Last date modified: 2026-Jan-23
Review documents
Reviewing documents with Data Breach Response requires a process similar to Reviewing documents using Review Center. Reviewers check documents to ensure Data Breach Response is accurately predicting which documents contain PI. They correct predictions when necessary and make sure all PI values are detected.
Data Breach Response categorizes documents as either Structured or Unstructured, each requiring a distinct approach to identifying PI.
Structured documents
Structured documents contain data that is organized in a specific and predefined way, typically in a table with columns and rows where each data point has a specific data type.
Examples of structured documents include:
- Databases
- Spreadsheets
- CSV files
For structured documents, Data Breach Response identifies table boundaries and detects header and column content to predict PI.
To review Structured documents see Structured document review.
Unstructured documents
Unstructured documents contain unlabeled or otherwise unorganized data. The content on the files are usually composed of natural language.
Examples of unstructured documents include:
- Text-based documents
- Emails
- Word processing documents
- Additional data sources such as photos and audio files
For unstructured documents, Data Breach Response uses the context of the document to differentiate different types of PI.
To review Unstructured documents, see Unstructured document review.
On this page