1 / 16

Procedures Manual

Procedures Manual. Removing sensitive information. Running Identity Finder. Identity Finder (IDF) is a program that finds sensitive personal information on your computer. IDF is automatically loaded on your computer.

denton-buck
Download Presentation

Procedures Manual

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Procedures Manual Removing sensitive information

  2. Running Identity Finder • Identity Finder (IDF) is a program that finds sensitive personal information on your computer. • IDF is automatically loaded on your computer. • While IDF will show you the suspect information, it is up to you to dispose of it. • This is what you will see… Choose Advanced…

  3. Removing sensitive information • These are the files suspected of containing Sensitive Information. • You should decide what to do with each match, false positives can be deleted or ignored.

  4. Removing sensitive information • These icons are used to Shred, Scrub, and Secure or Ignore the findings. • All findings MUST be resolved by one of these options.

  5. Removing sensitive information Use these tabs to shred or Scrub the matches • Shred utilizes a secure wiping technique to delete files. • Scrub is great when you no longer need the personal information but want to keep the original item. This feature is also known as Redact.

  6. Removing sensitive information • The preview Pane on the right shows the suspected password, credit card # or SSN. • Look at each line and decide if the data should be protected or ignored.

  7. Removing sensitive information • In this case, the password (Support) is an example in a user guide, it can be ignored. • Highlight the line and Click ‘Ignore’, then ‘This Item Location’.

  8. Removing sensitive information • Verify that you want to ignore this location. • Click Yes.

  9. Removing sensitive information • The file will be removed from the list and the next match will be shown in the preview pane and highlighted.

  10. Removing sensitive information • If Shred is chosen a verification box also pops up, choose Yes to shred the document.

  11. Removing sensitive information • You will get verification that the selected item was shredded. • Click OK.

  12. Removing sensitive information • The next two documents contain multiple matches. • Further examination reveals that they are not real SSNs and all can be ignored.

  13. Removing sensitive information • So select Ignore. • Then ‘This Item Location’. • These files will be ignored in future scans.

  14. Removing sensitive information (continued) You can also right-click on the match to resolve it • You are to select shred, scrub, secure, quarantine, recycle or ignore for each item found. • If you do not select one of the above, your scan is incomplete.

  15. Removing sensitive information • In the end after all items are reconciled, Identity Finder should have no Items to show. • Close the program.

  16. Removing sensitive information (continued) • If you have questions or need help please email lamorgan@pvamu.edu • Or call (936) 261-2126

More Related