Processing
When the data forensics or incident response team isolates potentially compromised data, the data is collected in a forensically sound way and uploaded into Canopy’s system.
When the data is uploaded, Canopy’s data mining software processes it by removing duplicates, filtering out irrelevant data, extracting text and metadata from various file formats, and classifying data that may contain personal information. This step reduces the volume of data requiring assessment, increasing efficiency and reducing cost.
In data mining, the data processor plays a crucial role in handling and preparing the collected electronic compromised data for assessment and review.