<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>IRI</provider_name><provider_url>https://beta.iri.com/blog</provider_url><author_name>Adam Lewis</author_name><author_url>https://beta.iri.com/blog/author/adaml/</author_url><title>Data Class &amp; Rule Library in IRI Workbench - IRI</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="BYVDHE4pm6"&gt;&lt;a href="https://beta.iri.com/blog/data-protection/iri-data-classification/"&gt;Data Class &amp; Rule Library in IRI Workbench&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://beta.iri.com/blog/data-protection/iri-data-classification/embed/#?secret=BYVDHE4pm6" width="600" height="338" title="&#x201C;Data Class &amp; Rule Library in IRI Workbench&#x201D; &#x2014; IRI" data-secret="BYVDHE4pm6" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script type="text/javascript"&gt;
/* &lt;![CDATA[ */
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
/* ]]&gt; */
&lt;/script&gt;
</html><thumbnail_url>https://beta.iri.com/blog/wp-content/uploads/2023/07/Featured-Image-Blpg-IRI-Data-Classification.png</thumbnail_url><thumbnail_width>768</thumbnail_width><thumbnail_height>368</thumbnail_height><description>Abstract: HIPAA, GDPR, FERPA, and other data privacy laws specify what personally identifiable information (PII) or other sensitive data is considered sensitive enough to require protection from disclosure or discovery. This list of sensitive items &#x2013; what IRI calls data classes &#x2013; can be abstracted into easy-to-understand groups such as emails, names, phone numbers, etc. This article describes how these Data Classes &#x2013; and the ways to find and mask them &#x2013; are defined in IRI Workbench. This information is then available to any IRI job that selects that IRI Data Class Rules Library.</description></oembed>
