Data Mining
Utilizing Artificial Intelligence (AI) and Machine Learning (ML) tools, we expedite the identification of PII and PHI taken by hackers after a breach has been detected, providing comprehensive subject-level identification and any related B2B data that may have been compromised.
Advantages
Two workstreams under one solution
Whether on-prem, in the cloud, or analyzed remotely at an Actfore forensic lab, our tools and technicians will adapt to our client(s) specific needs. Actfore’s team has deployed its tools in over 1,000 engagements globally, meeting privacy regulations across the globe and in multiple jurisdictions. Our Data Mining service is language agnostic, giving you confidence that no task is too difficult for our data experts.
Utilizing Artificial Intelligence models, our clients do not need to know what information they hold. With Machine Learning (ML) augmented by human interactions, our team is able to automatically identify data elements across a multitude of languages and adapt to jurisdictional requirements.
With 100+ elements available for extraction, we can meet your data mining needs with ease
FIRST_NAME
LAST_NAME
MIDDLE_INITIAL
SUFFIX
STREET_ADDRESS
CITY
STATE
ZIP
COUNTRY
NATIONAL_ID
DATE_OF_BIRTH
PASSPORT_NUM
DRIVERS_LICENSE
LICENSE_STATE
STATE_ID
EIN/TAX_ID
ALIEN_REGISTRATION
TRIBAL_ID
VISA
NON_US_ID
BIRTH_CERTIFICATE
MARRIAGE_CERTIFICATE
FINANCIAL_DOCS
BANK_ACCOUNTS
ROUTING_NUMBERS
UTILITY BILLS
CREDIT/DEBIT_NUMBERS
CCV/PIN_NUMBERS
EXPIRATION_DATES
MEDICAL_HISTORY
DISABILITY_INFO
OCCUPATIONAL_HEALTH
MENTAL_TREATMENT
PHYSICAL_TREATMENT
DIAGNOSIS_INFO
PRESCRIPTION_INFO
PHYSICIAN
PATIENT_ID
INSURANCE_INFO
POLICY_NUMBERS
SUBSCRIBER_NUMBERS
GROUP/PLAN_NUMBERS
DNA_PROFILE
USERNAME
PASSWORDS
BIOMETRIC_IDS
IRS_PIN
SECURITY_Q&A
DIGITAL_SIGNATURES
MAIDEN_NAMES
Multi-lingual
With tools that support a multitude of languages and experience across the globe on numerous engagements, we're able to support cross-jurisdictional engagements with ease.
Mining & Review
Our processes eliminate the need for further manual review. Coupling software with programmatic examination, our workflows are geared to reduce costs.
Customized
We're able to customize our data element identification and extraction to meet your needs. If you have a proprietary PatientID number, we'll find it, and find it fast.
Featured Capabilities
Eliminating touchpoints and protecting client data
At Actfore, we utilize cutting edge technologies to respond to data mining needs on breach response cases. Our technology stack and differentiators allow us to deliver faster and reduce the cost of traditional mining activities by combining sensitive data identification with programmatic review. With capabilities to deploy on-prem, behind the client(s) firewall or in a secure cloud environment, we have the flexibility to analyze the data wherever the client feels comfortable. Further, with our Fixed Price model you’ll know from kick-offf what the total out-of-pocket costs will be.
On-prem, cloud, or off-site analysis
Our tools and team can deploy behind the client firewall or in their private cloud to process data, ensuring no additional data exfiltration will occur. Alternatively, our secure facilities allow us to migrate data to our forensic labs for analysis. Providing the greatest flexibility when responding to data breaches.
Native migration capabilities
We're able to copy the data and store it for analysis. Eliminating strain on the production environment, with an added benefit of providing a copy for legal hold purposes.
Deduplication
Utilizing SHA-256, our tools will systematically analyze each file and eliminate exact duplicates from the workflow process, decreasing redundant processes and expediting time to delivery.
Constantly evolving
With our out-of-the-box rules, we utilize proven base expressions to uncover sensitive information. Leveraging AI/ML, we able to learn, pivot, and adapt to a client(s) specific data instantaneously.
Our Methods
A proven approach to quickly responding to a data breach
Planning Phase
Data Analysis
Reporting
Kickoff &
Questions
Meeting to establish:
(a) elements for extraction or markup,
(b) client specific needs, and
(c) timeline.
Deployment &
Ingestion
Either on-prem, in the cloud, or in our lab, we will deploy our tools and connect to the data. An initial inventory of the data will provide high level findings.
Textual
Analysis
Our AI tools coupled with data analysts will begin textually analyzing the data, up to six times to capture all responsive elements.
Element
Coupling
With potentially numerous data elements and naming variants, we'll utilize our Data Subject Access Request (DSAR) capabilities to connect the dots.
Collapse
Related Entries
With sometimes millions of responsive elements, our team will collapse each responsive file down to a single entry per individual, increasing readability.
Review Format &
Publish
To ensure expectations are met and exceeded, we will review report formatting with all parties prior to publishing our final findings.
Why Actfore
Big data experts, looking to shed light on your data
At Actfore, we’re programmers and data experts, we’re not salespeople. Our team of experts are focused on uncovering the answers scattered across your data. Let us handle your data challenges with speed and accuracy.