PII De-Identification vs. Masking vs. Redaction

Cole PrudenDe-Identification, Personal Data Protection, Sensitive Data

A graphic on data de-identification by PII Tools

There’s a fine balance between processing users’ PII and storing it safely. The primary ways to encrypt information are Data De-Identification, Data Masking, and Data Redaction. But how exactly do they work? Let’s explore. Data De-Identification To put it plainly, data de-identification is the process of removing personally identifiable information (PII) from data. The purpose of data or PII de-identification … Read More

AI and Machine Learning in Sensitive Data Management

Cole PrudenArtificial Intelligence, Personal Data, Sensitive Data

A title image for a blog post AI and machine learning in sensitive data management by PII Tools

With more tools at our disposal than ever before, how can you use artificial intelligence and machine learning to handle PII and sensitive data effectively? Modern AI & Machine Learning At this point, artificial intelligence (AI) and machine learning (ML) don’t need much of an introduction. Our phones, cars, televisions… even some smart refrigerators come equipped with AI and ML … Read More

The Evolution of PII Protection: From Paper to Digital

Cole PrudenArtificial Intelligence, Data Discovery, Data Protection, Personal Data, PII, Sensitive Data

A picture for a blog post The Evolution of PII Protection: From Paper to Digital PII Tools

PII has come a long way in a relatively short time, yet protecting it fully is like trying to shield a moving target. But sometimes the best way to choose a path forward is to peek at the past and learn from its evolution. Humble Beginnings It’s hard to think about PII, or rather Personally Identifiable Information, without also imaging … Read More

Understanding PCI DSS v4.0

Cole PrudenData Privacy Regulations, Data Protection, PCI DSS, Sensitive Data, Sensitive Information

A title image for the blog article Understanding PCI DSS v4 PII Tools

Understanding PCI DSS v4.0 The latest update to the PCI DSS is finally in full force. Discover the ins and outs of this sometimes tricky regulation and make sure you’re processes are still up-to-date. Let’s get into it! A Quick Refresher If your business accepts cards in any way, it’s safe to guess you’re already well familiar with the PCI … Read More

How to: Protecting ePHI

Cole PrudenPII, Sensitive Data, Sensitive Data Discovery

title image for blog post Protecting ePHI by PII Tools

The average healthcare breach exposes 3+ million private patient records. What are you doing to discover, store, and protect ePHI? Why the ‘e’ in ‘ePHI’? HIPAA, PHI, PII, GDPR, ePHI… Where would we be without our acronyms? If you’re interested in protecting ePHI, it’s safe to say none of these are entirely new to you. The most important to our … Read More

Data Redaction: The Essential Guide to Protecting Sensitive Data

Cole PrudenData Protection, Personal Data, PII, Sensitive Data

PDF in-file data redaction example of before and after by PII Tools

The long-awaited data redaction feature by PII Tools is finally here. Generate new, AI-driven PDFs from original files with all personal data automatically blacked out – this is the future of genuinely efficient data redaction. What Does Data Redaction Mean At PII Tools, we’ve made it our calling to create AI-driven software to maximize data discovery and the remediation of … Read More