Information Extraction Under Privacy Constraints