SECURING PERSONALLY IDENTIFIABLE INFORMATION: A SURVEY OF SOTA TECHNIQUES, AND A WAY FORWARD