Skip to main content
Skip table of contents

Managing Sensitive Content to Reduce Reputational Risk

Reputational risk rarely comes from a single catastrophic mistake. It usually comes from slow drift. Content gets copied, moved, forgotten, shared too broadly, or stored in places no one actively manages. Over time, sensitive content spreads into areas where controls are weak or unclear.

By running Shinydocs Pro against your content, you already have a detailed inventory of where sensitive content lives. Detection rules are applied automatically across your sources unless explicitly disabled, giving you immediate visibility into PII and other sensitive content without additional setup.

image-20251216-142909.png

Shinydocs Pro Control Center’s Overview shows your sensitive content at a glance

Define what “sensitive content” means to your organization

Shinydocs Pro includes over 70 out of the box rules for detecting common types of sensitive content, including personal identifiable information, regulated identifiers, credentials, and other high risk patterns.

These rules are managed centrally in Control Center > Settings > Tagging > PII.

image-20251216-143258.png

Here, administrators can review all built in sensitive content rules and enable or disable specific rules based on policy.

This ensures sensitive content is identified according to your standards, not a generic model.

Continuously discover sensitive content across all sources

Once rules are enabled, Shinydocs Pro scans content across connected systems and applies tags when sensitive content is detected.

The Overview page provides an immediate, aggregated view of where sensitive content exists across your environment. You can change the perspective of where your most sensitive information lives by source or by policy, empowering you to know exactly where that content is.

image-20251216-143530.png
image-20251216-143514.png

By policy view

image-20251216-143546.png

By source view

From this view, you can:

  • See total sensitive content matches

  • Understand severity distribution (High, Medium, Low)

  • Identify which sources contribute the most risk

  • Correlate sensitive content with duplicates, unused content, and file types

This answers a critical governance question quickly: where is our sensitive content actually living?

Act on sensitive content using the Catalog

The Catalog is where insight turns into action.

image-20251216-144248.png

Within the Catalog, you can:

  • Filter content by specific sensitive content types like credit cards, social insurance numbers

  • Limit results to one source or span all sources

  • Combine sensitive content filters with ROT (Redundant, Obsolete, Trivial) and duplicate indicators

  • Select content to dispose of or generate reports

This allows you to take controlled, auditable action rather than exporting raw lists or relying on manual reviews.

Produce reports that demonstrate control

Using Catalog filters, you can generate reports that show:

  • Where sensitive content exists

  • Which policies were matched

  • Which sources are affected

  • What actions were taken

image-20251216-144506.png

Reporting on sensitive content is as simple as clicking a button.

image-20251216-144917.png

Disposal of sensitive content living where it shouldn’t is easy with Shinydocs Pro.

These reports support internal governance, audits, and leadership reporting without requiring custom queries or external tools.

The result is continuous, defensible proof that sensitive content is being identified, reviewed, and managed according to policy.

Customizing sensitive content detection rules

Shinydocs Pro ships with a broad set of out-of-the-box rules designed to detect the most common types of sensitive content. In many cases, these rules will cover what you need without any changes.

That said, your environment is unique. Naming conventions differ. Data formats vary. Regulatory definitions evolve. Shinydocs Pro is designed to let you adapt detection rules to match your reality.

Sensitive content detection rules are stored as JSON files on the Shinydocs Pro server. By default, they can be found at:

CODE
C:\Program Files\Shinydocs Professional\ControlCenter\Pii Rules\Potential PII

Your installation path may differ depending on how Shinydocs Pro was deployed.

Each JSON file represents a single rule. For example, the built-in MasterCard credit card rule defines its name, sensitivity level, regex pattern, and additional query logic to improve accuracy.

You are free to tailor these rules to your needs. Common customizations include:

  • Modifying an existing rule to better match how sensitive content appears in your files

  • Adjusting a regular expression to reduce false positives or capture additional formats

  • Changing query conditions to require more context before a match is flagged

  • Creating entirely new rules for organization-specific identifiers or patterns

You are not limited to the rules that ship with the product.

Creating a new sensitive content rule

To add a new rule, create a new JSON file in the same directory as the existing rules. Shinydocs Pro will automatically pick it up and make it available.

Below is a simple template showing the basic structure of a sensitive content detection rule. You can use this as a starting point and expand it as needed.

Shinydocs support is here to help! Reach out to us https://help.shinydocs.com/ for support.

CODE
{
  "Name": "Custom Sensitive Content Rule",
  "DisplayGroup": "Custom Rules",
  "Description": "Describe what this rule detects",
  "FieldName": "potential_pii",
  "FieldValue": "Custom Sensitive Content",
  "Sensitivity": 2,
  "RegexPattern": "",
  "LuhnValidate": "false",
  "RawQuery": {
    "bool": {
      "must": [],
      "should": [],
      "must_not": [],
      "filter": []
    }
  }
}

Sensitivity values:

0: Low
1: Medium
2: High

At a minimum, most rules define a name, sensitivity, and either a regular expression or query logic. More advanced rules combine both to improve accuracy.

Making rules available in Control Center

You can copy your JSON file to:

CODE
C:\Program Files\Shinydocs Professional\ControlCenter\Pii Rules\Potential PII

Your installation path may differ depending on how Shinydocs Pro was deployed.

Any new rules you create, as well as updated rules included in future Shinydocs Pro releases, will automatically appear in:

Control Center > Settings > Tagging > PII

From there, you can enable, disable, and manage them just like the built-in rules.

Let’s review

By using Shinydocs Pro in this way, organizations are able to:

  • Identify sensitive content wherever it exists

  • Understand exposure across systems and sources

  • Take action to reduce unnecessary risk

  • Demonstrate ongoing control without excessive manual effort

This shifts sensitive content management from a reactive exercise to a sustained operational practice.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.