When data is compromised, do you turn to ediscovery software and processes for the data breach response? If so, you’re not alone — but that decision could compromise your project’s accuracy and cost you extra time and money, especially when working with large or complex data sets.
Request this white paper to learn how using ediscovery software and processes for data breach response can result in:
- Both over- and under-inclusive personally identifiable information (PII) and protected health information (PHI) detection
- Longer, more expensive PII/PHI review
- Slow, inefficient entity resolution
Get the White Paper
Around 15% of the documents in a typical business email compromise actually contain PII; however, ediscovery search tools typically flag around 50-70% of a data set for review.
With small data sets, this high false positive rate may be an inconvenience. But when dealing with large data sets or difficult file types like spreadsheets, it can be debilitating.