing element.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The same is true when a company wants to obtain an ISO (International Organization for Standardization) type <\/span><b><span data-contrast=\"none\">certification<\/span><\/b><span data-contrast=\"none\">, and especially the 27000 standards, related to information security. Indeed, since 2022, the standard has been deepened with many concepts from the GDPR, including data protection via anonymization.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Even more impactful, non-compliance can have significant <\/span><b><span data-contrast=\"none\">business repercussions.<\/span><\/b><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">When customers begin a data protection compliance process, they <\/span><b><span data-contrast=\"none\">audit their suppliers <\/span><\/b><span data-contrast=\"none\">to see if they are also compliant. If they are not, they will turn to other providers. In this case, the impact on the business, even on long-time customers, can be significant.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Non-compliance may also result in <\/span><b><span data-contrast=\"none\">loss of business <\/span><\/b><span data-contrast=\"none\">in the<\/span> <span data-contrast=\"none\">case of a tender. In the context of a public contract, the contracting authority will have to ensure that the subcontractor complies with data protection regulations. If not, the contracting authority will choose a more virtuous subcontractor.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Compliance risks <\/span><\/b><span data-contrast=\"none\">are also regularly underestimated.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Every organization needs to be able to handle a request for the right to be forgotten, whether it comes from an employee, a prospect or even a customer. According to <\/span><a href=\"https:\/\/www.linkedin.com\/feed\/update\/urn:li:activity:6920007757802672128\/\"><span data-contrast=\"none\">one of our recent surveys<\/span><\/a><span data-contrast=\"none\">, 28% of respondents have already asked a company to apply their right to be forgotten, or right to erasure.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">If an organization is unable to respond positively to these requests, the applicant may <\/span><b><span data-contrast=\"none\">refer the matter to the data protection authority<\/span><\/b><span data-contrast=\"none\">, which will audit and sanction the organization if it is unable to apply this right.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Moreover, the data protection authority is increasingly carrying out unannounced checks. If these checks were infrequent even a few years ago, the European data protection authorities now consider that companies have had ample time to comply with the GDPR, since its implementation in 2018.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">If a violation of the personal data protection rules is proven, the consequences can be disastrous for the organization. Fines (up to 4% of the turnover or 20 M\u20ac) and loss of image come to mind, but there is a potentially even more dramatic risk: <\/span><b><span data-contrast=\"none\">the administrative prohibition of the implementation of non-compliant processes. <\/span><\/b><span data-contrast=\"none\">In some cases, this can lead to the suspension or even the end of the company's activity if it relies on these processes.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">Conclusion<\/h2><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-content-alignment:left;\"><p><span data-contrast=\"none\">Any company that decides not to comply with the regulations on the protection of personal data would be exposed to considerable risks today. Whether they are financial, image, loss of business or risk of suspension of activity.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">However, this compliance, although sometimes experienced as a real constraint, is ultimately virtuous for companies, since it strengthens confidence in its entire ecosystem, whether employees, customers, or subcontractors.<\/span><span data-ccp-props=\"\">\u00a0<\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:rgb(234, 80, 80);--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><p><strong>[Webinar] Protection of personal data: How and when should you anonymize?<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#356897;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/resources\/webinars-resources\/protection-of-personal-data-how-and-when-should-you-anonymize\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Watch the Webinar <\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:560px;--awb-max-height:315px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"Iv-vbM6J3FE\" class=\"landscape\" params=\"wmode=transparent&autoplay=1rel=0&amp;enablejsapi=1\" title=\"YouTube video player 1\" data-button-label=\"Play Video\" width=\"560\" height=\"315\" data-thumbnail-size=\"auto\" data-no-cookie=\"on\"><\/lite-youtube><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Find out in this article the different risks for companies of working with non-anonymized data.<\/p>\n","protected":false},"author":5,"featured_media":6932,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113,111],"tags":[],"class_list":["post-7202","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-resources"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What are the risks of working with non-anonymized data? | Blog<\/title>\n<meta name=\"description\" content=\"Find out in this article the different risks for companies of working with non-anonymized data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What are the risks of working with non-anonymized data? | Blog\" \/>\n<meta property=\"og:description\" content=\"Find out in this article the different risks for companies of working with non-anonymized data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-29T08:24:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-18T10:45:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"headline\":\"What are the risks of working with non-anonymized data?\",\"datePublished\":\"2022-06-29T08:24:25+00:00\",\"dateModified\":\"2025-11-18T10:45:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/\"},\"wordCount\":3475,\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png\",\"articleSection\":[\"Blog\",\"Resources\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/\",\"name\":\"What are the risks of working with non-anonymized data? | Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png\",\"datePublished\":\"2022-06-29T08:24:25+00:00\",\"dateModified\":\"2025-11-18T10:45:35+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"description\":\"Find out in this article the different risks for companies of working with non-anonymized data.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/#primaryimage\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png\",\"contentUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png\",\"width\":940,\"height\":350},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\",\"name\":\"Myriam Goutte\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What are the risks of working with non-anonymized data? | Blog","description":"Find out in this article the different risks for companies of working with non-anonymized data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/","og_locale":"en_US","og_type":"article","og_title":"What are the risks of working with non-anonymized data? | Blog","og_description":"Find out in this article the different risks for companies of working with non-anonymized data.","og_url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2022-06-29T08:24:25+00:00","article_modified_time":"2025-11-18T10:45:35+00:00","og_image":[{"width":940,"height":350,"url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png","type":"image\/png"}],"author":"Myriam Goutte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"headline":"What are the risks of working with non-anonymized data?","datePublished":"2022-06-29T08:24:25+00:00","dateModified":"2025-11-18T10:45:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/"},"wordCount":3475,"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png","articleSection":["Blog","Resources"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/","url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/","name":"What are the risks of working with non-anonymized data? | Blog","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png","datePublished":"2022-06-29T08:24:25+00:00","dateModified":"2025-11-18T10:45:35+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"description":"Find out in this article the different risks for companies of working with non-anonymized data.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/blog-en\/what-are-the-risks-of-working-with-non-anonymized-data\/#primaryimage","url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png","contentUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2022\/07\/banner-blog-risque-de-travailler-avec-donnees-non-anonymisees.png","width":940,"height":350},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2","name":"Myriam Goutte"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/7202","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/comments?post=7202"}],"version-history":[{"count":4,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/7202\/revisions"}],"predecessor-version":[{"id":13079,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/7202\/revisions\/13079"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media\/6932"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media?parent=7202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/categories?post=7202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/tags?post=7202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}