PII Tagging Suggestions

Leverage Catalog to automatically flag all your PII columns and tables.

Overview

Our system employs an auto-detection mechanism to handle Personally Identifiable Information (PII) efficiently. This process involves analyzing metadata to identify and categorize PII.

Auto-Detection Process

Metadata Scanning:

The system automatically scans metadata to identify potential PII. By analyzing metadata, the system can detect sensitive information without accessing the actual content of the data.

Detection Patterns:

Our auto-detection model uses predefined detection patterns to identify PII. These patterns include a variety of rules and regular expressions tailored to recognize common forms of PII.

Categorization of PII

Identification and Tagging:

Once the system detects potential PII, it categorizes and tags the information accordingly.

Tagging the detected PII helps in classifying and managing sensitive information effectively, ensuring that it is handled appropriately.

Customization

Flexible Detection Patterns:

The detection and tagging process is customizable to fit specific user needs and contexts. Users can provide a list of specific PII terms or patterns that they want the system to detect. This flexibility allows the system to adapt to various data privacy and security requirements.

Last updated

Was this helpful?