Last date modified: 2026-Mar-06
Review documents
Reviewing documents with aiR for Data Breach Response requires a process similar to Reviewing documents using Review Center. Reviewers check documents to ensure aiR for Data Breach Response is accurately predicting which documents contain PI. They correct predictions when necessary and make sure all PI values are detected.
aiR for Data Breach Response categorizes documents as either Structured or Unstructured, each requiring a distinct approach to identifying PI.
Unstructured documents
Unstructured documents contain unlabeled or otherwise unorganized data. The content on the files are usually composed of natural language.
Examples of unstructured documents include:
- Text-based documents
- Emails
- Word processing documents
- Additional data sources such as photos and audio files
For unstructured documents, aiR for Data Breach Response uses the context of the document to differentiate different types of PI.
To review Unstructured documents, see Unstructured document review.
Structured documents
Structured documents contain data that is organized in a specific and predefined way, typically in a table with columns and rows where each data point has a specific data type.
Examples of structured documents include:
- Databases
- Spreadsheets
- CSV files
For structured documents, aiR for Data Breach Response identifies table boundaries and detects header and column content to predict PI.
To review Structured documents see Structured document review.
On this page