Last date modified: 2025-Nov-10

Review documents

Reviewing documents with Data Breach Response requires a process similar to Reviewing documents using Review Center.

Reviewers check documents to ensure Data Breach Response is accurately predicting which documents contain PI. They correct predictions when necessary and make sure all PI values are detected.

Data Breach Response categorizes documents as either Structured or Unstructured, each requiring a distinct approach to identifying PI.

Structured documents—contain data that is organized in a specific and predefined way, typically in a table with columns and rows where each data point has a specific data type.

Examples of structured documents include databases, spreadsheets and CSV files. Data Breach Response identifies table boundaries and detects header & column content to predict PI.
To review Structured documents, see Structured document review.

Unstructured documents—contain unlabeled or otherwise unorganized data. The content on the files are usually composed of natural language.

Examples of unstructured documents include text-based documents such as emails, word processing documents, and forms with additional unstructured data sources such as photos, and audio files. Data Breach Response uses the context of the document to differentiate different types of PI.

To review Unstructured documents, see Unstructured document review.

Return to top of the page
Feedback