Data Mining

Utilizing Artificial Intelligence (AI) and Machine Learning (ML) tools, we expedite the identification of PII and PHI taken by hackers after a breach has been detected, providing comprehensive subject-level identification and any related B2B data that may have been compromised.

Advantages

Two workstreams under one solution

Whether on-prem, in the cloud, or analyzed remotely at an Actfore forensic lab, our tools and technicians will adapt to our client(s) specific needs. Actfore’s team has deployed its tools in over 1,000 engagements globally, meeting privacy regulations across the globe and in multiple jurisdictions. Our Data Mining service is language agnostic, giving you confidence that no task is too difficult for our data experts.

Utilizing Artificial Intelligence models, our clients do not need to know what information they hold. With Machine Learning (ML) augmented by human interactions, our team is able to automatically identify data elements across a multitude of languages and adapt to jurisdictional requirements.

With 100+ elements available for extraction, we can meet your data mining needs with ease

FIRST_NAME

LAST_NAME

MIDDLE_INITIAL

SUFFIX

STREET_ADDRESS

CITY

STATE

ZIP

COUNTRY

NATIONAL_ID

DATE_OF_BIRTH

PASSPORT_NUM

DRIVERS_LICENSE

LICENSE_STATE

STATE_ID

EIN/TAX_ID

ALIEN_REGISTRATION

TRIBAL_ID

VISA

NON_US_ID

BIRTH_CERTIFICATE

MARRIAGE_CERTIFICATE

FINANCIAL_DOCS

BANK_ACCOUNTS

ROUTING_NUMBERS

UTILITY BILLS

CREDIT/DEBIT_NUMBERS

CCV/PIN_NUMBERS

EXPIRATION_DATES

MEDICAL_HISTORY

DISABILITY_INFO

OCCUPATIONAL_HEALTH

MENTAL_TREATMENT

PHYSICAL_TREATMENT

DIAGNOSIS_INFO

PRESCRIPTION_INFO

PHYSICIAN

PATIENT_ID

INSURANCE_INFO

POLICY_NUMBERS

SUBSCRIBER_NUMBERS

GROUP/PLAN_NUMBERS

DNA_PROFILE

USERNAME

PASSWORDS

BIOMETRIC_IDS

IRS_PIN

SECURITY_Q&A

DIGITAL_SIGNATURES

MAIDEN_NAMES

A

Multi-lingual

With tools that support a multitude of languages and experience across the globe on numerous engagements, we're able to support cross-jurisdictional engagements with ease.

Mining & Review

Our processes eliminate the need for further manual review. Coupling software with programmatic examination, our workflows are geared to reduce costs.

Customized

We're able to customize our data element identification and extraction to meet your needs. If you have a proprietary PatientID number, we'll find it, and find it fast.

Featured Capabilities

Eliminating touchpoints and protecting client data

At Actfore, we utilize cutting edge technologies to respond to data mining needs on breach response cases. Our technology stack and differentiators allow us to deliver faster and reduce the cost of traditional mining activities by combining sensitive data identification with programmatic review. With capabilities to deploy on-prem, behind the client(s) firewall or in a secure cloud environment, we have the flexibility to analyze the data wherever the client feels comfortable. Further, with our Fixed Price model you’ll know from kick-offf what the total out-of-pocket costs will be.

  • On-prem, cloud, or off-site analysis

    Our tools and team can deploy behind the client firewall or in their private cloud to process data, ensuring no additional data exfiltration will occur. Alternatively, our secure facilities allow us to migrate data to our forensic labs for analysis. Providing the greatest flexibility when responding to data breaches.

  • Native migration capabilities

    We're able to copy the data and store it for analysis. Eliminating strain on the production environment, with an added benefit of providing a copy for legal hold purposes.

  • Deduplication

    Utilizing SHA-256, our tools will systematically analyze each file and eliminate exact duplicates from the workflow process, decreasing redundant processes and expediting time to delivery.

  • AI

    Constantly evolving

    With our out-of-the-box rules, we utilize proven base expressions to uncover sensitive information. Leveraging AI/ML, we able to learn, pivot, and adapt to a client(s) specific data instantaneously.

Our Methods

A proven approach to quickly responding to a data breach

Planning Phase

Data Analysis

Reporting

Kickoff &
Questions

Meeting to establish:
(a) elements for extraction or markup,
(b) client specific needs, and
(c) timeline.

Deployment &
Ingestion

Either on-prem, in the cloud, or in our lab, we will deploy our tools and connect to the data. An initial inventory of the data will provide high level findings.

Textual
Analysis

Our AI tools coupled with data analysts will begin textually analyzing the data, up to six times to capture all responsive elements.

Element
Coupling

With potentially numerous data elements and naming variants, we'll utilize our Data Subject Access Request (DSAR) capabilities to connect the dots.

Collapse
Related Entries

With sometimes millions of responsive elements, our team will collapse each responsive file down to a single entry per individual, increasing readability.

Review Format &
Publish

To ensure expectations are met and exceeded, we will review report formatting with all parties prior to publishing our final findings.

Why Actfore

Big data experts, looking to shed light on your data

At Actfore, we’re programmers and data experts, we’re not salespeople. Our team of experts are focused on uncovering the answers scattered across your data.  Let us handle your data challenges with speed and accuracy.