"Canopy has to be the single most responsive tech company we work with."
- Geoff Leeming, Founder, Pragma
"I love the product. A lot. The image review is super easy."
- Attorney, Band 1 Global Litigation Support Firm
"We wouldn't have been able to complete this data breach review with any other technology on the market."
- Litigation Support Director, Am Law 100
"Canopy's solution is elegant."
- Attorney, Am Law 100
"Without Canopy it would have taken 250 reviewers years to extract the PII. With Canopy it took 1 week to extract over 1-billion entities."
- Executive, Global Litigation Support Company
"One person was able to review 150,000 images for reportable data in less than 3 hours."
- E-discovery Attorney, Am Law 100
Intelligent data mining for PII and PHI
Rooted in machine-learning technology that is calibrated to the intricacies of data mining for PII and PHI, Canopy software accelerates the detection, extraction and resolution of non-public and protected-data following a business email compromise.
Software for the people who are searching for the people affected by the breach
Our purpose-built data breach response application is the #1 choice for incident response teams. Our clients span cyber security firms, law firms, and legal service providers that need to quickly convert PII and PHI fragments within structured and unstructured data into a clean list of affected individuals requiring notification.
Canopy : the "who's who" of data privacy
What is considered protected data or sensitive information?
Canopy automates the most cumbersome aspects of achieving compliance with GDPR, FERPA, PCI, HIPAA, CCPA and other emerging data privacy regulations. The laws and jurisdictions have varying classifications for the fragments of data requiring protection – which makes data mining for PII infinitely more difficult.
Fortunately, Canopy’s legal advisors and data analysts maintain a comprehensive Data Mining for PII Matrix to guide your team’s response strategy. Quickly look-up a data-type or a location to confirm the steps required to maintain compliance.
What's in a name?
Some might call Canopy a “Data Breach Discovery” tool or “Data Breach Response Software.” Others call it “Data Extraction” or “Data Mining.” We view Canopy as the pioneer of “Protected-Data Discovery.” And in the context of data privacy, one's unique identifiers are far more important than a name anyway.