Release 5.6.3 Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Toggle Dark/Light/Auto mode Back to homepage

Refactor DRAFT

The IRDM Framework

The Canopy Incident Response Data Mining (IRDM) Framework operates on two simultaneous tracks: the Data Track (Volume) and the Legal Track (Application). This dual-vector approach systematically narrows a chaotic dataset into a defensible, finalized notification set.


1. Core Methodology: The Dual-Track Approach

PhaseData Track Action (Volume)Legal Track Action (Application)
1. ProcessingNormalize: Intake, deduplication, and indexing.Strategize: Establishing jurisdictional hypotheses.
2. AssessmentSearch: Identifying high-probability documents.Scope: Defining “qualified” data with Counsel.
3. ReviewMine: Extracting granular data fragments.Finalize: Locking the defensible protocol.
4. ConsolidationDeduplicate: Merging into unique entities.Qualify: Applying legal notification bars.

2. Phase Summaries

Phase 1: Processing (The Strategy)

Goal: Eliminate “Technical Debt” and establish the search-reliable index.

  • Legal Track: Counsel establishes a broad jurisdictional view (Residency Mapping, Harm Thresholds, and Regulatory Timing).
  • Data Track: AI-driven detection runs across a deduplicated, De-NISTed dataset. Analysts identify known client data patterns (e.g., specific Employee ID formats).

Phase 2: Assessment (The Scoping)

Goal: Narrow the document universe to a defensible “Review Set.”

  • Legal Track: Analysts and Counsel define the Review Protocol—the rules governing what data is “qualified.”
  • Data Track: Targeted searches filter the dataset to documents potentially containing non-unique qualified entities.

Phase 3: Review (The Mining)

Goal: Granular extraction of PII/PHI.

  • Legal Track: The protocol is Finalized. Any mid-stream changes require a return to “Second-Pass Assessment.”
  • Data Track: Reviewers (GenAI or Human) extract specific data elements and link them to individuals per the protocol.

Phase 4: Consolidation (The Qualification)

Goal: Produce the final, unique notification list.

  • Legal Track: Application of the Qualification Test against jurisdictional thresholds (e.g., 500+ residents).
  • Data Track: Entity Management deduplicates the list to ensure each unique person is counted once, regardless of document frequency.

3. Project Management Deep-Dive

Core Objective: Establish the “Initial Hypothesis” before data intake to optimize configuration.

  • The “Plus” Factor: Determining if the data meets the definition of PII (Name + high-risk identifier).
  • Jurisdiction Mapping: Evaluating the residency of victims against specific laws (e.g., CCPA, GDPR).
  • Safe Harbor Evaluation: Assessing if encryption status removes the obligation to notify.
  • Discovery Timing: Identifying regulatory clocks (e.g., 72-hour GDPR windows or 30-day CA requirements).
FactorKey Impact on Notification
Data TypeSensitive PII vs. Encrypted data (Safe Harbor).
ResidencyDetermines which state/country statutes apply.
VolumeHigh counts trigger Attorney General/Regulator reports.
Risk“No reasonable likelihood of harm” may waive notice.

Activity: Understand the Data (Data Track)

Core Objective: Define the technical boundaries of the dataset.

  • Exclusionary Date Range: Culling data outside the breach/remediation window.
  • Excluded Folders/Metadata: Applying client-directed exclusions during processing.
  • Custom Formats: Identifying company-specific data patterns for specialized detection rules.
  • Logistics: Selecting the optimal transfer method (Secure Browser vs. Cloud-to-Cloud).

4. Workflows & Resources

WorkflowObjectiveDocumentation Link
Intake IntegrityHashing and Chain of Custody.Intake Procedures
Protocol Sign-offFinalizing legal triggers with Counsel.Legal Calibration
Entity ManagementDeduplicating and Qualifying.Consolidation Guide

Next Step: Phase 1: Processing (The Strategy)