PII/PHI Detection Guide
Understanding sensitive data types and detection methods. This guide covers the 40+ data types that require protection in AI workflows, along with detection strategies and risk classification.
Sensitive Data Categories
Six primary categories of sensitive data that require protection in AI workflows.
Examples:
Examples:
Examples:
Examples:
Examples:
Examples:
PII/PHI Types Reference
Comprehensive list of sensitive data types with detection methods.
| Data Type | Category | Risk | Regex | ML |
|---|---|---|---|---|
| SSN | Identifier | high | Yes | Yes |
| Full Name | Identifier | high | - | Yes |
| Contact | high | Yes | - | |
| Phone | Contact | medium | Yes | - |
| Credit Card | Financial | high | Yes | - |
| Bank Account | Financial | high | Yes | Yes |
| Address | Location | medium | - | Yes |
| Date of Birth | Identifier | medium | Yes | Yes |
| IP Address | Technical | medium | Yes | - |
| Medical Record | PHI | high | Yes | Yes |
| API Key | Credential | high | Yes | Yes |
| Password | Credential | high | - | Yes |
Detection Methods
Understanding different approaches to PII/PHI detection.
Strengths
- +High precision for structured data
- +Fast execution
- +Predictable results
Limitations
- -Limited context understanding
- -Cannot detect unstructured PII
- -Maintenance overhead
Best for: SSN, credit cards, email, phone numbers
Strengths
- +Handles context and variations
- +Detects unstructured PII
- +Improves over time
Limitations
- -Requires training data
- -May have false positives
- -Computationally intensive
Best for: Names, addresses, free-form text
Strengths
- +Best of both methods
- +Higher recall and precision
- +Handles edge cases
Limitations
- -More complex to implement
- -Requires tuning
- -Higher latency
Best for: Enterprise-grade protection
Risk Classification Matrix
How to prioritize protection based on data sensitivity.
Implementation Steps
How to implement PII/PHI detection in your organization.
- Audit current AI tool usage
- Map data flows to AI systems
- Identify data sources
- Apply data taxonomy
- Assign risk levels
- Document data lineage
- Enable built-in detectors
- Create custom patterns
- Set confidence thresholds
- Set masking rules
- Configure reveal permissions
- Establish exceptions
- Review detection logs
- Tune false positives
- Update patterns
Free trial - No credit card required
