Person Cards

The holy grail of data discovery you’ve
been waiting for. A true game changer for
breach investigations, DSAR requests,
and privacy practice in general.


What are Person Cards?

Who's in the data?

PII Tools automatically links up all of the PII, PCI and PHI that its AI detectors found on each individual, such as their name, email, DoB or credit card, from both structured and unstructured data, files, emails and databases.

The resulting rolled-up Person Cards can be exported into a spreadsheet for easier import into Relativity and other eDiscovery platforms. Unassigned PII is included as well of course, for manual review and quality control.

  • Automatic PII assignment
  • Structured and unstructured data
  • Actionable CSV reports
Image
Image
Complete PII aggregation
  • Surgical review with exact PII locations
  • PII analytics to focus on relevant records
  • Built-in risk classification

The PII detection and linking is completely automatic and aggregates PII across the whole inventory, not just within one document.

For example, a Person Card may list that person's SSN as discovered in a PDF form, plus their DoB and address found in a SQL table, and credit card and passport as OCRed from an email attachment.

All rolled up neatly into one row – for easy export and review.

The million dollar question

"Who was in the data and what information do we keep on them?"

First, automatically discover all of the people who appear in a dataset, along with all PII & PCI & PHI instances in the dataset.

Then let PII Tools link up PII instances to individuals. Export the created Person Cards to guide incident response teams and answer subject access requests quickly and with confidence.

  • Identify all people and their sensitive data
  • AI for fast and reliable automation
  • Built for legal and forensic teams
Image

Built for incident response investigations

Clients worldwide use PII Tools for breach investigations and DSAR requests.
Clients worldwide use PII Tools for breach investigations and DSAR requests.
Image
Image
Image
Image

Check out our unique features

PII Tools runs within your own infrastructure – on your servers or in your cloud. There are no external calls, meaning you have complete control over all the managed data and IT security. The self-hosted management is ideal for forensic deployment.
PII Tools runs within your own infrastructure – on your servers or in your cloud. There are no external calls, meaning you have complete control over all the managed data and IT security. The self-hosted management is ideal for forensic deployment.
Image

Detect PII data in 400+ file formats

PII Tools scans through all the sensitive data your clients uploaded into your environment, local or on the cloud, emails, databases, structured, unstructured, and images. It comes with built-in OCR and image facial recognition AI technology.
PII Tools scans through all the sensitive data your clients uploaded into your environment, local or on the cloud, emails, databases, structured, unstructured, and images. It comes with built-in OCR and image facial recognition AI technology.
Image

What if there’s a data breach?

Use PII Tools to quickly find out whose data was affected, and share clear reports with colleagues, customers, and the authorities so they can proceed with corrective action.
Use PII Tools to quickly find out which data was affected, and share clear reports with your colleagues, customers, and the authorities so they can proceed with corrective action.