Figure Eight Secure Data Access Solution enables compliant data annotation

Figure Eight, an Appen company, announced its Secure Data Access Solution, which enhances Figure Eight security capabilities for customers working with personally identifiable information (PII), protected health information (PHI) and those requiring other sophisticated compliance needs.

“Data security is of the utmost importance for Figure Eight and Appen as we empower AI in the real world,” said Wilson Pang, CTO, Appen. “This comprehensive Secure Data Access Solution ensures no classified data leaves the customer’s network and that all data security requirements are met. Whether customers seek to protect the PII within their data or manage file types such as images on their own secure servers, our platform allows them to annotate their information within a secure environment.”

Organizations often rely on third-party platforms for data annotation needs. As a result, the requirements for trust and transparency with regard to data handling are very stringent. To enhance the security Figure Eight already provides its customers, Secure Data Access Solution allows customers to maintain ownership and governance over all source data. This ensures the data that customer teams supply never leave their servers.

Appen provides a suite of secure service offerings, including secure facilities that are ISO 27001 accredited in the United Kingdom and the Philippines. These offerings provide flexible options to ensure customers meet their data security and specific business needs.

The Secure Data Access Solution maintains strict privacy controls and secure data access through those service offerings and a variety of mechanisms, including:

  • Private content buckets: These buckets offer additional restrictions on content access for Figure Eight Job Requestors, Figure Eight Contributors (Secure Contributors and Open Crowd) and Internal Contributors.
  • Public content buckets: These buckets allow customers to store data in public buckets and maintain security through Expiring Links, IP Whitelisting, and Referral Headers.
  • Secure contributor populations: Contributors bound by NDA and PII agreements access tasks through machines owned and operated by the channel in a controlled and monitored physical location.
  • Internal contributor population: Customers may elect to supply their own labelers (either their own employees or other approved vendors).

In addition to this new Secure Data Access Solution, Figure Eight has SOC2 Type II certification for security. This certification is a widely recognized gold standard for data security and signifies an independent third party has validated Figure Eight’s data security policies, procedures, and controls.

More about

Don't miss