Leak prevention technology.
Department | Category | Sensitive Data Checks |
---|---|---|
Finance | Unpublished Financial Documents | Drafts of balance sheets, financial statements, bank statements, tax returns/files, reports of income, and profit & loss statements |
Sales Projections | Detection of annual, quarterly, or monthly sales forecasts, growth targets, and market share estimates | |
Supply Chain Information | Detection of data related to supplier/vendor, inventory, shipment, delivery, purchase orders, distributor, manufacturer, lead time, pricing, cost forecasts, allocation, shortages, terms, conditions, contacts, and schedules | |
Legal | Attorney-Client Privileged | Confidential communications and documents shared between attorneys and their clients for the purpose of legal advice or representation |
Confidential Documents | Legal documents containing sensitive information protected by attorney-client privilege, work product protection, or confidentiality agreements | |
Legal Documents | Contracts, agreements, memoranda of understanding, terms of service, privacy policies, disclaimers, and licensing agreements, as well as drafts or notes related to such documents | |
Litigation Documents | Materials related to ongoing or potential lawsuits, including pleadings, motions, discovery requests, responses, interrogatories, document productions, depositions, exhibits, or expert reports | |
Settlement Agreements | Confidential documents outlining negotiated terms and conditions to resolve legal disputes, including payment or non-payment terms, as well as stipulations and releases | |
Court Orders or Judgments | Official decisions, decrees, or directives issued by a judge or court in relation to a legal matter, dispute or proceeding | |
Regulatory Filings and Compliance Documents | Materials submitted to regulatory bodies or required for compliance with applicable laws or regulations, including data privacy, consumer protection, and employment | |
Sales/Marketing | Marketing Strategies | Internal tactics, promotional campaigns, advertising plans, content calendars, new product launch schedules, pricing strategies, and digital marketing initiatives |
Customer Lists | Unique customer identification, customer names, email addresses, phone numbers, physical addresses, and relevant notes about interactions or preferences | |
Pricing Strategies | Data related to product or service pricing, rebates and discounts, cost structures, and revenue targets | |
Market Research Reports | Findings and analysis derived from primary and secondary data sources on market size, industry trends, competitive landscape, customer behavior, and segmentation | |
Lead Generation Data | Information about potential customers, including contact information (email addresses, phone numbers) and lead scores, collected through marketing campaigns, forms or applications | |
Executive/Board of Directors | Meeting Minutes | Documented discussion points, decisions, actions, agreed-upon plans, and votes during board meetings |
Board Reports | Summarized reviews of company activities, financial performance, market positions, and strategic initiatives | |
Strategic Planning Documents | Related to long-term goals, company direction, market analysis, and competitive intelligence | |
Executive Presentations | Documents and slides presented to board members that cover updates, strategies, initiatives, financial information, and proposed actions | |
Executive Compensation Information | Data on salaries, bonuses, stock options, and retirement packages for executive-level management | |
Military | Intelligence Reports | Unauthorized access to intelligence reports, operational orders, and classified military strategies. |
Operational Orders (OPORDs) | Unauthorized access to military operational orders, including detailed plans and strategies for military operations. | |
Classified Military Strategies | Unauthorized access to classified military strategies, including national defense plans and sensitive military operations. | |
API Keys | Google Analytics API Keys | Unauthorized access to Google Analytics account data and statistics. |
AWS Access Key ID and Secret Access Key | Unauthorized access to Amazon Web Services resources and services. | |
Google Analytics GA4 API Keys | Unauthorized access to Google Analytics GA4 account data and statistics. | |
OpenAI API Keys | Unauthorized access to OpenAI services and resources. | |
Google Products API Keys | Unauthorized access to various Google products and services. | |
Stripe API Keys | Unauthorized access to Stripe account data, including payments and customer information. | |
Twilio Account SID and Auth Token | Unauthorized access to Twilio account data, including messaging and call services. | |
Mailgun API Keys | Unauthorized access to Mailgun account data and email sending services. | |
SendGrid API Keys | Unauthorized access to SendGrid account data and email sending services. | |
Slack API Keys | Unauthorized access to Slack account data and team communication services. | |
Shopify API Keys | Unauthorized access to Shopify account data and e-commerce services. | |
HubSpot API Keys | Unauthorized access to HubSpot account data and marketing, sales, and service platform services. | |
IBM Watson API Keys | Unauthorized access to IBM Watson services and resources. | |
Plaid API Keys | Unauthorized access to Plaid account data and financial services. | |
Firebase API Keys | Unauthorized access to Firebase account data and application development services. | |
Mailchimp API Keys | Unauthorized access to Mailchimp account data and email marketing services. | |
Trello API Keys | Unauthorized access to Trello account data and project management services. | |
ClickSend API Keys | Unauthorized access to ClickSend account data and messaging services. | |
Contentful API Keys | Unauthorized access to Contentful account data and content management services. | |
Zapier API Keys | Unauthorized access to Zapier account data and automation services. | |
RingCentral API Keys | Unauthorized access to RingCentral account data and communication services. | |
Airtable API Keys | Unauthorized access to Airtable account data and database services. | |
Front API Keys | Unauthorized access to Front account data and email collaboration services. | |
Square API Keys | Unauthorized access to Square account data and payment processing services. | |
Microsoft Azure Tenant | Unauthorized access to Microsoft Azure account data and cloud computing services. | |
Algolia API Keys | Unauthorized access to Algolia account data and search services. | |
Mapbox API Keys | Unauthorized access to Mapbox account data and mapping services. |