Description
Date and time data such as birthdates, timestamps, and event logs, may seem harmless but can be used to identify individuals when combined with other information. For example, a person’s date of birth is often used in identity verification processes. Exposure of such information can lead to privacy breaches and non-compliance with data protection regulations such as HIPAA and GDPR.
Detection Steps
Search for common date/time formats in the data (e.g., MM/DD/YYYY, YYYY-MM-DD, or timestamps).
Use a regular expression like \d{2}-\d{2}-\d{4} to find dates written as DD-MM-YYYY.
Manually review the flagged data to confirm if it includes sensitive date/time information.
Description
Date and time data such as birthdates, timestamps, and event logs, may seem harmless but can be used to identify individuals when combined with other information. For example, a person’s date of birth is often used in identity verification processes. Exposure of such information can lead to privacy breaches and non-compliance with data protection regulations such as HIPAA and GDPR.
Detection Steps
Search for common date/time formats in the data (e.g., MM/DD/YYYY, YYYY-MM-DD, or timestamps).
Use a regular expression like \d{2}-\d{2}-\d{4} to find dates written as DD-MM-YYYY.
Manually review the flagged data to confirm if it includes sensitive date/time information.