Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Redaction – Identity Theft ‘Vaccine’

October 4, 2006
Security software run through the physical security or computer security operation can automatically block viewing of sensitive employee, customer, contractor and citizen information. It’s a solid way to make compliance.


A growing chief security officer headache is the increasing incidents which make personal employee and customer data vulnerable to physical and computer-based theft. Such identity theft crimes are a top government, enterprise and citizen concern, opening numerous organizations to liability and bad press.

Here’s a solution that can apply to many enterprises.

The Marion County Clerk of the Circuit Court in Ocala, Fla. maintains all county court files and records, ranging from mortgages and deeds to court judgments and traffic tickets. Recently, the agency implemented an automated redaction solution designed to remove such sensitive information as Social Security numbers, bank account numbers and credit and debit card numbers from public records. Using innovative technology (the Kofax Ascent platform and Kofax VirtualReScan), Marion County leveraged the capabilities of redaction software to comply with a Florida privacy mandate in less than seven weeks.

Corporations and government agencies now build jaillike protection for certain parts of personal databases. The security activity often concentrations on data linked to identity theft incidents.

THE CHALLENGE

Under Florida’s current public records law, citizens are responsible for requesting that their private information be removed (or redacted) from public documents to minimize the potential for identity theft. But as of January 1, 2007, such responsibility will no longer rest on individuals’ shoulders. Rather, after this date, clerks of the court must automatically redact Social Security numbers and similar data from public records upon receipt, thereby ensuring that all sensitive information is kept confidential in line with Florida’s open-record laws.

To comply with the mandate, the Marion County Clerk decided to begin redacting data from existing documents long before the 2007 deadline. At the time, the county already had more than seven million official records dating back to 1965 that were electronically stored in an image archive solution developed by NewVisions Systems Corp. “We decided that implementing a software solution would be the best way to handle the redaction process,” said Jack Suess, chief deputy clerk of administrative services for the Marion County Clerk of the Circuit Court. The clerk’s office chose IntelliDact, a redaction solution developed by system integrator CSI. But the agency still needed an efficient means of extracting information from documents and delivering it to the redaction application. It also required a solution to enhance the quality of images scanned from documents

THE SOLUTION

“The experts at CSI told us that for maximum efficiency, we had to have a solution that would execute information capture, processing and delivery alike,” Suess explains. “Ascent was the only application with this essential capability. In order to properly complete redaction, you need the best possible digital image,” Suess notes. “However, many paper records are hard to read because they are old. With the solution, paper documents are scanned, then automatically sharpened, cleaned and perfected before the system collects and delivers them to unstructured data recognition technology to search documents for sensitive information and automatically slate it for redaction.

BUSINESS RESULTS

Once all beta tests of the system were complete, CSI copied the Marion County Clerk’s entire database onto independent servers and began the redaction process on all seven million records in its back file of images. The job took less than seven weeks, making Marion County the first county in Florida to successfully comply with the redaction mandate.

Ascent played a major role in enabling the Marion County Clerk’s office to process such a large volume of documents in a short period of time, as well as to achieve compliance with the mandate ahead of schedule and before any other counties could do so. “Without the seamless collection, transformation and delivery of critical information, it would have been difficult to move documents through so quickly,” said Suess.

“While our statistics indicated only 8-10 percent of our records would actually contain information that would require redaction, we had no way of knowing which documents they would be, so we had no choice but to evaluate every document for possible redaction.”

Suess added that the redaction technology was equally instrumental in paving the way for success: It helped the agency to achieve a 99.7 percent redaction accuracy rating. “No matter how good a data recognition technology is, it will fail if the information on the front end is unreadable; as the old saying goes, ‘garbage in, garbage out’,” he observed.

New records are now redacted as they are scanned and hard, unredacted copies of all documents are maintained in the files for those citizens that require them.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Code

Security Leaders Discuss the Marquis Data Breach

Digital human mind

Should Organizations Block AI Browsers? Security Leaders Discuss

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Vaccine passport identity

    Vaccine passports must leverage decentralized identity solutions

    See More
  • Identity Theft Resource Center Proposes Child ID Theft Prevention Database

    See More
  • Protecting from Identity Theft? A Good Start

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

  • Risk Analysis and the Security Survey, 4th Edition

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing