{"version":"1.0","provider_name":"IRI","provider_url":"https:\/\/beta.iri.com\/blog","author_name":"Adam Lewis","author_url":"https:\/\/beta.iri.com\/blog\/author\/adaml\/","title":"Data Class & Rule Library in IRI Workbench - IRI","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"b03zDBv4r0\"><a href=\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-classification\/\">Data Class &#038; Rule Library in IRI Workbench<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/beta.iri.com\/blog\/data-protection\/iri-data-classification\/embed\/#?secret=b03zDBv4r0\" width=\"600\" height=\"338\" title=\"&#8220;Data Class &#038; Rule Library in IRI Workbench&#8221; &#8212; IRI\" data-secret=\"b03zDBv4r0\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2023\/07\/Featured-Image-Blpg-IRI-Data-Classification.png","thumbnail_width":768,"thumbnail_height":368,"description":"Abstract: HIPAA, GDPR, FERPA, and other data privacy laws specify what personally identifiable information (PII) or other sensitive data is considered sensitive enough to require protection from disclosure or discovery. This list of sensitive items \u2013 what IRI calls data classes \u2013 can be abstracted into easy-to-understand groups such as emails, names, phone numbers, etc. This article describes how these Data Classes \u2013 and the ways to find and mask them \u2013 are defined in IRI Workbench. This information is then available to any IRI job that selects that IRI Data Class Rules Library."}