10/03/02
16
Microdata (cont’d)
•Because of the expansion of data available via the internet it is critical to conduct “re-identification assessments” that attempt to ascertain the identify of individuals. Some agencies have hired "hackers" under contract to do this; some do it in-house.  Needs to be done
–prior to the release of all microdata files and
–on earlier microdata data releases: important to determine whether or not microdata files which were once deemed "protected" can inadvertently be re-identified.
•