Identify and action Personally Identifiable Information (PII) and other sensitive content to comply with data privacy regulations (GDPR, CCPA, NYDFS).
The rise and prominence of data privacy regulation worldwide has catapulted the use of AutoClassification to locate, identify, analyze, and action content across data silos and geographic boundaries. Organizaitons are scrambling to coordinate and control sensitive information in the enterprise.
Proper Information Governance, let alone the penalties typically associated with violating the regulations, demand that we not only know what content we have (and where), but that we defensibly manage access to it, with proper data privacy controls in place for Personally Identifiable Information (PII), Protected Health Information (PHI), Payment/Credit Card Information (PCI) and sensitive, need-to-know corporate information.
You can’t protect sensitive data if you don’t know what you have or where it is.
PII Detection & Redaction
Flexible document redaction across multiple data environments.
Valora’s PowerHouse Suite offers customizable information capture and redaction options — across hundreds of document types, industries and instances — for managing, handling, protecting and redacting PII, PHI, PCI, competitive corporate information, issues of work product and other sensitive information. Valora’s redaction output includes:
- Straight redaction to blacked out text (blackbar)
- Redaction to black-out with custom overlay text (ex: “Intentionally Removed”)
- Highlighted “see-through” proposed/temporary redactions that can be reviewed by attorneys or in other systems
- Available in fully-automated, semi-automated, and fully manual approaches
GDPR & Privacy Compliance
Satisfy GDPR requirements for data handling and access.
The General Data Protection Regulation’s (GDPR) data protection protocols must be in place for Personally Identifiable Information (PII), of all EU citizens, regardless of where that information is sent, processed or stored. In addition, the company possessing such PII data must have a process in place to verify and prove that valid protections exist. Valora’s PowerHouse Suite allows for:
- Defensible, documented and automated process for the detection and disposition of PII
- Locating relevant, responsive information to satisfy Data Subject Access Requests (DSARs)
- Enforcing corporate document retention schedules
- Data mapping, data mining and data analytics tool for Data Protection Officers (DPO) and data handlers
Implementing Data Privacy: Valora’s Proven Approach
Locate PII and other sensitive data from multiple sources across the entire enterprise with Valora’s 5-step methodology and AutoClassification technology.
Uncover all content that contains Personally Identifiable Information (PII).
Scan and locate content from all disparate data sources across the entire business to identify content that contains PII; from emails and embedded attachments to shared drives and cloud storage environments.
Determine the context of the PII.
An instance of Not just Personally Identifiable Information (PII) such as drivers licenses or Social Security Numbers, but also Personally Identifiable Health Information (PIHI) and sensitive corporate information like employment agreements, financial statements and contracts.
Understand the data & make business decisions.
Is it a customer list with first name and last name? Or is a loan application with birth dates, Social Security number and banking details? Evaluate and analyze your data to better understand PII data residency, trends and activities across your business so you can make business decisions on how to handle sensitive information.
Establish processes to handle PII & action DSAR requests
Automatically classify files by content, location, or other attributes and automate rules for data handling of specific PII. Apply custom retention schedules and execute Data Subject Access Requests (DSAR) under GDPR.
Automate the application of processes and procedures.
Constantly monitor and audit data environments for new and edited content and automatically apply appropriate rules to secure and protect sensitive data.