I've been in security a long time and the topic of PII comes up more frequently than you can imagine. The typical business user of information wants a 'list' of data points that are PII, while this is easy to provide the list changes over time. What's… more »