PII Examples

Cole PrudenPersonal Data, PII, PII Examples

An illustrative image of PII examples by PII Tools

Below you’ll find a list of made up PII examples to help you better understand what PII looks like in the real world. You’ll also find a downloadable file attached to each point with specified (fake) PII examples you can then use to test your discovery solution. Enjoy. PII includes, but is not limited to: Names: Full name, First name, … Read More

The Complete Guide to PII

Cole PrudenPersonal Data, PII, PII Examples

An example of PII data by PII Tools

Ever wondered what’s the difference between PII and personal data? Maybe you wanted to see a list of PII types and its examples? Not sure when regular information turns into PII? Read on to find all the answers and more. PII… Ever Heard of It? To start, let’s get the definition out of the way. PII stands for Personally Identifiable … Read More

Scanning Office 365 for sensitive PII information

Radim ŘehůřekPersonal Data, Security

The logos of Office 365 and PII Tools illustrating the integration

Discover personal & sensitive data inside Office 365 accounts and remediate it. This includes both structured and unstructured data in Microsoft OneDrive, Microsoft Exchange Online, and Sharepoint Online. What does “support Office 365” mean? With PII Tools, you directly find, review, and remediate personal and sensitive information in documents, emails, and tables shared within your company’s Office 365 accounts. No … Read More

How to Identify Personal Data in the 21st Century

Cole PrudenData Discovery, Personal Data, Sensitive Information

An illustrative picture for a blog article on how to identify personal data by PII Tools

Personal data comes in many shapes and sizes. As business owners, company employees, and internet consumers, it’s our job to know what personal data is and how to locate and protect it. But now that the new millennium is well on its way, is there any new technology out there that can help? Where to Get Started? Step one is … Read More

Learning the Difference Between Data Privacy and Data Security

Martin JanoušekData Privacy Regulations, Personal Data, Personal Data Protection

An illustrative picture for Data Privacy versus Data Security PII Tools

Companies often believe that by securing their sensitive data, they automatically comply with the requirements of various data privacy regulations (GDPR, HIPAA, CCPA, etc.). Unfortunately, this is not the case. Let’s take a look at these two terms to understand the difference and make sure you adhere to both. It’s a bad habit to treat data security and data privacy … Read More

What Are Sensitive Data Discovery Tools and How Do They Work?

Cole PrudenData Discovery, Personal Data, Real-Time Automation

A graph showing sensitive data in the cloud PII Tools

With technology progressing and changing every day, it can sometimes be difficult to keep up with the times. As a business, however, falling behind can mean letting important (and legally binding) information fall through the cracks, disappointing customers and losing the trust of business partners. This is where sensitive data discovery tools come into play. But what exactly are they … Read More

Detect person names in text: Part 2 (Technical)

Jan ProcházkaDeep Learning, Personal Data, Whitepaper

Neural network chart architecture PII Tools

In Detect Person Names in Text: Part 1 (Results), we benchmarked our new named entity recognizer (NER) against popular open source alternatives, such as Stanford NER, Stanza and SpaCy. Today we dig a little deeper into the NER architecture and technical details. First, recall our main NER objectives. In short, we require our NER to be practical, rather than just … Read More

Detect person names in text: Part 1 (Results)

Jan ProcházkaDeep Learning, Personal Data, Whitepaper

F1 scores for different software doing personal name detection PII Tools

Detecting people’s names is part and parcel of PII discovery. Traditional techniques like regexps and keywords don’t work, because the set of all names is too varied. How do open source Named Entity Recognition (NER) engines compare, and can we do better? This Part 1 has NER results and benchmarks. There’s also Part 2 with technical neural network details. Developing … Read More

How to evaluate PII discovery software

Radim ŘehůřekDeep Learning, Personal Data

An example passport PII Tools

So, you’re considering buying software for discovery of PII / PCI / PHI. Or about to start your trial of PII Tools. How to test discovery SW properly? Don’ts: Careful what you test for Consider the following “passport”: Why won’t PII Tools detect the “PII” in this passport scan? This is an actual file submitted to our support team during … Read More