Intelligent data mining for PII and PHI
Rooted in machine-learning technology that is calibrated to the intricacies of data mining for PII and PHI, Canopy software accelerates the detection, extraction and resolution of non-public and protected-data following a business email compromise.
Software for the people who are searching for the people affected by the breach
Our purpose-built data breach response application is the #1 choice for incident response teams. Our clients span cyber security firms, law firms, and legal service providers that need to quickly convert PII and PHI fragments within structured and unstructured data into a clean list of affected individuals requiring notification.
Canopy : the "who's who" of data privacy
What is considered protected data or sensitive information?
Canopy automates the most cumbersome aspects of achieving compliance with GDPR, FERPA, PCI, HIPAA, CCPA and other emerging data privacy regulations. The laws and jurisdictions have varying classifications for the fragments of data requiring protection – which makes data mining for PII infinitely more difficult.
Fortunately, Canopy’s legal advisors and data analysts maintain a comprehensive Data Mining for PII Matrix to guide your team’s response strategy. Quickly look-up a data-type or a location to confirm the steps required to maintain compliance.
What's in a name?
Some might call Canopy a “Data Breach Discovery” tool or “Data Breach Response Software.” Others call it “Data Extraction” or “Data Mining.” We view Canopy as the pioneer of “Protected-Data Discovery.” And in the context of data privacy, one's unique identifiers are far more important than a name anyway.