LogoLogo
HOMEBLOG
  • Getting Started
  • Connect to Data
    • Projects
    • Data Connectors
      • Google BigQuery
      • Google Cloud Storage
      • Iceberg
      • Snowflake
      • AWS S3
      • AWS Athena
      • AWS Redshift
      • Databricks Delta
      • Azure Blob
      • Salesforce
      • SAP Hana
      • File Path Options
      • SQL Server
      • Trino
    • Connection Modes
    • Triggering Scans
    • Configuring a Data Source
  • Profiling Data
    • Data Health Metrics
    • Data Health Overview Page
    • Interactive Profiling Tool: Investigator
    • Data Diff
    • Compound Attributes
      • List of Supported Functions
  • Monitoring Data
    • Data Quality Metrics
    • Alert Policies
    • Data Trends and Alerts
    • Metrics Inspector
  • Data Quality Rules
    • Rules Expression Examples
  • PII Data Detection
  • Remediation
    • Data Binning
    • Circuit Breaker
  • Integrations
    • Jira Integration
    • Slack
    • Jobs Status Notification
  • User Management
    • Microsoft Entra IDP Setup
    • Auth0 Setup
    • Okta SSO Setup
    • SSO Configuration
  • API Reference
    • Authentication API
    • API Keys
    • Telmai IP List
    • Get Google Service Account API
  • Source APIs
    • Source APIs
  • Upload Data APIs
    • Upload data from Cloud
      • RedShift Request data
      • GCS Request data
      • Azure Request data
      • GBQ Request data
      • Snowflake Request data
      • Amazon S3 Request data
      • Delta Lake Request
      • Trino Request data
    • Track upload job
    • Check for alerts
  • Admin APIs
    • User Management
  • Telmai Releases
    • Release Notes
      • 25.2.1
      • 25.2.0
      • 25.1.3
      • 25.1.2
      • 25.1.0
Powered by GitBook
On this page

PII Data Detection

PreviousRules Expression ExamplesNextRemediation

Last updated 6 months ago

Telmai's PII Data Detection feature enables seamless identification of Personally Identifiable Information (PII) within monitored attributes. This functionality helps organizations proactively manage data privacy risks by detecting and alerting PII exposure, ensuring compliance, and enhancing data governance.

How to Enable PII Detection

    1. Select the PII Exposure Policy.

    2. Enable the policy (disabled by default).

    3. Optionally, limit the scope to specific attributes for focused detection.

  1. Configure alert delivery through supported channels such as email, Teams, or webhooks to set up notifications.

  2. Alerts display detected PII exposure, including attribute-level details.

  3. Initiate a manual scan or wait for the next scheduled scan. Detected PII will automatically generate alerts.

  4. On the Investigator page, navigate to the Values table and scroll to the right to observe additional fields, which now include “Contains PII”, “Contains Phone”, etc.

PII Data Validation Rules

  1. Create a Rule:

    1. Navigate to the Correctness Rules Page.

    2. Add a rule for the desired attribute (e.g., "Contains Phone Number").

    3. Set the expected value (True for mandatory presence, False for exclusion).

  1. You can trigger the scan or let the scheduled scan complete. Create a custom correctness policy with thresholds (e.g., [100,100]) to ensure alerts for detected violations.

  2. You can trigger the scan or let the scheduled scan complete. To inspect violations, navigate to Investigator by clicking on the attribute name.

  1. Values that failed the check will have Expectation Violation marked as true (highlighted red) next to them. Fields like "Contains PII" and "Contains Phone" show detection statuses (e.g., True for PII presence).

Navigate to the Page:

Telmai's rules engine supports custom validation and remediation of PII data violations. This includes actions like segregating PII-exposing records using .

Alerting Policies
Data Binning
In the picture above it detected PII Exposure in attribute “comment 2“. By clicking on the attribute name it will navigate to Investigator page to inspect values which were detected as violations
In the example above Contains PII field displays true for 2 of the values, which means it contains PII data. Same for other fields, representing other classes of PII Data, ex. Credit Card Number, Phone etc.
Select appropriate detector, like Contains Phone Number and pick the expected value. If you want to ensure data doesn’t contain phones then select False. If you want to make sure it’s nothing but phones select True.
Attributes flagged with PII exposure are highlighted in the Investigator page.