secure by design: shreddrtm

4
Secure by Design: Shreddr TM 1 Figure 1. The two images above are actual screenshots taken from Amazon’s Mechanical Turk plaorm. The above image is requesng a user to verify two email addresses while the boom image is requesng verificaon of a company name and address. Shredded data verificaon Shreddr TM : the technology that powers Captricity, is named aſter the well-known document-shredding technology used across industries to protect confidenal data. Shreddr TM technology works by isolang pieces of informaon, or data fields, within a form into disnct images. We call the process “shredding” the image and the resulng small pieces “shreds.” Each field, or “shred,” is read and digized out of context from the rest of the form by one of many of data entry workers spread across the globe (from Amazon’s Mechanical Turk). The data entry and review process is designed so that each worker is assigned to process a given class or type of data, such as last name, from many forms rather than a group of complete forms. This ensures that every worker sees only one piece of data, or shred, from a single form.

Upload: buimien

Post on 04-Jan-2017

227 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Secure by Design: ShreddrTM

Secure by Design: ShreddrTM

1

Figure 1. The two images above are actual screenshots taken from Amazon’s

Mechanical Turk platform. The above image is requesting a user to verify

two email addresses while the bottom image is requesting verification of a

company name and address.

Shredded data verificationShreddrTM: the technology that powers Captricity, is named after the well-known document-shredding technology used across industries to protect confidential data.

ShreddrTM technology works by isolating pieces

of information, or data fields, within a form into

distinct images. We call the process “shredding”

the image and the resulting small pieces “shreds.”

Each field, or “shred,” is read and digitized out of

context from the rest of the form by one of many

of data entry workers spread across the globe

(from Amazon’s Mechanical Turk). The data entry

and review process is designed so that each

worker is assigned to process a given class or type

of data, such as last name, from many forms rather

than a group of complete forms. This ensures

that every worker sees only one piece of data, or

shred, from a single form.

Page 2: Secure by Design: ShreddrTM

2

Figure 2. Workers see images from only one field at a time.

Figure 3.Redaction feature available in the fields toolbox

Figure 4. Social security number split into three fields

For example, in Figure 2, Worker 2 processes only ID

Number fields in a “blind” fashion, meaning that he is not

informed which type of data they have been assigned.

Worker 2 does not know he is processing an ID Number.

Image shred obfuscation

An image pre-processing algorithm protects each shred so

that even if someone managed to gather a large collection

of shreds, it would be virtually impossible to reconstruct

the original form—a feature even paper shredders aren’t

able to claim!

Redaction

In some cases, if a field of personally identifiable

information (PII), such as with social security numbers,

does not need to be digitized and the customer prefers it

to be digitally redacted from the page image, a customer

can choose to black out the field in the Document Markup

step. The redacted portions of the image can then be

further guaranteed to be un-viewable by anyone, and will

not be included in any displayed results.

Field-splitting

Areas containing PII or other sensitive data can be split into separate fields. For example, the field in Figure 4. breaks a social

security number into three separate fields so that each field will be read and digitized by a different worker.

WORKER 1 WORKER 2 WORKER 3 . . .

LAST NAME ID NUMBER CITY AGE

FORM 1

FORM 2

. . .

Page 3: Secure by Design: ShreddrTM

3

Captricity’s Compliance Overview

Captricity’s security program is based on industry best

practices and align to the most common compliance

frameworks used by our customers and similar

organizations. These include NIST 800-53 Rev. 4, SOC

2 Type II trust principles, ISO 27001, and PCI DSS

v3. Captricity is under the jurisdiction of the FTC and

operates as a business associate under HIPAA.

Third-Party Validations

Captricity invests heavily in third-party validation

activities as part of its continuous monitoring efforts to

ensure system security.

A third-party auditing organization was contracted to

conduct an independent assessment of Captricity’s

compliance with HIPAA safeguards and standards.

Aligning the prescriptive NIST controls against the

required and addressable HIPAA implementation

specifications provided for a robust review. The auditing

organization found Captricity to be compliant with

all required and addressable HIPAA safeguards and

standards.

Captricity has also undergone the first of two parts of

the SOC 2 Type II attestation conducted by an AICPA-

required CPA firm, which assessed Captricity’s control

designs and operating effectiveness under the security,

availability, and confidentiality trust services principles.

Captricity is currently in the review period required by

the AICPA, and anticipate final issuance of the SOC 2

Type II attestation in December 2015.

Additionally, Dell SecureWorks conducted penetration

tests on our entire environment. There were no critical

or high findings, and common vulnerabilities such as

cross-site scripting, injection flaws, and cross-site

request forgery were not found.

Third-Party validation and assessment documentation

will be provided, upon request, under mutual Non-

Disclosure Agreement (NDA).

Please contact [email protected]

for more information.

Page 4: Secure by Design: ShreddrTM

Bring Data to Life.

To learn more about Captricity, visit us at:

CAPTRICITY.COM