SlideShare a Scribd company logo
1 of 6
Download to read offline
Advanced RedactionTechnology: How to Provide Secure Access,
Reduce Costs and Anticipate Future Legislative Requirements

More than 11 million adult Americans were victims of Identity Theft in 2009, a 10%
increase from 2008. The collective cost of these crimes was over $54 billion. Private
information, such as Social Security numbers, within online public records can be
vulnerable to cyber criminals. It is estimated that approximately 10% of Identity Theft
cases originate with personal data collected from government records.


A Growing Legislative Concern

Across the United States, strict legislation is being passed requiring State and County
governments to redact sensitive information, such as Social Security and credit card
numbers from the official and public record. North Carolina, Pennsylvania, Iowa and
Wisconsin recently passed records modernization laws mandating the redaction of
Social Security numbers. In some states, forward-thinking local and state government
officials have independently determined that it is their responsibility to protect
constituents from identity theft.




                                                       Source information gathered from
                                                       National Conference of State Legislators
                                                       Updated May 2010

                                            1 


                                                                                                   
Redaction Defined

Redaction, sometimes referred to as sanitization, is the permanent removal of personal
or sensitive information from hard copy or electronic documents. The traditional
technique of redacting confidential material from a paper document before its public
release involves crossing out portions of text with a wide black pen, followed by
photocopying the result. This manual processing of thousands or millions of document
pages is a time-consuming process that can strain staff resources. As public records
repositories shift from paper documents to electronic images, the challenges facing
state and local governments are also shifting. Complying with state legislation and
Federal “Sunshine” laws, such as the Freedom of Information Act and Openness in
Government Act, requires a records management system, strategy and workflow that
provide data security and accessibility. Deploying automated redaction technology is a
powerful tool for securing personal data and maintaining public record access.


Automated Redaction Technology

As public records are scanned, the electronic images are processed through Optical
Character Recognition (OCR) software that converts it into a digital format. This
conversion allows the document to become “searchable” by a rules-based search
engine that locates sensitive data within the OCR results. The search engine is
powered by rules, clues, pattern recognition and algorithms designed to locate user-
defined sensitive data types. After locating a sensitive data type, the software assigns a
value that measures how well the data matches the pattern and clues. For example,
the search engine may find a Social Security number by finding the clue “SSN” followed
by a pattern of numbers such as 123-45-6789. This example falls into the “high
confidence” range of results where the clue and the number pattern found by the search
engine are an exact match. On another document, the search engine may find the clue
“SSN” followed by eight numbers instead of the standard nine-character Social Security
number. This result may be defined as “medium confidence.” These values or
“confidence” classifications are used to streamline verification workflow.


Accuracy

Accuracy refers to a mathematical calculation involving the number of sensitive data
fields found by the software compared to the total number of sensitive data types within
the record. False positives occur when software locates non-sensitive data and marks it
for redaction. This type of error is included in the overall accuracy rate.

Accuracy is arguably the most important feature of automated redaction. Because no
industry standard exists for calculating accuracy, evaluating and comparing the
accuracy rates among redaction providers can be challenging. To help facilitate the

                                            2 


                                                                                              
evaluation process, vendors’ accuracy formulas must be transparent and
straightforward. If each sensitive data type undetected by the software represents a
failure to protect a citizen’s private information, it stands to reason that the software’s
accuracy rate should be downgraded for every occurrence of this type.

Pre-verification accuracy calculates how well the software locates sensitive data
automatically, without human intervention for quality assurance (verification). Achieving
a high pre-verification accuracy rate is critical for two reasons. When redaction software
automatically finds virtually all sensitive data within records, the security of individuals’
personal data is increased. Additionally, high pre-verification accuracy dramatically
reduces labor costs.


Verification

An important part of any redaction workflow is verification or quality control. The two
most influential factors that affect verification are the quality of the paper records before
scanning and the targeted level of accuracy (higher accuracy requires more
verification). Verification workflow is based on the particular needs of each client, and
generally includes three options: 1) Fully Automated Redaction, where the software
finds and redacts sensitive information automatically. 2) Semi-Automated Redaction
allows a step for an end user to verify each redaction. 3) A Hybrid Redaction approach
allows user-defined “high confidence” redactions to be automatically processed while
lower confidence results are submitted for verification.


Impact of Pre-Verification Accuracy on Labor Costs

To demonstrate the relationship between software accuracy and verification labor costs,
here is an example of a government office processing 40,000 image pages of records
per month utilizing the Hybrid Redaction workflow. Software #1 has a pre-verification
accuracy rate of 80% and Software #2 has an accuracy rate of 99%.


                            Verification Labor Costs:
         40,000 Pages of Records/Month Using Hybrid Redaction Workflow

                                         Software #1                  Software #2  
                                         (80% Accuracy)               (99% Accuracy) 
Pages Processed/Day                                          1,905                            1,905
Pages to be Verified/Day                                       381                               19
Verification Labor in Hours/Day                                 1.5                            0.08
Verification Labor in Hours/Month                             31.5                              1.7
Verification Labor in Hours/Year                               378                               20
~ Annual Verification Labor Costs                           $7,500                            $400 
                                              3 


                                                                                                       
Selecting a Redaction Provider

The redaction vendor selection process should consider 1) experience, 2) accuracy and
3) overall technology.

1. Experienced redaction providers have completed installations with many different
types of records management software. The exposure to different systems helps
seasoned customer support teams anticipate problems before they happen. Verification
labor is often the highest cost within a redaction project. Working with a team
experienced in verification workflow maximizes accuracy, minimizes human intervention
and saves money.

2. The quality of paper records and the complexity of the data to be redacted have an
impact on the accuracy that can achieved for each project. Under most circumstances,
high quality automated redaction can achieve a pre-verification accuracy rate of 95%.

3. Redaction is an evolving technology. Top vendors are constantly adding new
technology to improve accuracy and speed, and to meet the emerging needs of
governments.

Privacy and Information Security Regulations: What Does the Future Hold?

The threat of unauthorized access to sensitive information within public records is
unlikely to diminish in the near future. This proliferation may pave the way for additional
federal and state data security measures. Government offices that are complying with
existing regulations to redact Social Security numbers may face additional legislative
mandates in the future that require the redaction of additional data types. In fact, this is
already happening.

In 2003, the Florida legislature mandated the redaction of Financial Account information
including bank, credit and debit card numbers. Similarly, the Nevada legislature issued
a revised statute in 2006 to mandate the redaction of Drivers’ License numbers,
Identification Card numbers and Financial Account information including bank, credit
and debit card numbers. Government agencies can successfully navigate the redaction
of additional data fields in the future by leveraging today’s technology. As records are
being processed, reports can be created that identify specific documents that contain
the additional data fields (credit card number, drivers’ license number) that may need to
be redacted in the future. This captured information can be used to create a budget for
the additional verification process and to isolate suspected images for automatic/manual
redaction processing. The passage of time presents some problems for this approach.
Documents change and data capture tools and techniques improve rapidly. Using rules
and capture technology from a previous project may decrease accuracy and/or increase
verification labor costs. To maintain accuracy and keep manual labor costs low, a
better solution may be to save the OCR output from the original project to avoid
incurring the cost of rescanning, and write new custom rules for subsequent mandates
as they arise.
                                             4 


                                                                                                
Conclusion

At a minimum, redaction software can help government agencies make public
information available in a secure manner. Advanced technology can be harnessed to
save labor costs and eliminate a significant percentage of tedious data entry tasks.
Government agencies can gain significant, ongoing benefits from selecting a software
partner with leading edge technology.

ID Shield Redaction Software
ID Shield is a proven, cost-effective redaction solution that permanently removes private
information within records and documents. ID Shield Redaction Software customers
have redacted over one billion images. Extract Systems offers server-based and
desktop redaction software.

About the Author




Mark Miller is Vice President of Sales for Extract Systems, a leading provider of best-in-
class data capture and redaction software. Extract’s products are built to adapt and
integrate into any type of environment, providing flexibility, scalability and efficiency. The
productivity gains achieved with Extract Systems’ data automation solutions save
organizations money, improve workflow and eliminate paper.

For more information, please contact:
Extract Systems, LLC
6418 Normandy Lane, Suite 200
Madison, WI 53719
Phone: (877) 778-2543 or (608) 216-7950
E-mail: mark_miller@extractsystems.com
www.extractsystems.com
 
Sources: 
Javelin’s 2010 Consumer Identity Fraud Report
National Conference of State Legislatures
                                              5 


                                                                                                  

More Related Content

What's hot

Sans Tech Paper Hardware Vs Software Encryption
Sans Tech Paper   Hardware Vs Software EncryptionSans Tech Paper   Hardware Vs Software Encryption
Sans Tech Paper Hardware Vs Software Encryptionharshadthakar
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudIOSR Journals
 
Meaningful Use Risk Analysis Webinar
Meaningful Use Risk Analysis WebinarMeaningful Use Risk Analysis Webinar
Meaningful Use Risk Analysis Webinardata brackets
 
IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...
IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...
IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...Alex G. Lee, Ph.D. Esq. CLP
 
A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemIOSRjournaljce
 
Whitepaper: Better Managing Patient Relationships and Information with eSigna...
Whitepaper: Better Managing Patient Relationships and Information with eSigna...Whitepaper: Better Managing Patient Relationships and Information with eSigna...
Whitepaper: Better Managing Patient Relationships and Information with eSigna...DocuSign
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET Journal
 
20100420 ethosdata brochure
20100420 ethosdata brochure20100420 ethosdata brochure
20100420 ethosdata brochureEthosData
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Ravinder (Ravi) Singh
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protectionMathew Chacko
 
Israel ministry of justice
Israel ministry of justiceIsrael ministry of justice
Israel ministry of justiceEyal Vardi
 
Successful stewardship Presentation
Successful stewardship PresentationSuccessful stewardship Presentation
Successful stewardship PresentationCertus Solutions
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...Konstantinos Demertzis
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET Journal
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET Journal
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishRSIS International
 
The 21 CFR Part 11 Compliance Checklist for Digital Applications
The 21 CFR Part 11 Compliance Checklist for Digital ApplicationsThe 21 CFR Part 11 Compliance Checklist for Digital Applications
The 21 CFR Part 11 Compliance Checklist for Digital ApplicationsEMMAIntl
 

What's hot (20)

White_Papers
White_PapersWhite_Papers
White_Papers
 
180926 ihan webinar 2
180926 ihan webinar 2180926 ihan webinar 2
180926 ihan webinar 2
 
Sans Tech Paper Hardware Vs Software Encryption
Sans Tech Paper   Hardware Vs Software EncryptionSans Tech Paper   Hardware Vs Software Encryption
Sans Tech Paper Hardware Vs Software Encryption
 
Cloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in CloudCloud Information Accountability Frameworks for Data Sharing in Cloud
Cloud Information Accountability Frameworks for Data Sharing in Cloud
 
Meaningful Use Risk Analysis Webinar
Meaningful Use Risk Analysis WebinarMeaningful Use Risk Analysis Webinar
Meaningful Use Risk Analysis Webinar
 
IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...
IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...
IoT/Big Data Patent Claim Drafting Strategy under Post-Alice 101 Eligibility ...
 
A Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection SystemA Survey on Various Data Mining Technique in Intrusion Detection System
A Survey on Various Data Mining Technique in Intrusion Detection System
 
Whitepaper: Better Managing Patient Relationships and Information with eSigna...
Whitepaper: Better Managing Patient Relationships and Information with eSigna...Whitepaper: Better Managing Patient Relationships and Information with eSigna...
Whitepaper: Better Managing Patient Relationships and Information with eSigna...
 
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine LearningIRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
IRJET - PHISCAN : Phishing Detector Plugin using Machine Learning
 
20100420 ethosdata brochure
20100420 ethosdata brochure20100420 ethosdata brochure
20100420 ethosdata brochure
 
Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...Social, political and technological considerations for national identity mana...
Social, political and technological considerations for national identity mana...
 
Startups - data protection
Startups  - data protectionStartups  - data protection
Startups - data protection
 
Israel ministry of justice
Israel ministry of justiceIsrael ministry of justice
Israel ministry of justice
 
Successful stewardship Presentation
Successful stewardship PresentationSuccessful stewardship Presentation
Successful stewardship Presentation
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
A Dynamic Intelligent Policies Analysis Mechanism for Personal Data Processin...
 
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
IRJET-An Economical and Secured Approach for Continuous and Transparent User ...
 
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
IRJET - Effective Authentication of Medical IoT Devices using Authentication ...
 
Privacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or PerishPrivacy Management System: Protect Data or Perish
Privacy Management System: Protect Data or Perish
 
The 21 CFR Part 11 Compliance Checklist for Digital Applications
The 21 CFR Part 11 Compliance Checklist for Digital ApplicationsThe 21 CFR Part 11 Compliance Checklist for Digital Applications
The 21 CFR Part 11 Compliance Checklist for Digital Applications
 

Viewers also liked (15)

Make a Bold Move in 2010
Make a Bold Move in 2010Make a Bold Move in 2010
Make a Bold Move in 2010
 
Building Advocacy With Women
Building Advocacy With WomenBuilding Advocacy With Women
Building Advocacy With Women
 
Modulo1
Modulo1Modulo1
Modulo1
 
Discovering Astronomy: Intro to the Cosmos
Discovering Astronomy: Intro to the CosmosDiscovering Astronomy: Intro to the Cosmos
Discovering Astronomy: Intro to the Cosmos
 
Ica
IcaIca
Ica
 
Discovering Astronomy Workshop 2013 July
Discovering Astronomy Workshop 2013 JulyDiscovering Astronomy Workshop 2013 July
Discovering Astronomy Workshop 2013 July
 
Annette s rehvivahetus
Annette s rehvivahetusAnnette s rehvivahetus
Annette s rehvivahetus
 
Discovering Astronomy Workshop 2013 September
Discovering Astronomy Workshop 2013 SeptemberDiscovering Astronomy Workshop 2013 September
Discovering Astronomy Workshop 2013 September
 
Modulo1
Modulo1Modulo1
Modulo1
 
IM ECM PoV
IM ECM PoVIM ECM PoV
IM ECM PoV
 
Discovering Astronomy Workshop
Discovering Astronomy WorkshopDiscovering Astronomy Workshop
Discovering Astronomy Workshop
 
Discovering Astronomy Workshop 2014 May
Discovering Astronomy Workshop 2014 MayDiscovering Astronomy Workshop 2014 May
Discovering Astronomy Workshop 2014 May
 
Astronomy
AstronomyAstronomy
Astronomy
 
Adobe Photoshop Basics - Session 3
Adobe Photoshop Basics - Session 3Adobe Photoshop Basics - Session 3
Adobe Photoshop Basics - Session 3
 
Silverlocks and the_three_monkeys
Silverlocks and the_three_monkeysSilverlocks and the_three_monkeys
Silverlocks and the_three_monkeys
 

Similar to Advanced Redaction Technology Cuts Costs and Secures Data

Sushant edp
Sushant edpSushant edp
Sushant edpzalak007
 
Key Takeaways and Recommendations for Claims Software Adoption: DataGenix
Key Takeaways and Recommendations for Claims Software Adoption: DataGenixKey Takeaways and Recommendations for Claims Software Adoption: DataGenix
Key Takeaways and Recommendations for Claims Software Adoption: DataGenixDataGenix
 
En ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceEn ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceNiranjanaDhumal
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationIRJET Journal
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docxstandfordabbot
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Anton Chuvakin
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques IJECEIAES
 
1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx
1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx
1.    TitleIT Security Risk Assessment2.    IntroductionYou .docxhyacinthshackley2629
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSIJNSA Journal
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 
Modern Document Processing | Nanonets Blog.pdf
Modern Document Processing | Nanonets Blog.pdfModern Document Processing | Nanonets Blog.pdf
Modern Document Processing | Nanonets Blog.pdfDhanashreeBadhe
 
ITGulfCoast: Technology Trends In The Legal Industry by Garrett LaBorde
ITGulfCoast: Technology Trends In The Legal Industry by Garrett LaBordeITGulfCoast: Technology Trends In The Legal Industry by Garrett LaBorde
ITGulfCoast: Technology Trends In The Legal Industry by Garrett LaBordeGarrett P. Laborde
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceDr. Richard Otieno
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensicsIAESIJAI
 

Similar to Advanced Redaction Technology Cuts Costs and Secures Data (20)

Sushant edp
Sushant edpSushant edp
Sushant edp
 
Key Takeaways and Recommendations for Claims Software Adoption: DataGenix
Key Takeaways and Recommendations for Claims Software Adoption: DataGenixKey Takeaways and Recommendations for Claims Software Adoption: DataGenix
Key Takeaways and Recommendations for Claims Software Adoption: DataGenix
 
En ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplaceEn ebook-digital-signature-for-the-remote-workplace
En ebook-digital-signature-for-the-remote-workplace
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
PREPARING FOR THE GDPR
PREPARING FOR THE GDPRPREPARING FOR THE GDPR
PREPARING FOR THE GDPR
 
Cloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor AuthenticationCloud Service Security using Two-factor or Multi factor Authentication
Cloud Service Security using Two-factor or Multi factor Authentication
 
2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx2. IntroductionYou are employed with Government Security Consu.docx
2. IntroductionYou are employed with Government Security Consu.docx
 
Remote desk one pager
Remote desk one pagerRemote desk one pager
Remote desk one pager
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]Log Management for PCI Compliance [OLD]
Log Management for PCI Compliance [OLD]
 
A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques A Survey: Data Leakage Detection Techniques
A Survey: Data Leakage Detection Techniques
 
1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx
1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx
1.    TitleIT Security Risk Assessment2.    IntroductionYou .docx
 
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICSENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
ENHANCED AUTHENTICATION FOR WEB-BASED SECURITY USING KEYSTROKE DYNAMICS
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
Chapter 6
Chapter 6Chapter 6
Chapter 6
 
Data Encryption Is Hard To Do Fiberlink
Data Encryption Is Hard To Do   FiberlinkData Encryption Is Hard To Do   Fiberlink
Data Encryption Is Hard To Do Fiberlink
 
Modern Document Processing | Nanonets Blog.pdf
Modern Document Processing | Nanonets Blog.pdfModern Document Processing | Nanonets Blog.pdf
Modern Document Processing | Nanonets Blog.pdf
 
ITGulfCoast: Technology Trends In The Legal Industry by Garrett LaBorde
ITGulfCoast: Technology Trends In The Legal Industry by Garrett LaBordeITGulfCoast: Technology Trends In The Legal Industry by Garrett LaBorde
ITGulfCoast: Technology Trends In The Legal Industry by Garrett LaBorde
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensics
 

Recently uploaded

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 

Recently uploaded (20)

“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 

Advanced Redaction Technology Cuts Costs and Secures Data

  • 1.
  • 2. Advanced RedactionTechnology: How to Provide Secure Access, Reduce Costs and Anticipate Future Legislative Requirements More than 11 million adult Americans were victims of Identity Theft in 2009, a 10% increase from 2008. The collective cost of these crimes was over $54 billion. Private information, such as Social Security numbers, within online public records can be vulnerable to cyber criminals. It is estimated that approximately 10% of Identity Theft cases originate with personal data collected from government records. A Growing Legislative Concern Across the United States, strict legislation is being passed requiring State and County governments to redact sensitive information, such as Social Security and credit card numbers from the official and public record. North Carolina, Pennsylvania, Iowa and Wisconsin recently passed records modernization laws mandating the redaction of Social Security numbers. In some states, forward-thinking local and state government officials have independently determined that it is their responsibility to protect constituents from identity theft. Source information gathered from National Conference of State Legislators Updated May 2010 1   
  • 3. Redaction Defined Redaction, sometimes referred to as sanitization, is the permanent removal of personal or sensitive information from hard copy or electronic documents. The traditional technique of redacting confidential material from a paper document before its public release involves crossing out portions of text with a wide black pen, followed by photocopying the result. This manual processing of thousands or millions of document pages is a time-consuming process that can strain staff resources. As public records repositories shift from paper documents to electronic images, the challenges facing state and local governments are also shifting. Complying with state legislation and Federal “Sunshine” laws, such as the Freedom of Information Act and Openness in Government Act, requires a records management system, strategy and workflow that provide data security and accessibility. Deploying automated redaction technology is a powerful tool for securing personal data and maintaining public record access. Automated Redaction Technology As public records are scanned, the electronic images are processed through Optical Character Recognition (OCR) software that converts it into a digital format. This conversion allows the document to become “searchable” by a rules-based search engine that locates sensitive data within the OCR results. The search engine is powered by rules, clues, pattern recognition and algorithms designed to locate user- defined sensitive data types. After locating a sensitive data type, the software assigns a value that measures how well the data matches the pattern and clues. For example, the search engine may find a Social Security number by finding the clue “SSN” followed by a pattern of numbers such as 123-45-6789. This example falls into the “high confidence” range of results where the clue and the number pattern found by the search engine are an exact match. On another document, the search engine may find the clue “SSN” followed by eight numbers instead of the standard nine-character Social Security number. This result may be defined as “medium confidence.” These values or “confidence” classifications are used to streamline verification workflow. Accuracy Accuracy refers to a mathematical calculation involving the number of sensitive data fields found by the software compared to the total number of sensitive data types within the record. False positives occur when software locates non-sensitive data and marks it for redaction. This type of error is included in the overall accuracy rate. Accuracy is arguably the most important feature of automated redaction. Because no industry standard exists for calculating accuracy, evaluating and comparing the accuracy rates among redaction providers can be challenging. To help facilitate the 2   
  • 4. evaluation process, vendors’ accuracy formulas must be transparent and straightforward. If each sensitive data type undetected by the software represents a failure to protect a citizen’s private information, it stands to reason that the software’s accuracy rate should be downgraded for every occurrence of this type. Pre-verification accuracy calculates how well the software locates sensitive data automatically, without human intervention for quality assurance (verification). Achieving a high pre-verification accuracy rate is critical for two reasons. When redaction software automatically finds virtually all sensitive data within records, the security of individuals’ personal data is increased. Additionally, high pre-verification accuracy dramatically reduces labor costs. Verification An important part of any redaction workflow is verification or quality control. The two most influential factors that affect verification are the quality of the paper records before scanning and the targeted level of accuracy (higher accuracy requires more verification). Verification workflow is based on the particular needs of each client, and generally includes three options: 1) Fully Automated Redaction, where the software finds and redacts sensitive information automatically. 2) Semi-Automated Redaction allows a step for an end user to verify each redaction. 3) A Hybrid Redaction approach allows user-defined “high confidence” redactions to be automatically processed while lower confidence results are submitted for verification. Impact of Pre-Verification Accuracy on Labor Costs To demonstrate the relationship between software accuracy and verification labor costs, here is an example of a government office processing 40,000 image pages of records per month utilizing the Hybrid Redaction workflow. Software #1 has a pre-verification accuracy rate of 80% and Software #2 has an accuracy rate of 99%. Verification Labor Costs: 40,000 Pages of Records/Month Using Hybrid Redaction Workflow Software #1   Software #2      (80% Accuracy)  (99% Accuracy)  Pages Processed/Day  1,905 1,905 Pages to be Verified/Day  381 19 Verification Labor in Hours/Day  1.5 0.08 Verification Labor in Hours/Month  31.5 1.7 Verification Labor in Hours/Year  378 20 ~ Annual Verification Labor Costs  $7,500  $400  3   
  • 5. Selecting a Redaction Provider The redaction vendor selection process should consider 1) experience, 2) accuracy and 3) overall technology. 1. Experienced redaction providers have completed installations with many different types of records management software. The exposure to different systems helps seasoned customer support teams anticipate problems before they happen. Verification labor is often the highest cost within a redaction project. Working with a team experienced in verification workflow maximizes accuracy, minimizes human intervention and saves money. 2. The quality of paper records and the complexity of the data to be redacted have an impact on the accuracy that can achieved for each project. Under most circumstances, high quality automated redaction can achieve a pre-verification accuracy rate of 95%. 3. Redaction is an evolving technology. Top vendors are constantly adding new technology to improve accuracy and speed, and to meet the emerging needs of governments. Privacy and Information Security Regulations: What Does the Future Hold? The threat of unauthorized access to sensitive information within public records is unlikely to diminish in the near future. This proliferation may pave the way for additional federal and state data security measures. Government offices that are complying with existing regulations to redact Social Security numbers may face additional legislative mandates in the future that require the redaction of additional data types. In fact, this is already happening. In 2003, the Florida legislature mandated the redaction of Financial Account information including bank, credit and debit card numbers. Similarly, the Nevada legislature issued a revised statute in 2006 to mandate the redaction of Drivers’ License numbers, Identification Card numbers and Financial Account information including bank, credit and debit card numbers. Government agencies can successfully navigate the redaction of additional data fields in the future by leveraging today’s technology. As records are being processed, reports can be created that identify specific documents that contain the additional data fields (credit card number, drivers’ license number) that may need to be redacted in the future. This captured information can be used to create a budget for the additional verification process and to isolate suspected images for automatic/manual redaction processing. The passage of time presents some problems for this approach. Documents change and data capture tools and techniques improve rapidly. Using rules and capture technology from a previous project may decrease accuracy and/or increase verification labor costs. To maintain accuracy and keep manual labor costs low, a better solution may be to save the OCR output from the original project to avoid incurring the cost of rescanning, and write new custom rules for subsequent mandates as they arise. 4   
  • 6. Conclusion At a minimum, redaction software can help government agencies make public information available in a secure manner. Advanced technology can be harnessed to save labor costs and eliminate a significant percentage of tedious data entry tasks. Government agencies can gain significant, ongoing benefits from selecting a software partner with leading edge technology. ID Shield Redaction Software ID Shield is a proven, cost-effective redaction solution that permanently removes private information within records and documents. ID Shield Redaction Software customers have redacted over one billion images. Extract Systems offers server-based and desktop redaction software. About the Author Mark Miller is Vice President of Sales for Extract Systems, a leading provider of best-in- class data capture and redaction software. Extract’s products are built to adapt and integrate into any type of environment, providing flexibility, scalability and efficiency. The productivity gains achieved with Extract Systems’ data automation solutions save organizations money, improve workflow and eliminate paper. For more information, please contact: Extract Systems, LLC 6418 Normandy Lane, Suite 200 Madison, WI 53719 Phone: (877) 778-2543 or (608) 216-7950 E-mail: mark_miller@extractsystems.com www.extractsystems.com   Sources:  Javelin’s 2010 Consumer Identity Fraud Report National Conference of State Legislatures 5