Return to Article Details Processing Data to Protect Data: Resolving the Breach Detection Paradox Download Download PDF