AI and Machine Learning in Sensitive Data Management

Cole PrudenArtificial Intelligence, Personal Data, Sensitive Data

A title image for a blog post AI and machine learning in sensitive data management by PII Tools

With more tools at our disposal than ever before, how can you use artificial intelligence and machine learning to handle PII and sensitive data effectively? Smart Everything At this point, artificial intelligence (AI) and machine learning (ML) don’t need much of an introduction. Our phones, cars, televisions… even some smart refrigerators come equipped with AI and ML algorithms. It wouldn’t … Read More

Classify Data in 3 Easy Steps

Cole PrudenData Discovery, PII

Dashboard screenshot from PII Tools

Quick scans, Custom Detectors, and Custom Severity. Learn to classify information automatically and guarantee every piece of your data protection puzzle is perfectly in place. Why Classify Data? Before we get to the details, it’s worth mentioning the main reasons why you should even bother to classify different types of personal data. On average, companies keep over 2 PB of … Read More

Data Redaction: The Essential Guide to Protecting Sensitive Data

Cole PrudenData Protection, Personal Data, PII, Sensitive Data

PDF in-file data redaction example of before and after by PII Tools

The long-awaited data redaction feature by PII Tools is finally here. Generate new, AI-driven PDFs from original files with all personal data automatically blacked out – this is the future of genuinely efficient data redaction. What Does Data Redaction Mean At PII Tools, we’ve made it our calling to create AI-driven software to maximize data discovery and the remediation of … Read More

Person Cards® – The Holy Grail of Data Discovery

Cole PrudenData Discovery, GDPR, PHI, PII

An infographic of DSAR Automation PII Tools

By 2025, the global datasphere is estimated to hold as much as 175 zettabytes of data. How can companies today possibly have a chance to organize that much information? The answer: Person Cards®. More Data, More Problems 175 zettabytes of data worldwide? Considering a single zettabyte is equal to a trillion gigabytes (yes, with a ‘T’), the actual amount of … Read More

PII Examples

Cole PrudenPersonal Data, PII, PII Examples

An illustrative image of PII examples by PII Tools

Below you’ll find a list of made up PII examples to help you better understand what PII looks like in the real world. You’ll also find a downloadable file attached to each point with specified (fake) PII examples you can then use to test your discovery solution. Enjoy. PII includes, but is not limited to: Names: Full name, First name, … Read More

The Complete Guide to PII

Cole PrudenPersonal Data, PII, PII Examples

An example of PII data by PII Tools

Ever wondered what’s the difference between PII and personal data? Maybe you wanted to see a list of PII types and its examples? Not sure when regular information turns into PII? Read on to find all the answers and more. PII… Ever Heard of It? To start, let’s get the definition out of the way. PII stands for Personally Identifiable … Read More

How To: Understanding HIPAA Compliance

Cole PrudenHIPAA Compliance, PHI, PII

An illustrative picture with a hippo for HIPAA by PII Tools

For many readers, when they hear the words “the Health Insurance Portability and Accountability Act (HIPAA)”, their eyelids immediately start to droop. But I’m sure getting slapped with an annual $1.5 million fine would wake them up! Whether you’re the one handling the data or the actual patient looking to protect your rights, it’s time to become a HIPAA expert … Read More

How to Identify Leaked Data

Cole PrudenData Leak, Leak Management, Sensitive Data Discovery

An illustrative picture for phishing attacks by PII Tools

A data breach can happen to anyone at any time. Although there are many steps in responding to such a breach, the first is actually locating the data in question. If you’ve suffered a breach of information, how do you identify all affected parties? Detecting the Leak There are multiple ways you can tell you’re dealing with a data breach, … Read More