AutoClassification Software data mines enterprise information at the content level, and then categorizes files based on the information’s substance. This technology is already being utilized by many enterprises as part of their Information Governance, Records Management or eDiscovery strategies to manage and control content. AutoClassification’s ability to group information by category or by specific characteristics proves useful for Metadata Tagging, Retention, Compliance, Data Privacy, Legal Hold, ROT and Data Migration, and many other specialized use cases. 

AutoClassification software uses both pattern-matching algorithms as well as artificial intelligence to detect file contents and attributes such as: personal information; authorship and origin; type or format of document; and geographical or departmental source.  In addition, AutoClassification technologies follow a set of customized rules regarding file disposition, such as:  retention schedules and handling; security access controls; data privacy compliance; and appropriate storage location. 

For example, a rules-based AutoClassification system will:

  • Determine the file’s Document Type (e.g., letter, sales forecast, employment application)
  • Determine the appropriate Records Retention Schedule
  • Enforce the specific retention schedule for both handling and time duration
  • Classify and place the file into a recommended location within a folder taxonomy structure
AutoClassification Client Case Study

Legal Hold optimization
Top Twelve AutoClassification Use Cases, from Migration & Upgrades, to Conversion, and Data Privacy

AutoClassification technology specifically meets the GDPR and other data privacy requirements to:

  1. Have a system in place that can detect what information an organization has
  2. Where it lives and how it will be handled under differing circumstances
  3. Locate relevant, responsive information following a Data Subject Access Request (DSAR)
  4. “Forget” or redact personal data, on demand

With a proper Rules Engine, sensitive information is protected via individual security level restrictions, including limitations based on the geographical location of the user attempting access.  Rules are further used to block improper information transfer across country or network system borders. Finally, rules are used to trigger certain events, such as an expiration date associated with certain data which would make such information eligible for deletion. 

For more information, please select any of the below links: