PII Examples

Cole PrudenPersonal Data, PII, PII Examples

An illustrative image of PII examples by PII Tools

Below you’ll find a list of made up PII examples to help you better understand what PII looks like in the real world. You’ll also find a downloadable file attached to each point with specified (fake) PII examples you can then use to test your discovery solution. Enjoy. PII includes, but is not limited to: Names: Full name, First name, … Read More

How To: Understanding HIPAA Compliance

Cole PrudenHIPAA Compliance, PHI, PII

An illustrative picture with a hippo for HIPAA by PII Tools

For many readers, when they hear the words “the Health Insurance Portability and Accountability Act (HIPAA)”, their eyelids immediately start to droop. But I’m sure getting slapped with an annual $1.5 million fine would wake them up! Whether you’re the one handling the data or the actual patient looking to protect your rights, it’s time to become a HIPAA expert … Read More

How to remediate PII?

Radim ŘehůřekPersonal Data Protection, PII Remediation, Sensitive Data Remediation

A screenshot of the dashboard in PII Tools

PII Tools lets you automatically quarantine, erase, and redact files and emails to sanitize high-risk data. It works equally well over local data (file shares, laptops, devices) and cloud data (including Exchange emails and their attachments, Sharepoint, OneDrive), so let’s explore how to apply remediation to your workflow. Let’s assume you’ve already identified where the sensitive data lives and which … Read More

How to Identify Leaked Data

Cole PrudenData Leak, Leak Management, Sensitive Data Discovery

An illustrative picture for phishing attacks by PII Tools

A data breach can happen to anyone at any time. Although there are many steps in responding to such a breach, the first is actually locating the data in question. If you’ve suffered a breach of information, how do you identify all affected parties? Detecting the Leak There are multiple ways you can tell you’re dealing with a data breach, … Read More

Data Leaks: How to Eliminate Employee Error

Cole PrudenData Breaches, Data Leak Prevention, Personal Data Protection, Reducing Employee Negligence

An illustrative picture for data leaks PII Tools

Nearly 90% of breach incidents are caused by human error. No matter the size of the company, the employees hold the key to reducing potential data loss. What can you do to eliminate data leaks from occurring in your business? What is a Data Leak? A data leak, often called a data breach, is the intentional or unintentional release of … Read More

Scanning Office 365 for sensitive PII information

Radim ŘehůřekPersonal Data, Security

The logos of Office 365 and PII Tools illustrating the integration

Discover personal & sensitive data inside Office 365 accounts and remediate it. This includes both structured and unstructured data in Microsoft OneDrive, Microsoft Exchange Online, and Sharepoint Online. What does “support Office 365” mean? With PII Tools, you directly find, review, and remediate personal and sensitive information in documents, emails, and tables shared within your company’s Office 365 accounts. No … Read More

Making GDPR Compliance Simple

Cole PrudenPersonal Data Discovery, Regulatory Compliance, Self-Hosted Auditing Software

An infographic on EU GDPR PII Tools

By now, we should all be well aware of the GDPR and what it means for our business. How is it then that so many companies remain GDPR non-compliant? Is the regulation too complicated, too time-consuming, or is it just a hassle? Discover everything you need to know to easily comply with the GDPR today. What is the GDPR and … Read More