A system and method for protecting queryable data. Specifically, the method is implemented in a system for targeted data delivery. The method includes collecting user information about a user and generating a user profile based on the user information. The user profile is divided into at least one part. Each part of the user profile is concealed such that each part of the user profile is only accessible using a corresponding tool controlled by a third party.