Person Cards®

The holy grail of data discovery you’ve
been waiting for. A true game changer for
breach investigations, DSAR requests,
and privacy practice in general.



Built for Incident Response Investigations

Clients worldwide use PII Tools for breach investigations and DSAR requests.
Clients worldwide use PII Tools for breach investigations and DSAR requests.
greenpages digital cloud security
king and spalding
consilio
cs cyber solace business technology risk advisory
mayer brown
titus

Our Customers Say…

Mark Cassetta SVP Strategy

Mark Cassetta

SVP Strategy

“Our survey found that 22% of the time, humans failed to identify personal data in documents, while PII Tools succeeded in all scenarios. By integrating with PII Tools, Titus was able to significantly reduce the compliance risk for our customers.”

titus
Raul Diaz Senior Director IT

Raul Diaz

Senior Director, IT

“A manual data review would take us years and years, which was not an option. PII Tools provides us with a full report wherever there is any PII on our Sharepoint, GSuite, Microsoft Exchange, Salesforce, and physical devices.”

indigo
Shane Reid Group Director CEO North America

Shane Reid

Group Director, CEO – North America

“Integrating PII Tools has allowed Umlaut Solutions to handle petabytes of client data seamlessly, enhancing accuracy and reducing the risk of data breaches.”

umlaut empowering your data

What Are Person Cards®?

Who's in the Data?

PII Tools automatically links up all of the PII, PCI and PHI that its AI detectors found on each individual, such as their name, email, DoB or credit card, from both structured and unstructured data, files, emails and databases.

The resulting rolled-up Person Cards can be exported into a spreadsheet for easier import into Relativity and other eDiscovery platforms. Unassigned PII is included as well of course, for manual review and quality control.

  • Automatic PII assignment
  • Structured and unstructured data
  • Actionable CSV reports
person cards automatically links up all of the pii pci phi
Complete PII Aggregation
  • Surgical review with exact PII locations
  • PII analytics to focus on relevant records
  • Built-in risk classification

The PII detection and linking is completely automatic and aggregates PII across the whole inventory, not just within one document.

For example, a Person Card may list that person's SSN as discovered in a PDF form, plus their DoB and address found in a SQL table, and credit card and passport as OCRed from an email attachment.

All rolled up neatly into one row – for easy export and review.

The Million Dollar Question

"Who was in the data and what information do we keep on them?"

First, automatically discover all of the people who appear in a dataset, along with all PII & PCI & PHI instances in the dataset.

Then let PII Tools link up PII instances to individuals. Export the created Person Cards to guide incident response teams and answer subject access requests quickly and with confidence.

  • Identify all people and their sensitive data
  • AI for fast and reliable automation
  • Built for legal and forensic teams

Check out Our Unique Features

PII Tools runs within your own infrastructure – on your servers or in your cloud. There are no external calls, meaning you have complete control over all the managed data and IT security. The self-hosted management is ideal for forensic deployment.
PII Tools runs within your own infrastructure – on your servers or in your cloud. There are no external calls, meaning you have complete control over all the managed data and IT security. The self-hosted management is ideal for forensic deployment.
check out our unique features

Detect PII Data in 400+ File Formats

PII Tools scans through all the sensitive data your clients uploaded into your environment, local or on the cloud, emails, databases, structured, unstructured, and images. It comes with built-in OCR and image facial recognition AI technology.
PII Tools scans through all the sensitive data your clients uploaded into your environment, local or on the cloud, emails, databases, structured, unstructured, and images. It comes with built-in OCR and image facial recognition AI technology.
pdf xlsx doc pst csv log zip jpg files

What if There’s a Data Breach?

Use PII Tools to quickly find out whose data was affected, and share clear reports with colleagues, customers, and the authorities so they can proceed with corrective action.
Use PII Tools to quickly find out which data was affected, and share clear reports with your colleagues, customers, and the authorities so they can proceed with corrective action.