In this article, we cover how users can discover PII and identify privacy risks in their structured data store using Protecto. We will use Snowflake as our structured enterprise data store for the purpose of this discussion. 

To check out our video tutorial, click here.

Requesting access to Protecto to get started with finding sensitive PII data in your data store can be done in three easy steps. 

  1. Create an account in Protecto. 
  2. Give access to Protecto in your data store.
  3. Add your Snowflake data store in Protecto. 

Your Protecto instance will then be configured in a matter of several minutes or even a few hours depending on the size of your data. Once this process is completed, Protecto’s Privacy Intelligence platform:

  • scans through your Snowflake data store to automatically create an inventory of the data
  • scans all tables within the data store to determine/locate sensitive information
  • segregates risk as per the type and extent of sensitive data 
  • identifies the extent of risks associated with sensitive data

Protecto’s advanced AI / ML models identify the PII and sensitive data within your Snowflake instance and tag them accordingly. It is important to note that Protecto scans the data source for several hundred rows at a time, done at random. The model is run on a daily basis (at a pre-determined time window) and delivers better insights into the extent and amount of risk over time.

So, in a matter of just a few minutes, you can scan your Snowflake instance for sensitive and personal data. 

Now, let us explore how you can discover and locate PII risks once Protecto is connected to your Snowflake data store

Understanding ‘Privacy Assessment’ Information

Privacy assessment refers to the process of evaluating and analyzing an organization’s data to assess their compliance with privacy laws, regulations, and best practices. The goal of a privacy assessment is to identify potential privacy risks and vulnerabilities, assess the effectiveness of privacy controls, and make recommendations for improving privacy protections.

You can assess your data privacy information from the Protecto platform.

To access privacy information,

1. Sign in to your Protecto account.

2. Once you are on the dashboard, on the left-hand panel, navigate to ‘Privacy Assessment’ -> ‘Privacy Risk – Data’.

64Bf22F5B1E674442Fae29Fa Zu81Xzav0Hxbetl0Kzue0Ky2Vp6Tz8Asiaf9Vmpc4Cudr8Mqtlrloigyo1U493P7 Jsiqxjcvoan6Tsmah3Iqrhahalnkg3Qcwfz B

3. On the ‘Privacy Risk – Data’ page, you can view a quick snapshot of all the data assets that you have, with details like:

  • Names of data assets
  • Type of sensitive data (Example PII, PI)
  • Tags
  • Privacy risk (Severe, High, Medium, Low)
  • Number of active users
  • Extent of access privileges (Excessive, Normal, Good)
  • Details of data owners
  • Recommendations on how to minimize privacy risk
  • Details (more details on each data asset)

 

64Bf22F56790125Cc661326F Fz Cwqke 0K Vgsdj Dgxr8Wgkxr5Du2Zm1K85W60 Pfsa0Rsioe2Ahee0Ejpd7Irj3X5Psfdzpdj05X8Cgmxugsz19Ucuzbl9Orweyl Qphkinwnsebtewpltiryvl28J Fbjc0Lhe4Kkzmpsqe A

As part of the implementation, Protecto identifies different types of PII data across the data assets and classifies them as tags. You can search or sort the data assets based on Privacy Risk (Very High/High, Medium, Low), Access Privilege (Excess, Good, Broad), Tags (e.g., Phone No, IP address).

To dig deeper, click on a particular data asset and you will be directed to the Data Catalog page where you can view the data asset details, and the users who have access to the particular data asset.

651192C674826C6Fdf23823B Screenshot%202023 09 25%20193130

In summary, discovering sensitive PII data is a critical step in data privacy analysis so that you can take the right steps to ensure data privacy and protection. By identifying privacy risks, organizations can mitigate the risk of data breaches, reputational damage, etc.

Related Articles

Prevent millions of $ of privacy risks. Learn how.

We take privacy seriously. While we promise not to sell your personal data, we may send product and company updates periodically. You can opt-out or make changes to our communication updates at any time.