secure by design: shreddrtm
TRANSCRIPT
Secure by Design: ShreddrTM
1
Figure 1. The two images above are actual screenshots taken from Amazon’s
Mechanical Turk platform. The above image is requesting a user to verify
two email addresses while the bottom image is requesting verification of a
company name and address.
Shredded data verificationShreddrTM: the technology that powers Captricity, is named after the well-known document-shredding technology used across industries to protect confidential data.
ShreddrTM technology works by isolating pieces
of information, or data fields, within a form into
distinct images. We call the process “shredding”
the image and the resulting small pieces “shreds.”
Each field, or “shred,” is read and digitized out of
context from the rest of the form by one of many
of data entry workers spread across the globe
(from Amazon’s Mechanical Turk). The data entry
and review process is designed so that each
worker is assigned to process a given class or type
of data, such as last name, from many forms rather
than a group of complete forms. This ensures
that every worker sees only one piece of data, or
shred, from a single form.
2
Figure 2. Workers see images from only one field at a time.
Figure 3.Redaction feature available in the fields toolbox
Figure 4. Social security number split into three fields
For example, in Figure 2, Worker 2 processes only ID
Number fields in a “blind” fashion, meaning that he is not
informed which type of data they have been assigned.
Worker 2 does not know he is processing an ID Number.
Image shred obfuscation
An image pre-processing algorithm protects each shred so
that even if someone managed to gather a large collection
of shreds, it would be virtually impossible to reconstruct
the original form—a feature even paper shredders aren’t
able to claim!
Redaction
In some cases, if a field of personally identifiable
information (PII), such as with social security numbers,
does not need to be digitized and the customer prefers it
to be digitally redacted from the page image, a customer
can choose to black out the field in the Document Markup
step. The redacted portions of the image can then be
further guaranteed to be un-viewable by anyone, and will
not be included in any displayed results.
Field-splitting
Areas containing PII or other sensitive data can be split into separate fields. For example, the field in Figure 4. breaks a social
security number into three separate fields so that each field will be read and digitized by a different worker.
WORKER 1 WORKER 2 WORKER 3 . . .
LAST NAME ID NUMBER CITY AGE
FORM 1
FORM 2
. . .
3
Captricity’s Compliance Overview
Captricity’s security program is based on industry best
practices and align to the most common compliance
frameworks used by our customers and similar
organizations. These include NIST 800-53 Rev. 4, SOC
2 Type II trust principles, ISO 27001, and PCI DSS
v3. Captricity is under the jurisdiction of the FTC and
operates as a business associate under HIPAA.
Third-Party Validations
Captricity invests heavily in third-party validation
activities as part of its continuous monitoring efforts to
ensure system security.
A third-party auditing organization was contracted to
conduct an independent assessment of Captricity’s
compliance with HIPAA safeguards and standards.
Aligning the prescriptive NIST controls against the
required and addressable HIPAA implementation
specifications provided for a robust review. The auditing
organization found Captricity to be compliant with
all required and addressable HIPAA safeguards and
standards.
Captricity has also undergone the first of two parts of
the SOC 2 Type II attestation conducted by an AICPA-
required CPA firm, which assessed Captricity’s control
designs and operating effectiveness under the security,
availability, and confidentiality trust services principles.
Captricity is currently in the review period required by
the AICPA, and anticipate final issuance of the SOC 2
Type II attestation in December 2015.
Additionally, Dell SecureWorks conducted penetration
tests on our entire environment. There were no critical
or high findings, and common vulnerabilities such as
cross-site scripting, injection flaws, and cross-site
request forgery were not found.
Third-Party validation and assessment documentation
will be provided, upon request, under mutual Non-
Disclosure Agreement (NDA).
Please contact [email protected]
for more information.
Bring Data to Life.
To learn more about Captricity, visit us at:
CAPTRICITY.COM