{"id":9702,"date":"2016-06-02T11:10:38","date_gmt":"2016-06-02T15:10:38","guid":{"rendered":"http:\/\/www.iri.com\/blog\/?p=9702"},"modified":"2019-10-03T16:56:20","modified_gmt":"2019-10-03T20:56:20","slug":"pii-lookup-file-searches","status":"publish","type":"post","link":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/","title":{"rendered":"PII Lookup File Searches"},"content":{"rendered":"<p>IRI provides multiple data discovery features for personally identifiable information (PII) and other sensitive or need-to-be-found data held in enterprise <a href=\"https:\/\/www.iri.com\/products\/workbench\/data-sources\">sources<\/a>.<\/p>\n<p>Beyond data class, pattern- and fuzzy-match searches described elsewhere in this blog, this article primarily discusses the search for values held in a lookup or &#8216;set&#8217; file (e.g., a list of names). The feature is supported in the <a style=\"color: #1155cc; text-decoration: underline;\" href=\"http:\/\/www.iri.com\/products\/fieldshield\">IRI FieldShield<\/a> data masking product for databases and files, the IRI CellShield Enterprise Edition (<a style=\"color: #1155cc; text-decoration: underline;\" href=\"http:\/\/www.iri.com\/products\/cellshield\/cellshield-ee\">EE<\/a>) data masking product for Microsoft Excel spreadsheets, and the <a style=\"color: #1155cc; text-decoration: underline;\" href=\"http:\/\/www.iri.com\/products\/voracity\">IRI Voracity<\/a> platform for data lifecycle management.<span style=\"line-height: 1.5;\">\u00a0<\/span><\/p>\n<p>Specifically, the new search capability is built into the wizards for database profiling, flat-file profiling, and dark data discovery in the <a style=\"color: #1155cc; text-decoration: underline;\" href=\"http:\/\/www.iri.com\/products\/workbench\">IRI Workbench<\/a> GUI (built on Eclipse), which supports FieldShield and all other IRI software. And, the same string-search feature was added to CellShield EE for masking data in Excel spreadsheets.<\/p>\n<p style=\"font-weight: bold;\"><span style=\"font-weight: bold;\"><span style=\"font-weight: bold;\">Value Searches in DBs &amp; Files<\/span><\/span><\/p>\n<p>To use this lookup feature in the <a style=\"color: #1155cc; text-decoration: underline;\" href=\"http:\/\/www.iri.com\/blog\/data-transformation2\/database-profiling-in-iri-workbench\/\">database<\/a> or <a style=\"color: #1155cc; text-decoration: underline;\" href=\"http:\/\/www.iri.com\/blog\/iri\/iri-workbench\/flat-file-profiling\/\">flat-file<\/a> profiling wizards, find the Column (DB profiler) or Field (file profiler wizard) Selection page, and select the check box for Expression Search. On the next page, select Values File from the Search Type list. Then browse to find and select the set file with the values to be searched. Complete the rest of the fields on the page, and click Finish.<\/p>\n<p align=\"center\"><a title=\"PII Lookup File Searches - Pat Rushlaw 0.jpg\" href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/06\/PII-Lookup-File-Searches-Pat-Rushlaw-0.jpg\" rel=\"prettyPhoto\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" style=\"width: 500px; height: 625px;\" title=\"Value Searches in DBs &amp; Files\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/06\/t_PII-Lookup-File-Searches-Pat-Rushlaw-0.jpg\" alt=\"Value Searches in DBs &amp; Files\" width=\"500\" height=\"625\" \/><\/a><\/p>\n<p>\u00a0<span style=\"font-weight: bold;\"><span style=\"font-weight: bold;\">Value Searches in Text, Documents and other Unstructured Data Sources<\/span><\/span><\/p>\n<p>The Dark Data Discovery wizard can also find values in lookup files because they are text files, and that wizard can use multiple search methods to find data in any text file, Microsoft Office and PDF document, MongoDB or Cassandra, or in popular image file formats (even images embedded in documents). The wizard extracts and buckets both the values it finds and the metadata for the files in which those values are found into a delimited flat-file, or in an Excel Interchange File (EIF) for use in CellShield EE.<span style=\"line-height: 1.5;\">\u00a0Note however that this wizard is usually with the <a href=\"https:\/\/www.iri.com\/products\/darkshield\">IRI DarkShield<\/a> tool for finding and masking pre-classified PII hidden in unstructured data sources.<\/span><\/p>\n<p align=\"center\"><a title=\"PII Lookup File Searches - Pat Rushlaw 1.jpg\" href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/06\/PII-Lookup-File-Searches-Pat-Rushlaw-1.jpg\" rel=\"prettyPhoto\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" style=\"width: 472px; height: 377px;\" title=\"Dark Data Discovery wizard\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/06\/t_PII-Lookup-File-Searches-Pat-Rushlaw-1.jpg\" alt=\"Dark Data Discovery wizard\" width=\"472\" height=\"377\" \/><\/a><\/p>\n<p>\u00a0<span style=\"font-weight: bold;\"><span style=\"font-weight: bold;\">Value Searches in Excel<\/span><\/span><\/p>\n<p>Alternatively, CellShield EE\u2019s new Set File [based] Remediation feature can find values in any Excel 2010 or 2013 spreadsheet that exist in a set file, allowing you to mask those values via encryption, redaction, or pseudonymization. You upload the set file, choose the preferred protection function, and click \u201cRemediate.\u201d A popup lets you know when the operation is done.<\/p>\n<p>Pseudonymization, by way of example, is a good way to de-identify names or other proper nouns while preserving realism in the target. Pseudonyms can be reversible, or not.<\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li>In your worksheet, click the <span style=\"font-style: italic;\">Import Set File<\/span> icon in the CellShield ribbon to open the <span style=\"font-style: italic;\">Set File Search<\/span> utility.<\/li>\n<li>Browse to the set file with the names you are looking for, and try to load it. You will get an error if there\u2019s a problem with the file &#8212; it must be a list of ASCII values delimited by a space or carriage return. Click OK to continue.<a title=\"PII Lookup File Searches - Pat Rushlaw 2.jpg\" href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/06\/PII-Lookup-File-Searches-Pat-Rushlaw-2.jpg\" rel=\"prettyPhoto\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" style=\"width: 624px; height: 390px;\" title=\"Value Searches in Excel \" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/06\/t_PII-Lookup-File-Searches-Pat-Rushlaw-2.jpg\" alt=\"Value Searches in Excel \" width=\"624\" height=\"390\" \/><\/a><\/li>\n<li>For the Remediation Type here, we\u2019re choosing Pseudonymization, though we could also choose redaction (full\/partial cell), or encryption (AES 128, FPE AES 256, etc.), instead.<\/li>\n<li>Click on Find Matches, and the Menu gives a count of the matches found, highlighted in red. Click OK to continue.<\/li>\n<li>Tick Recoverable to save a restore set, or Non-Recoverable to prevent data restoration.<\/li>\n<li>For Recoverable, a Restore file is automatically created in the \u201cCX-Pseudo_Restore\u201d folder on the local drive.<\/li>\n<li>The original Set File is scrambled to randomly create pseudonym (substitute) values, which will also get saved into a recovery file for optional restoration later.<\/li>\n<li>Click Remediate to pseudonymize the names in the sheet. You can see the scrambled names are now in place.<a title=\"PII Lookup File Searches - Pat Rushlaw 3.jpg\" href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/06\/PII-Lookup-File-Searches-Pat-Rushlaw-3.jpg\" rel=\"prettyPhoto\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" style=\"width: 624px; height: 390px;\" title=\"More Value Searches in Excel \" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/06\/t_PII-Lookup-File-Searches-Pat-Rushlaw-3.jpg\" alt=\"More Value Searches in Excel \" width=\"624\" height=\"390\" \/><\/a><\/li>\n<li>You can restore the original names by using the recovery file. Click the restore tab in the set file module. Navigate to that file in the <span style=\"font-style: italic;\">CX-Pseudo_Restore <\/span>folder, and click the Restore button.<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><a href=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-9715 \" title=\"Set File Search\" src=\"http:\/\/www.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg\" alt=\"Set File Search\" width=\"434\" height=\"387\" srcset=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg 600w, https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search-300x268.jpg 300w\" sizes=\"(max-width: 434px) 100vw, 434px\" \/><\/a>\u00a0This feature is also offered in Bulk Remediate mode. Using your .eif file, you can simultaneously protect all the set file items in all the discovered sheets (lookup values) in the same way with the set file remediation function you choose.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IRI provides multiple data discovery features for personally identifiable information (PII) and other sensitive or need-to-be-found data held in enterprise sources. Beyond data class, pattern- and fuzzy-match searches described elsewhere in this blog, this article primarily discusses the search for values held in a lookup or &#8216;set&#8217; file (e.g., a list of names). The feature<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/\" title=\"PII Lookup File Searches\">Read More<\/a><\/div>\n","protected":false},"author":95,"featured_media":9715,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[280,920,14,519,1061,898,982,520,789,598,148,149,600],"class_list":["post-9702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","tag-data-discovery","tag-data-lifecycle-management","tag-data-masking","tag-database","tag-enterprise-data-sources","tag-files","tag-iri-cellshield-enterprise-edition","tag-iri-fieldshield","tag-iri-voracity","tag-microsoft-excel","tag-personally-identifiable-information","tag-pii","tag-spreadsheet"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PII Lookup File Searches - IRI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PII Lookup File Searches - IRI\" \/>\n<meta property=\"og:description\" content=\"IRI provides multiple data discovery features for personally identifiable information (PII) and other sensitive or need-to-be-found data held in enterprise sources. Beyond data class, pattern- and fuzzy-match searches described elsewhere in this blog, this article primarily discusses the search for values held in a lookup or &#8216;set&#8217; file (e.g., a list of names). The featureRead More\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-02T15:10:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-03T20:56:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pat Rushlaw\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pat Rushlaw\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/\"},\"author\":{\"name\":\"Pat Rushlaw\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/fafa3e04cdd095667b046ef3bae4117b\"},\"headline\":\"PII Lookup File Searches\",\"datePublished\":\"2016-06-02T15:10:38+00:00\",\"dateModified\":\"2019-10-03T20:56:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/\"},\"wordCount\":700,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg\",\"keywords\":[\"data discovery\",\"data lifecycle management\",\"data masking\",\"database\",\"enterprise data sources\",\"files\",\"IRI CellShield Enterprise Edition\",\"IRI FieldShield\",\"IRI Voracity\",\"Microsoft Excel\",\"personally identifiable information\",\"PII\",\"spreadsheet\"],\"articleSection\":[\"Data Masking\/Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/\",\"name\":\"PII Lookup File Searches - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg\",\"datePublished\":\"2016-06-02T15:10:38+00:00\",\"dateModified\":\"2019-10-03T20:56:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#primaryimage\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg\",\"width\":600,\"height\":535,\"caption\":\"Set File Search\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beta.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PII Lookup File Searches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#website\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beta.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/beta.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/fafa3e04cdd095667b046ef3bae4117b\",\"name\":\"Pat Rushlaw\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4e7f7887f3944c0473e12c1c58d4a932?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4e7f7887f3944c0473e12c1c58d4a932?s=96&d=blank&r=g\",\"caption\":\"Pat Rushlaw\"},\"url\":\"https:\/\/beta.iri.com\/blog\/author\/patr\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PII Lookup File Searches - IRI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/","og_locale":"en_US","og_type":"article","og_title":"PII Lookup File Searches - IRI","og_description":"IRI provides multiple data discovery features for personally identifiable information (PII) and other sensitive or need-to-be-found data held in enterprise sources. Beyond data class, pattern- and fuzzy-match searches described elsewhere in this blog, this article primarily discusses the search for values held in a lookup or &#8216;set&#8217; file (e.g., a list of names). The featureRead More","og_url":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/","og_site_name":"IRI","article_published_time":"2016-06-02T15:10:38+00:00","article_modified_time":"2019-10-03T20:56:20+00:00","og_image":[{"width":600,"height":535,"url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg","type":"image\/jpeg"}],"author":"Pat Rushlaw","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Pat Rushlaw","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#article","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/"},"author":{"name":"Pat Rushlaw","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/fafa3e04cdd095667b046ef3bae4117b"},"headline":"PII Lookup File Searches","datePublished":"2016-06-02T15:10:38+00:00","dateModified":"2019-10-03T20:56:20+00:00","mainEntityOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/"},"wordCount":700,"commentCount":0,"publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg","keywords":["data discovery","data lifecycle management","data masking","database","enterprise data sources","files","IRI CellShield Enterprise Edition","IRI FieldShield","IRI Voracity","Microsoft Excel","personally identifiable information","PII","spreadsheet"],"articleSection":["Data Masking\/Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/","url":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/","name":"PII Lookup File Searches - IRI","isPartOf":{"@id":"https:\/\/beta.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#primaryimage"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#primaryimage"},"thumbnailUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg","datePublished":"2016-06-02T15:10:38+00:00","dateModified":"2019-10-03T20:56:20+00:00","breadcrumb":{"@id":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#primaryimage","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg","width":600,"height":535,"caption":"Set File Search"},{"@type":"BreadcrumbList","@id":"https:\/\/beta.iri.com\/blog\/data-protection\/pii-lookup-file-searches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beta.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"PII Lookup File Searches"}]},{"@type":"WebSite","@id":"https:\/\/beta.iri.com\/blog\/#website","url":"https:\/\/beta.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/beta.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beta.iri.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beta.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/beta.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/fafa3e04cdd095667b046ef3bae4117b","name":"Pat Rushlaw","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beta.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4e7f7887f3944c0473e12c1c58d4a932?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4e7f7887f3944c0473e12c1c58d4a932?s=96&d=blank&r=g","caption":"Pat Rushlaw"},"url":"https:\/\/beta.iri.com\/blog\/author\/patr\/"}]}},"jetpack_featured_media_url":"https:\/\/beta.iri.com\/blog\/wp-content\/uploads\/2016\/06\/Set-File-Search.jpg","_links":{"self":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9702"}],"collection":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=9702"}],"version-history":[{"count":10,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9702\/revisions"}],"predecessor-version":[{"id":17639,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/posts\/9702\/revisions\/17639"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media\/9715"}],"wp:attachment":[{"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=9702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=9702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beta.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=9702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}