Outsmart Risk. Find & Consistently Anonymize PII in Structured, Semi-Structured, and Unstructured Sources.
Classify, Locate, De-Identify, and Prove
Unmasked data can damage your company's reputation and cost it millions in fines. Award-winning on-premise data anonymization tools from IRI have been repeatedly proven in a wide range of data breach nullification, privacy law compliance, and DevOps (test data) environments. Use a fit-for-purpose IRI data 'shield' product (or more than one in the IRI Voracity data management platform) to find and mask sensitive data, preserve referential integrity, and prove it.
- Types of Sensitive Data
Comply with Data Privacy Laws
Data privacy laws require that key identifiers be encrypted, pseudonymized, redacted, or scrambled, and that quasi-identifiers be anonymized to prevent re-identification. IRI data and database masking tools can find and obfuscate PII in multiple structured, semi-strutured, and unstructured sources to meet the data erasure, portability and rectification requirements of the GDPR et al, and score re-ID risk for HIPAA, etc. Inquire about your mandates.
Apply Multiple Masking Methods
Use the IRI Workbench IDE for IRI FieldShield or DarkShield, built on Eclipse™, to discover, classify, and mask data quickly and easily. Blur, encrypt, hash, pseudonymize, randomize, redact, scramble, tokenize, etc. Pair a deterministic data masking function to your search-matched data classes, and apply it consistently to preserve realism and referential integrity enterprise-wide.
Use Role Based Access Controls
Decide and enforce who can access or use specific data sources and targets; masking rules and job scripts; data classifications and data layout definitions; decryption keys and log files; and, even the masking programs themselves. Establish different roles for different data sources, and different access rights based on those roles.
Leverage Multiple Audit Logs
All IRI data obfuscation tools produces machine-readable audit logs that you can secure, query, and display, or export to SIEM tools, to: reliably document everything that's been changed, verify compliance with data privacy laws without tampering concerns, trigger alerts, and take action. This is how sensitive data auditing should work.
Learn Which Data Masking Tool to Use
Find, classify, mask, and risk-score PII across structured data sources, including legacy (flat COBOL, CSV, LDIF) files, ODBC-connected databases, cloud apps like Salesforce, etc. Use AES-256 FPE, blurring, hashing, redaction, pseudonymization, tokenization, etc.
Find, report on, mask, and audit PII in one or more Excel® spreadsheets at once using point-and-click options inside Excel itself. Search and mask intracellularly, protect formulas, and even entire sheets, too.
Discover, deliver, and delete sensitive information in structured, semi-structured and unstructured sources, including: text, JSON, XML, HL7/X12, and flat files, MS & PDF documents (including embedded images), Parquet, RDB C/BLOB and free-floating text columns, NoSQL DBs (like MongoDB, Cassandra, and Elasticsearch), DICOM and other image formats, and soon audio and faces.
Get all three IRI data masking tools inside, plus test data management, within a total data lifecycle management platform that consolidates big data discovery, integration, migration, governance, and analytics. In addition to FieldShield, CellShield EE and DarkShield, Voracity includes IRI RowGen to generate synthetic, but realistic test data. Create (and mask) DB subsets, or generate smart test data from scratch for DB/ETL prototypes, analytic and AI models, product demos, and application or hardware stress-testing.
Resources
Types of Sensitive Data
- Personally Identifiable Information (PII)
- Protected Health Information (PHI)
- Primary Account Numbers (PANs)
- Other Sensitive Information
Personally Identifiable Information (PII)
While there is no set list of PII across all privacy laws, there are common elements used across these laws. In short, PII is information, when used alone or with other data, that identifies an individual. Government regulations like the CCPA, SSAE 16, SOC 2, and GDPR require that all PII be protected.
Protected Health Information (PHI)
In medical records, PHI identifies a health care recipient. US HIPAA regulations require that 18 key identifiers be effectively de-identified or anonymized.
HIPAA
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) implements industry-wide standards for health care information. Health care providers, organizations, and their associates are required to develop and follow procedures for PHI when it is transferred, received, handled, or shared. It applies to all forms of PHI, including written, electronic, and oral.
GDPR
Under the General Data Protection Regulation (GDPR), all personal data of a citizen from the European Union must be secured. Companies are required to protect any data that can directly or indirectly identify an individual ("data subject"). These identifiers include, but are not limited to:
- Social Security Number
- Credit Card Number
- Bank Account Number
- First Name
- Last Name
- Address
- Zip Code
- Email Address
- Medical Information
- Genomic Information
- IP Address
- GeolocationData
- Income and Tax Data
- Race, Ethnicity, and Religious Affiliation
- Sexual Orientation
- Trade Union Membership
- Birth Date
- Password
- Military ID
- Passport Number
- Driver's License Number
- Vehicle License Number
- Phone and Fax Numbers
The law also provides citizens with the Right to be Forgotten, or the ability to request that all information about them be removed from a company's possession. IRI data obfuscation products find that PII and PI you need in text, image, or facial form, and tell you where it is, and (immediately or later) automatically delete, deliver, and fix it so you can comply with GDPR right to erasure, portability and rectification provisions.
FERPA
The Family Educational Rights and Privacy Act (FERPA) is a federal law that protects the privacy of student records and information. FERPA gives rights and protections to parents and eligible students. Once a student reaches 18 years of age or enrolls in a post-secondary institution, he or she becomes an "eligible student," meaning all rights formerly controlled by the parents transfer to the student.
Under FERPA, a school may not generally disclose PII from an eligible student's records to third parties unless the student has provided written consent. Data protected includes PII and no less than the following additional information:
- Student Name
- Student ID Number
- Family Member Names
- Place of Birth
- Mother's Maiden Name
- Student Educational Records
- Immunization Records
- Health Records
- Individuals with Disabilities (IDEA) Records
- Attendance Records
FISMA
The Federal Information Security Management Act of 2002 (FISMA) is a federal law that recognizes the importance of data protection and information security to economic and national security interests. Every federal agency must develop, document, and implement an agency-wide course of action to secure the system and assets that support the agency, including those managed by another agency, contractor, or other sources.
Information that must be protected under FISMA includes PII and other sensitive information from these categories:
- Medical
- Financial
- Contractor Sensitive
- Security Management
- Other information specified by executive order, specific law, directive, policy, or regulation
FFIEC
The Federal Financial Institutions Examination Council (FFIEC) is a government inter-agency body that sets uniform principles, standards, and report forms to promote uniformity in the supervisions of financial institutions. Additionally, the Council oversees real estate appraisal.
Banks, credit unions, and other financial institutions are subject to the rules enacted by the Council. In addition to PII and Non-Public Personal Information (NPI), these institutions need to protect:
- Income
- Credit Score
- Collection History
- Family Member PII and NPI
CCPA
The California Consumer Privacy Act of 2018 (CCPA) protects the data of Californians from being collected and mishandled. The law grants the citizens of California the rights to know all the information a business collects on them, to forbid companies from selling their data, to delete their data, and more.
List of PII PHI PANs Other Information
- Social Security Number
- Credit Card Number
- Bank Account Number
- First Name
- Last Name
- Address
- Zip Code
- Email Address
- Birth Date
- Passwords
- Military ID
- Driver's License Number
- Vehicle License Number
- Phone Number
- Fax Number
- Names
- Addresses / Zip Codes / Geocodes
- Dates
- Phone Numbers
- Fax Numbers
- Email Addresses
- Social Security Numbers
- Medical Record Numbers
- Health Plan Beneficiary Numbers
- Account Numbers
- Certificate / License Numbers
- Vehicle Identifiers
- Device Identifiers
- URLs
- IP Addresses
- Biometric Identifiers
- Facial Images
- Any Other Unique Identifiers
-
There is no list of PANs, as they are unique to individual accounts.
A PAN is a 14, 15, or 16 digit number generated as a unique identifier for a primary account.
- Codes
- Formulas
- Trade Secrets
- Military Information
- Classified Information
- etc.