Leak prevention technology.
| Department | Category | Sensitive Data Checks |
|---|---|---|
| Finance | Unpublished Financial Documents | Drafts of balance sheets, financial statements, bank statements, tax returns/files, reports of income, and profit & loss statements |
| Sales Projections | Detection of annual, quarterly, or monthly sales forecasts, growth targets, and market share estimates | |
| Supply Chain Information | Detection of data related to supplier/vendor, inventory, shipment, delivery, purchase orders, distributor, manufacturer, lead time, pricing, cost forecasts, allocation, shortages, terms, conditions, contacts, and schedules | |
| Legal | Attorney-Client Privileged | Confidential communications and documents shared between attorneys and their clients for the purpose of legal advice or representation |
| Confidential Documents | Legal documents containing sensitive information protected by attorney-client privilege, work product protection, or confidentiality agreements | |
| Legal Documents | Contracts, agreements, memoranda of understanding, terms of service, privacy policies, disclaimers, and licensing agreements, as well as drafts or notes related to such documents | |
| Litigation Documents | Materials related to ongoing or potential lawsuits, including pleadings, motions, discovery requests, responses, interrogatories, document productions, depositions, exhibits, or expert reports | |
| Settlement Agreements | Confidential documents outlining negotiated terms and conditions to resolve legal disputes, including payment or non-payment terms, as well as stipulations and releases | |
| Court Orders or Judgments | Official decisions, decrees, or directives issued by a judge or court in relation to a legal matter, dispute or proceeding | |
| Regulatory Filings and Compliance Documents | Materials submitted to regulatory bodies or required for compliance with applicable laws or regulations, including data privacy, consumer protection, and employment | |
| Sales/Marketing | Marketing Strategies | Internal tactics, promotional campaigns, advertising plans, content calendars, new product launch schedules, pricing strategies, and digital marketing initiatives |
| Customer Lists | Unique customer identification, customer names, email addresses, phone numbers, physical addresses, and relevant notes about interactions or preferences | |
| Pricing Strategies | Data related to product or service pricing, rebates and discounts, cost structures, and revenue targets | |
| Market Research Reports | Findings and analysis derived from primary and secondary data sources on market size, industry trends, competitive landscape, customer behavior, and segmentation | |
| Lead Generation Data | Information about potential customers, including contact information (email addresses, phone numbers) and lead scores, collected through marketing campaigns, forms or applications | |
| Executive/Board of Directors | Meeting Minutes | Documented discussion points, decisions, actions, agreed-upon plans, and votes during board meetings |
| Board Reports | Summarized reviews of company activities, financial performance, market positions, and strategic initiatives | |
| Strategic Planning Documents | Related to long-term goals, company direction, market analysis, and competitive intelligence | |
| Executive Presentations | Documents and slides presented to board members that cover updates, strategies, initiatives, financial information, and proposed actions | |
| Executive Compensation Information | Data on salaries, bonuses, stock options, and retirement packages for executive-level management | |
| Military | Intelligence Reports | Unauthorized access to intelligence reports, operational orders, and classified military strategies. |
| Operational Orders (OPORDs) | Unauthorized access to military operational orders, including detailed plans and strategies for military operations. | |
| Classified Military Strategies | Unauthorized access to classified military strategies, including national defense plans and sensitive military operations. | |
| API Keys | Google Analytics API Keys | Unauthorized access to Google Analytics account data and statistics. |
| AWS Access Key ID and Secret Access Key | Unauthorized access to Amazon Web Services resources and services. | |
| Google Analytics GA4 API Keys | Unauthorized access to Google Analytics GA4 account data and statistics. | |
| OpenAI API Keys | Unauthorized access to OpenAI services and resources. | |
| Google Products API Keys | Unauthorized access to various Google products and services. | |
| Stripe API Keys | Unauthorized access to Stripe account data, including payments and customer information. | |
| Twilio Account SID and Auth Token | Unauthorized access to Twilio account data, including messaging and call services. | |
| Mailgun API Keys | Unauthorized access to Mailgun account data and email sending services. | |
| SendGrid API Keys | Unauthorized access to SendGrid account data and email sending services. | |
| Slack API Keys | Unauthorized access to Slack account data and team communication services. | |
| Shopify API Keys | Unauthorized access to Shopify account data and e-commerce services. | |
| HubSpot API Keys | Unauthorized access to HubSpot account data and marketing, sales, and service platform services. | |
| IBM Watson API Keys | Unauthorized access to IBM Watson services and resources. | |
| Plaid API Keys | Unauthorized access to Plaid account data and financial services. | |
| Firebase API Keys | Unauthorized access to Firebase account data and application development services. | |
| Mailchimp API Keys | Unauthorized access to Mailchimp account data and email marketing services. | |
| Trello API Keys | Unauthorized access to Trello account data and project management services. | |
| ClickSend API Keys | Unauthorized access to ClickSend account data and messaging services. | |
| Contentful API Keys | Unauthorized access to Contentful account data and content management services. | |
| Zapier API Keys | Unauthorized access to Zapier account data and automation services. | |
| RingCentral API Keys | Unauthorized access to RingCentral account data and communication services. | |
| Airtable API Keys | Unauthorized access to Airtable account data and database services. | |
| Front API Keys | Unauthorized access to Front account data and email collaboration services. | |
| Square API Keys | Unauthorized access to Square account data and payment processing services. | |
| Microsoft Azure Tenant | Unauthorized access to Microsoft Azure account data and cloud computing services. | |
| Algolia API Keys | Unauthorized access to Algolia account data and search services. | |
| Mapbox API Keys | Unauthorized access to Mapbox account data and mapping services. |