Features
Tabular anonymisation
Transforms structured data on a large scale, in accordance with IM policy guidelines.
Free text anonymisation
Uses advanced text analysis techniques to detect and redact sensitive information from unstructured documents.
Mock data generation
Creates data that mimics the structure and format of real data by selecting from a list of SG-specific fields or by creating custom entities.
Management and sharing of Salts/Secret Keys and Decryption
Efficiently handles and distributes cryptographic elements essential for data protection. This feature guarantees secure management and regulated sharing of critical cryptographic components needed for both data protection and decryption.
Tabular Anonymisation modules offered by Cloak
Roadmap
- Improve performance of free-text anonymisation through novel LLM-based approaches
- Extend modalities of access to serve a wider range of users, including non-government
- Incorporation of other privacy technologies, e.g., Homomorphic Encryption and Searchable Symmetric Encryption to process and search data even when encrypted
Techstack
AWS GCC 2.0
Thanks for letting us know that this page is useful for you!
If you've got a moment, please tell us what we did right so that we can do more of it.
Did this page help you? - No
Thanks for letting us know that this page still needs work to be done.
If you've got a moment, please tell us how we can make this page better.
A Privacy Toolkit That Accelerates Innovation While Ensuring a Careful Balance Between Privacy and Utility