Technology Overview

 

SUBITO_det.jpg

rECTIFY'S PATENT-PENDING RESOLVE TECHNOLOGY LEVERAGES "PRIVACY-ENABLED AI" TO AUTOMATE THE REMOVAL OF PRIVATE DATA

 
ball-ball-shaped-blur-879718.jpg

EXPOSE

Unlock the hidden potential in your data by understanding content and themes residing in your data set.  Machine learning automatically organizes your data in meaningful ways with zero human intervention.  Fine tune the results based on your priorities by further training the technology (no technical expertise needed).    

How organizations leverage the EXPOSE process:
Customer insights and trends
Threat intelligence analysis
Corporate strategy
Public health data
M&A due diligence


abstract-ball-shaped-bright-745708.jpg

auto-detect

Identify and flag sensitive information and personally identifiable information automatically.  See where sensitive information resides and how much of it resides in the data set.  Customize by creating custom search patterns and algorithms to find information that may require protection.  Identify data assets easily in structured and unstructured content as well as metadata.  Sensitive content is readily displayed, enabling the organization to take actionable steps to defend private data.    

How organizations leverage the AUTO-DETECT Process:
Attorney-client privilege in electronic evidence
Identifying IP and trade secrets
Automatic detection of personally identifiable information (PII)
Investigatory analysis for defense communities

 

black-and-white-city-crowd-842339.jpg

auto-defend  

Automatically remove sensitive content.  Easily defend private data with bulk selection and removal on the entire population of data.  Requires minimal human interaction and offers optional verification workflow to aid in due diligence of private data removal. 

How organizations leverage the AUTO-DEFEND Process:
GDPR compliance
FOIA
FERPA compliance
PII compliance
Publishing documents to the web
Bankruptcy proof of claims
Breach remediation   


 
 
shutterstock_237595765.jpg

SHARE

The resulting data set is fully sanitized and ready for sharing to third parties or in the public domain.  Share data safely with third parties.  Maintain the original data set while enabling data for secondary uses.  

How organizations leverage the SHARE process:
Deliver insights to internal departments
Delivering data to third parties
Monetize data while protecting consumer identities
Elicit transparency by sharing data in the public domain
Data philanthropy

 

           Download White Paper


Name *
Name