# TestPattern — Full Pattern Registry > The open registry for DLP detection patterns > https://testpattern.dev This file contains the complete TestPattern catalog for machine consumption. Generated: 2026-03-28T18:59:02.717Z Patterns: 1479 | Collections: 14 | Keyword dictionaries: 119 ## Machine-readable endpoints - JSON catalog: https://testpattern.dev/patterns.json - Export API: https://testpattern.dev/api/export/{format}/{slug} - This file: https://testpattern.dev/llms-full.txt - Sitemap: https://testpattern.dev/sitemap.xml - Source YAML: https://github.com/testpatterndev/patterns ## Export formats Every pattern can be exported to: - **Microsoft Purview XML** — RulePack format for `New-DlpSensitiveInformationTypeRulePackage` - **Purview PowerShell** — Deployment script with keyword dictionaries - **GCP DLP JSON** — InspectTemplate for Google Cloud DLP - **AWS Macie JSON** — Custom data identifier for Amazon Macie - **Zscaler DLP JSON** — PATTERNS_AND_PHRASES dictionary for Zscaler Internet Access - **Palo Alto DLP JSON** — Configuration guide for Palo Alto Enterprise DLP - **Netskope DLP JSON** — Configuration guide for Netskope DLP (Entity → Rule → Profile) - **YAML** — Raw pattern definition ## Export API Server-side export endpoints generate DLP configurations via simple HTTP GET requests. No browser or JavaScript runtime required — works with curl, wget, or any HTTP client. ### Single pattern export ``` GET /api/export/{format}/{slug} ``` Formats: `purview`, `gcp-dlp`, `macie`, `zscaler`, `paloalto`, `netskope`, `yaml` Examples: ``` curl https://testpattern.dev/api/export/purview/au-tax-file-number curl https://testpattern.dev/api/export/gcp-dlp/au-tax-file-number curl https://testpattern.dev/api/export/macie/au-tax-file-number curl https://testpattern.dev/api/export/zscaler/au-tax-file-number curl https://testpattern.dev/api/export/yaml/au-tax-file-number ``` ### Multi-pattern export ``` GET /api/export/{format}?{filters} ``` Returns a JSON array of exports. Query parameters: - `slugs` — comma-separated slug list - `collection` — collection slug (resolves to member patterns) - `jurisdiction` — AU, US, EU, NZ, GB, CA, etc. - `regulation` — GDPR, HIPAA, PCI-DSS, etc. - `confidence` — high, medium, low - `scope` — specific, narrow, wide - `limit` — max patterns (default/cap: 200) Examples: ``` curl "https://testpattern.dev/api/export/gcp-dlp?jurisdiction=AU&confidence=high&limit=5" curl "https://testpattern.dev/api/export/macie?collection=au-privacy-act" curl "https://testpattern.dev/api/export/zscaler?slugs=au-tax-file-number,au-medicare-card-number" ``` ### Purview bundle export ``` GET /api/export/purview-bundle?{filters}&name={bundle-name} ``` Returns a single Purview XML RulePackage containing all matched patterns. The `name` parameter sets the bundle name (default: "testpattern-bundle"). Examples: ``` curl "https://testpattern.dev/api/export/purview-bundle?jurisdiction=AU&limit=10&name=au-pii" curl "https://testpattern.dev/api/export/purview-bundle?collection=gdpr-identifiers" ``` ### Response headers - `Access-Control-Allow-Origin: *` (public data, no auth required) - `Cache-Control: public, max-age=300` (5-minute edge cache) - `Content-Disposition: inline; filename="{slug}.{ext}"` ### Error responses - **400** — Unknown format (includes `available_formats` list) - **404** — Pattern/collection not found or empty filter result ## Deployment workflows ### Microsoft Purview ```bash # 1. Export a single pattern as Purview XML curl -o sit.xml https://testpattern.dev/api/export/purview/au-tax-file-number # 2. Import via PowerShell # Connect-IPPSSession # New-DlpSensitiveInformationTypeRulePackage -FileData ([IO.File]::ReadAllBytes("sit.xml")) ``` ### Google Cloud DLP ```bash # 1. Export as GCP DLP InspectTemplate JSON curl -o template.json https://testpattern.dev/api/export/gcp-dlp/au-tax-file-number # 2. Create template via gcloud # gcloud dlp inspect-templates create --template-file=template.json ``` ### AWS Macie ```bash # 1. Export as Macie CustomDataIdentifier JSON curl -o identifier.json https://testpattern.dev/api/export/macie/au-tax-file-number # 2. Create via AWS CLI # aws macie2 create-custom-data-identifier --cli-input-json file://identifier.json ``` ### Zscaler Internet Access ```bash # 1. Export as Zscaler DLP dictionary JSON curl -o dictionary.json https://testpattern.dev/api/export/zscaler/au-tax-file-number # 2. Import via Zscaler API # Use POST /webApplicationRules with the dictionary JSON payload ``` ### Palo Alto Enterprise DLP ```bash # 1. Export configuration guide curl -o config.json https://testpattern.dev/api/export/paloalto/au-tax-file-number # 2. Manually configure in Panorama > Objects > DLP > Data Filtering Profiles # Follow the settings in the JSON output (regex, weight, proximity keywords) ``` ### Netskope DLP ```bash # 1. Export configuration guide curl -o config.json https://testpattern.dev/api/export/netskope/au-tax-file-number # 2. Configure in Netskope admin console: # Step 1: Create regex entity (Settings > DLP > Custom Entities) # Step 2: Create dictionary entity for keywords # Step 3: Create rule combining entities with NEAR proximity # Step 4: Add rule to a DLP Profile ``` --- ## Collections ### Americas Government IDs Government identifier detection patterns for the Americas (excluding US). Covers Canada, Brazil, Mexico, Chile, and Argentina. - Slug: `americas-government-ids` - URL: https://testpattern.dev/collections/americas-government-ids - Jurisdictions: ca, br, mx, cl, ar - Regulations: pipeda, lgpd, lfpdppp - Patterns (7): `ca-social-insurance-number`, `br-cpf`, `br-cnpj`, `mx-curp`, `mx-rfc`, `cl-rut`, `ar-cuit-cuil` ### APAC Government IDs Government identifier detection patterns for Asia-Pacific jurisdictions including Japan, Singapore, South Korea, China, and India. - Slug: `apac-government-ids` - URL: https://testpattern.dev/collections/apac-government-ids - Jurisdictions: jp, sg, kr, cn, in - Regulations: appi, pdpa, pipa, pipl, dpdp-act-2023 - Patterns (6): `jp-my-number`, `sg-nric`, `kr-resident-registration-number`, `cn-resident-id`, `in-aadhaar`, `in-pan` ### Australian Government IDs Comprehensive Australian government identifier detection. Covers tax, healthcare, immigration, welfare, education, and business identifiers. - Slug: `au-government-ids` - URL: https://testpattern.dev/collections/au-government-ids - Jurisdictions: au - Regulations: privacy-act-1988 - Patterns (14): `au-taxation-identifier`, `au-medicare-number`, `au-business-number`, `au-company-number`, `au-travel-document-id`, `au-motor-vehicle-permit`, `au-centrelink-crn`, `au-ndis-number`, `au-branch-routing-code`, `au-unique-student-identifier`, `au-individual-healthcare-identifier`, `au-citizenship-certificate`, `au-pbs-prescriber-number`, `au-medicare-provider-number` ### Australian Healthcare Identifiers Healthcare-specific identifiers for Australian health data protection under the My Health Records Act 2012 and Privacy Act 1988. - Slug: `au-healthcare-identifiers` - URL: https://testpattern.dev/collections/au-healthcare-identifiers - Jurisdictions: au - Regulations: privacy-act-1988, my-health-records-act-2012 - Patterns (5): `au-individual-healthcare-identifier`, `au-hpi-individual`, `au-pbs-prescriber-number`, `au-medicare-provider-number`, `au-medicare-number` ### Australian Privacy Act Essentials Core PII detection patterns for Australian Privacy Act 1988 compliance. Covers government identifiers, healthcare numbers, business identifiers, and personal contact information. - Slug: `au-privacy-act-essentials` - URL: https://testpattern.dev/collections/au-privacy-act-essentials - Jurisdictions: au - Regulations: privacy-act-1988 - Patterns (9): `au-medicare-number`, `au-taxation-identifier`, `au-business-number`, `global-electronic-mail-id`, `au-company-number`, `au-travel-document-id`, `au-motor-vehicle-permit`, `au-centrelink-crn`, `au-ndis-number` ### Cloud Credentials & API Keys Detects leaked cloud provider credentials, API keys, and authentication tokens across AWS, Azure, GCP, GitHub, Slack, Stripe, and OpenAI. - Slug: `cloud-credentials-detection` - URL: https://testpattern.dev/collections/cloud-credentials-detection - Jurisdictions: global - Regulations: general-data-protection - Patterns (15): `global-aws-access-key`, `global-aws-secret-key`, `global-azure-storage-key`, `global-gcp-api-key`, `global-github-pat`, `global-github-pat-fine-grained`, `global-slack-token`, `global-stripe-key`, `global-openai-key`, `global-rsa-private`, `global-ec-private`, `global-openssh-private`, `global-pkcs8-private`, `global-jwt`, `global-bearer-token` ### Cryptocurrency Wallet Addresses Detects cryptocurrency wallet addresses for Bitcoin (legacy and Bech32) and Ethereum networks. - Slug: `cryptocurrency-wallets` - URL: https://testpattern.dev/collections/cryptocurrency-wallets - Jurisdictions: global - Regulations: general-data-protection - Patterns (3): `global-bitcoin-address-legacy`, `global-bitcoin-address-bech32`, `global-ethereum-address` ### Database Connection Strings Detects database connection strings and embedded credentials across SQL Server, MySQL, PostgreSQL, MongoDB, Redis, Azure, Oracle, Elasticsearch, and Kubernetes. - Slug: `connection-string-detection` - URL: https://testpattern.dev/collections/connection-string-detection - Jurisdictions: global - Regulations: general-data-protection - Patterns (12): `global-sql-server-connection-string`, `global-mysql-connection-string`, `global-postgresql-connection-string`, `global-mongodb-connection-string`, `global-redis-connection-string`, `global-azure-storage-connection-string`, `global-azure-service-bus-connection-string`, `global-gcp-service-account-key`, `global-oracle-connection-string`, `global-elasticsearch-connection-string`, `global-generic-db-credentials-url`, `global-kubernetes-service-url` ### European National IDs National identifier detection patterns for EU and UK jurisdictions. Covers identity cards, tax IDs, social security numbers, and national registration numbers. - Slug: `eu-national-ids` - URL: https://testpattern.dev/collections/eu-national-ids - Jurisdictions: eu, uk, de, fr, it, es, nl, be, pl, se - Regulations: gdpr, uk-dpa-2018 - Patterns (15): `uk-national-insurance-number`, `uk-nhs-number`, `uk-passport-number`, `uk-driving-licence`, `uk-unique-taxpayer-reference`, `de-identity-card`, `de-tax-id`, `fr-nir-social-security`, `it-codice-fiscale`, `es-dni`, `es-nie`, `nl-bsn`, `be-national-register`, `pl-pesel`, `se-personnummer` ### GDPR Personal Data Kit Detection patterns for personal data identifiers covered under the EU General Data Protection Regulation. Includes financial identifiers, national IDs, contact information, and payment card data. - Slug: `gdpr-personal-data-kit` - URL: https://testpattern.dev/collections/gdpr-personal-data-kit - Jurisdictions: eu - Regulations: gdpr - Patterns (12): `eu-iban`, `eu-debit-card-number`, `global-electronic-mail-id`, `global-payment-card-pan`, `de-identity-card`, `de-tax-id`, `fr-nir-social-security`, `it-codice-fiscale`, `es-dni`, `es-nie`, `nl-bsn`, `se-personnummer` ### High-Confidence Starter Pack A curated set of high-confidence, low false-positive detection patterns. The best starting point for organizations new to DLP pattern deployment. Covers major jurisdictions and credential types. - Slug: `high-confidence-starter-pack` - URL: https://testpattern.dev/collections/high-confidence-starter-pack - Jurisdictions: au, us, eu, global - Regulations: privacy-act-1988, hipaa, gdpr, pci-dss - Patterns (10): `au-medicare-number`, `au-taxation-identifier`, `us-social-security-number`, `eu-iban`, `global-payment-card-pan`, `global-electronic-mail-id`, `global-aws-access-key`, `global-github-pat`, `uk-national-insurance-number`, `ca-social-insurance-number` ### Network & Device Identifiers Network addresses, device identifiers, and infrastructure patterns. Covers IP addresses, MAC addresses, IMEI, SIM cards, and vehicle identification. - Slug: `network-infrastructure` - URL: https://testpattern.dev/collections/network-infrastructure - Jurisdictions: global - Regulations: general-data-protection - Patterns (6): `global-ipv4-address`, `global-ipv6-address`, `global-mac-address`, `global-imei`, `global-iccid`, `global-vin` ### PCI-DSS Card Data Payment card and financial instrument detection patterns for PCI-DSS compliance. Covers all major card networks, IBAN, and SWIFT/BIC codes. - Slug: `pci-dss-card-data` - URL: https://testpattern.dev/collections/pci-dss-card-data - Jurisdictions: global - Regulations: pci-dss - Patterns (4): `global-payment-card-pan`, `eu-debit-card-number`, `global-swift-bic`, `eu-iban` ### US Healthcare Compliance Healthcare identifier and code detection for US HIPAA compliance. Covers provider numbers, beneficiary IDs, and medical coding systems. - Slug: `us-healthcare-compliance` - URL: https://testpattern.dev/collections/us-healthcare-compliance - Jurisdictions: us - Regulations: hipaa, ccpa - Patterns (7): `us-npi`, `us-dea-number`, `us-medicare-beneficiary-id`, `global-icd-10-cm`, `global-icd-10-pcs`, `global-ndc-code`, `global-hl7-message` --- ## Patterns ### Aadhaar Detects Aadhaar patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `in-aadhaar` - URL: https://testpattern.dev/patterns/in-aadhaar - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Verified - Jurisdictions: in - Regulations: DPDPA, IT Act 2000 (India) - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b[2-9]\d{3}\s?\d{4}\s?\d{4}\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+16 more) - Example matches: `2345 6789 0123`, `234567890123`, `9876 5432 1098` - Known false positives: Common words and phrases related to aadhaar appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Hindi and English (India), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Absentee ballot tracking data Identifies documents containing references to absentee ballot tracking data in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-482-absentee-ballot-tracking-data` - URL: https://testpattern.dev/patterns/au-top500-482-absentee-ballot-tracking-data - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:absentee\s+ballot|postal\s+vote|ballot\s+tracking|pre[\s-]+poll\s+voting|absent\s+voter|declaration\s+vote|electoral\s+commission|ballot\s+paper|vote\s+count|returning\s+officer)\b` - Corroborative keywords: absentee ballot tracking data, absentee, ballot, tracking, data, elections, diplomacy, statecraft, SCADA, PLC, DCS, HMI, Modbus, Modbus TCP, Modbus RTU, DNP3, OPC-UA, OPC Classic, IEC 61850, IEC 60870 (+39 more) - Example matches: `absentee ballot`, `postal vote`, `ballot tracking` - Known false positives: Common words and phrases related to absentee ballot tracking data appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Absentee ballot tracking data Identifies documents containing references to absentee ballot tracking data in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-482-absentee-ballot-tracking-data` - URL: https://testpattern.dev/patterns/global-top500-482-absentee-ballot-tracking-data - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:absentee\s+ballot\s+tracking\s+data|absentee\s+ballot|mail[\s-]+in\s+ballot|postal\s+vote|ballot\s+tracking|early\s+voting|provisional\s+ballot|ballot\s+status|vote\s+by\s+mail|election\s+commission|ballot\s+receipt|return\s+envelope)\b` - Corroborative keywords: absentee ballot tracking data, SCADA, PLC, DCS, HMI, Modbus, Modbus TCP, Modbus RTU, DNP3, OPC-UA, OPC Classic, IEC 61850, IEC 60870, IEC 60870-5-104, BACnet, EtherNet/IP, HART, PROFINET, PROFIBUS, Foundation Fieldbus (+32 more) - Example matches: `absentee ballot tracking data`, `absentee ballot`, `mail-in ballot` - Known false positives: Common words and phrases related to absentee ballot tracking data appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Academic transcripts Identifies documents containing references to academic transcripts in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-343-academic-transcripts` - URL: https://testpattern.dev/patterns/au-top500-343-academic-transcripts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Partial - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:academic\s+transcript|official\s+transcript|student\s+transcript|academic\s+record|course\s+history|credit\s+points|degree\s+conferred|graduation\s+record|academic\s+statement|semester\s+results)\b` - Corroborative keywords: academic transcripts, academic, transcripts, education, research, administration, student, transcript, grade, GPA, enrollment, FERPA, FAFSA, financial aid, tuition, degree, field, column, row, entry (+25 more) - Example matches: `academic transcript`, `official transcript`, `student transcript` - Known false positives: Common words and phrases related to academic transcripts appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Academic transcripts Identifies documents containing references to academic transcripts in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-343-academic-transcripts` - URL: https://testpattern.dev/patterns/global-top500-343-academic-transcripts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Partial - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:academic\s+transcript|official\s+transcript|student\s+transcript|academic\s+record|credit\s+hours|grade\s+point\s+average|degree\s+awarded|course\s+history|cumulative\s+GPA)\b` - Corroborative keywords: academic transcripts, academic, transcripts, education, research, administration, student, transcript, grade, GPA, enrollment, FERPA, FAFSA, financial aid, tuition, degree, field, column, row, entry (+25 more) - Example matches: `academic transcript`, `official transcript`, `student transcript` - Known false positives: Common words and phrases related to academic transcripts appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### ACH company and originator IDs Detects references to ach company and originator ids in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-113-ach-company-and-originator-ids` - URL: https://testpattern.dev/patterns/au-top500-113-ach-company-and-originator-ids - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:originator\s+ID|company\s+ID|direct\s+entry|clearing\s+house|batch\s+header|originating\s+institution|payment\s+file|bulk\s+payment)\b` - Corroborative keywords: ach company and originator ids, ach, company, originator, ids, financial, accounts, payments, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+2 more) - Example matches: `originator ID`, `company id`, `direct entry` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### ACH company and originator IDs Detects references to ach company and originator ids in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-113-ach-company-and-originator-ids` - URL: https://testpattern.dev/patterns/global-top500-113-ach-company-and-originator-ids - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR, PCI-DSS - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:company\s+ID|originator\s+ID|batch\s+header|routing\s+number|automated\s+clearing\s+house|settlement\s+date|trace\s+number)\b` - Corroborative keywords: ach company and originator ids, ach, company, originator, ids, financial, accounts, payments, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+31 more) - Example matches: `company ID`, `originator id`, `batch header` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Active Investigation Target Package Detects documents containing intelligence holdings, surveillance methods, evidence gaps, and investigative strategy against active criminal investigation targets. These target packages reveal the full picture of what police know and do not know about a suspect, enabling counter-surveillance and evidence destruction if disclosed. - Slug: `active-investigation-target-package` - URL: https://testpattern.dev/patterns/active-investigation-target-package - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: PPRA 2000 (Qld), Police Service Admin Act 1990 (Qld) - Data categories: law-enforcement, government - Scope: wide - Risk rating: 9 - Pattern: `(?i)\b(target\s+package|target\s+profile|investigation\s+target|intelligence\s+assessment|operational\s+intelligence|person\s+of\s+interest\s+(?:file|profile|package))\b` - Corroborative keywords: PROTECTED, Law-Enforcement, QPS, Queensland Police, surveillance plan, intercept, controlled operation, task force, criminal history, associates, known addresses, vehicle details, phone numbers, evidence matrix, intelligence gap, operational planning, investigation, enforcement, prosecution, arrest (+53 more) - Example matches: `PROTECTED Law-Enforcement. Operation TRIDENT — Target Package. Subject: Anthony Paul MORRISON, DOB 15/03/1982. Intelligence assessment: Subject is assessed as the principal organiser of methamphetamine importation through Port of Brisbane. Surveillance plan attached. Known associates listed at Annexure B. Evidence matrix indicates gaps in financial trail.`, `Investigation target profile update — Task Force SENTINEL. Person of interest: Craig HENDERSON. Operational intelligence summary: Subject has been observed meeting with known OMCG members at two locations. Intercept product confirms involvement in firearms trafficking. Controlled operation approval sought.`, `Operational intelligence briefing. Re: Target package compilation for Operation CERBERUS subjects. Intelligence assessment completed for all 14 persons of interest. Surveillance plan resources allocated. Evidence gaps identified in relation to subjects 3, 7, and 12. Task force meeting scheduled to review investigative strategy.` - Known false positives: Published annual reports from law enforcement agencies using aggregate investigation terminology; Academic criminology coursework and training exercises; Crime fiction depicting police investigations ### Activist defense plans Identifies documents containing references to activist defense plans in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-199-activist-defense-plans` - URL: https://testpattern.dev/patterns/au-top500-199-activist-defense-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:activist\s+defense|defense\s+plan|shareholder\s+activism|activist\s+investor|proxy\s+fight|proxy\s+contest|hostile\s+takeover|poison\s+pill|board\s+defense|shareholder\s+engagement|takeover\s+defense|corporate\s+governance)\b` - Corroborative keywords: activist defense plans, activist, defense, plans, mergers, acquisitions, strategy, DISP, DSPF, DSGL, ITAR, Defence and Strategic Goods, export control, controlled technology, defence industry security, DISP member, CASG, Defence Materiel - Example matches: `activist defense`, `defense plan`, `shareholder activism` - Known false positives: Common words and phrases related to activist defense plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Activist defense plans Identifies documents containing references to activist defense plans in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-199-activist-defense-plans` - URL: https://testpattern.dev/patterns/global-top500-199-activist-defense-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:activist\s+defense|shareholder\s+activist|poison\s+pill|proxy\s+fight|hostile\s+takeover|board\s+defense|shareholder\s+rights\s+plan|activist\s+investor|defense\s+strategy|white\s+knight)\b` - Corroborative keywords: activist defense plans, activist, defense, plans, mergers, acquisitions, strategy, DISP, DSPF, DSGL, ITAR, Defence and Strategic Goods, export control, controlled technology, defence industry security, DISP member, CASG, Defence Materiel, field, column (+27 more) - Example matches: `activist defense`, `shareholder activist`, `poison pill` - Known false positives: Common words and phrases related to activist defense plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Ad attribution datasets Identifies documents containing references to ad attribution datasets in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-378-ad-attribution-datasets` - URL: https://testpattern.dev/patterns/au-top500-378-ad-attribution-datasets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:ad\s+attribution\s+datasets|conversion\s+tracking)\b` - Corroborative keywords: ad attribution datasets, attribution, datasets, customer, commercial, data - Example matches: `ad attribution datasets`, `conversion tracking` - Known false positives: Common words and phrases related to ad attribution datasets appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Ad attribution datasets Identifies documents containing references to ad attribution datasets in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-378-ad-attribution-datasets` - URL: https://testpattern.dev/patterns/global-top500-378-ad-attribution-datasets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:ad\s+attribution\s+datasets|attribution\s+model|conversion\s+tracking|click\s+attribution|campaign\s+attribution|touchpoint\s+analysis|ad\s+impression|attribution\s+window|last[\s-]+click\s+attribution|multi[\s-]+touch\s+attribution|advertising\s+identifier|tracking\s+pixel)\b` - Corroborative keywords: ad attribution datasets, attribution, datasets, customer, commercial, data - Example matches: `ad attribution datasets`, `attribution model`, `conversion tracking` - Known false positives: Common words and phrases related to ad attribution datasets appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Ad bidding model parameters Identifies documents containing references to ad bidding model parameters in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-217-ad-bidding-model-parameters` - URL: https://testpattern.dev/patterns/au-top500-217-ad-bidding-model-parameters - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:ad\s+bidding\s+model\s+parameters|bidding\s+algorithm|bid\s+strategy|auction\s+model|real[\s-]+time\s+bidding|programmatic\s+advertising|bid\s+optimization|proprietary\s+model|trade\s+secret|cost\s+per\s+click)\b` - Corroborative keywords: ad bidding model parameters, bidding, model, parameters, intellectual, property, trade, secrets - Example matches: `ad bidding model parameters`, `bidding algorithm`, `bid strategy` - Known false positives: Common words and phrases related to ad bidding model parameters appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Ad bidding model parameters Identifies documents containing references to ad bidding model parameters in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-217-ad-bidding-model-parameters` - URL: https://testpattern.dev/patterns/global-top500-217-ad-bidding-model-parameters - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:ad\s+bidding\s+model\s+parameters|bidding\s+algorithm|bid\s+optimization|intellectual\s+property|trade\s+secrets|programmatic\s+bidding|auction\s+model|bid\s+strategy|real[\s-]+time\s+bidding|ad\s+exchange)\b` - Corroborative keywords: ad bidding model parameters, bidding, model, parameters, intellectual, property, trade, secrets - Example matches: `ad bidding model parameters`, `bidding algorithm`, `bid optimization` - Known false positives: Common words and phrases related to ad bidding model parameters appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Admissions review notes Identifies documents containing references to admissions review notes in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-350-admissions-review-notes` - URL: https://testpattern.dev/patterns/au-top500-350-admissions-review-notes - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:admissions\s+review\s+notes|review\s+notes|selection\s+criteria|admission\s+decision|offer\s+letter|interview\s+panel|candidate\s+assessment|admission\s+committee)\b` - Corroborative keywords: admissions review notes, admissions, review, notes, education, research, administration - Example matches: `admissions review notes`, `review notes`, `selection criteria` - Known false positives: Common words and phrases related to admissions review notes appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Admissions review notes Identifies documents containing references to admissions review notes in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-350-admissions-review-notes` - URL: https://testpattern.dev/patterns/global-top500-350-admissions-review-notes - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:admissions\s+review|admission\s+decision|applicant\s+evaluation|enrollment\s+decision|acceptance\s+letter|rejection\s+letter|admissions\s+committee|selection\s+criteria|applicant\s+profile|interview\s+notes|offer\s+of\s+admission)\b` - Corroborative keywords: admissions review notes, admissions, review, notes, education, research, administration - Example matches: `admissions review`, `admission decision`, `applicant evaluation` - Known false positives: Common words and phrases related to admissions review notes appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Adoption Records Pre-Release Detects pre-release adoption records including birth parent identities, adoptee matching assessments, placement recommendations, relinquishment consents, and contact vetoes under the Adoption Act 2009 (Qld). These records contain information that individuals have a legal right to control — premature or unauthorised disclosure can cause profound emotional harm and breach court-sealed orders. - Slug: `adoption-records-pre-release` - URL: https://testpattern.dev/patterns/adoption-records-pre-release - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Adoption Act 2009 (Qld), Child Protection Act 1999 (Qld), IPA 2009 (Qld) - Data categories: health, government - Scope: wide - Risk rating: 8 - Pattern: `(?i)\b(adoption\s+order|birth\s+parent\s+(?:identity|details|consent)|relinquishment\s+(?:consent|document)|adoptee\s+(?:matching|assessment|placement)|placement\s+recommendation|contact\s+(?:veto|statement)|pre-adoption\s+(?:report|assessment))\b` - Corroborative keywords: PROTECTED, Privacy, adoption order, birth parent, relinquishment, adoptee, placement recommendation, contact veto, contact statement, Adoption Act 2009, birth certificate, birth mother, birth father, prospective adoptive parents, adoption suitability, Department of Child Safety, adoption consent, intercountry adoption, post-adoption contact, patient (+57 more) - Example matches: `PROTECTED Privacy. Pre-Adoption Assessment Report — Adoption Act 2009 (Qld) Part 7. Birth parent: Amanda Catherine BROOKS, DOB 09/11/1998. Relinquishment consent signed 14/02/2026 in the presence of a delegated officer. Birth father: identity not disclosed under s.192. Adoptee: female infant, DOB 28/01/2026. Placement recommendation: prospective adoptive parents Michael and Sarah CHEN assessed as suitable under s.79. Contact veto registered by birth mother. Department of Child Safety Case Officer: Jennifer Liu.`, `Department of Child Safety, Seniors and Disability Services — Adoption Services Unit. Adoptee matching assessment for Child Reference ADO-2026-00341. Birth parent identity documents held under sealed court order. Birth certificate (original) to be reissued under Adoption Act 2009 s.214 upon finalisation of adoption order. Post-adoption contact statement lodged by birth mother. Prospective adoptive parents have completed adoption suitability assessment including psychological evaluation and home study.`, `Confidential — Intercountry Adoption File. Adoption order application under Adoption Act 2009 Part 9. Adoptee: male child, aged 3, Country of Origin: Thailand. Pre-adoption report prepared by delegated authority. Birth parent consent obtained through Central Authority Bangkok. Placement recommendation approved by Chief Executive. Prospective adoptive parents: Robert and Maria JENSEN, Adoption Suitability Certificate No. ASC-2025-01287. Contact veto: not applicable.` - Known false positives: Published adoption statistics and annual reports from government agencies; Law reform and policy discussion papers about adoption legislation; Published personal adoption stories shared with informed consent ### Adverse event reports Identifies adverse event reports references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `au-top500-339-adverse-event-reports` - URL: https://testpattern.dev/patterns/au-top500-339-adverse-event-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:adverse\s+event|adverse\s+reaction|side\s+effect|incident\s+report|safety\s+report|drug\s+reaction|medical\s+device\s+incident|TGA\s+report|patient\s+safety)\b` - Corroborative keywords: adverse event reports, adverse, event, reports, health, biomedical, information, patient, clinical, medical, hospital, practitioner, diagnosis, treatment, prescription, physician, nurse, therapy, examination, consultation (+18 more) - Example matches: `adverse event`, `adverse reaction`, `side effect` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### Adverse event reports Identifies adverse event reports references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `global-top500-339-adverse-event-reports` - URL: https://testpattern.dev/patterns/global-top500-339-adverse-event-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:adverse\s+event|adverse\s+reaction|side\s+effect|safety\s+report|serious\s+adverse\s+event|drug\s+reaction|incident\s+report|post[\s-]+market\s+surveillance|causality\s+assessment)\b` - Corroborative keywords: adverse event reports, adverse, event, reports, health, biomedical, information, patient, clinical, medical, hospital, practitioner, diagnosis, treatment, prescription, physician, nurse, therapy, examination, consultation (+30 more) - Example matches: `adverse event`, `adverse reaction`, `side effect` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### AFSL Number (Australian Financial Services Licence) Detects Australian Financial Services Licence (AFSL) numbers issued by ASIC to authorised financial services providers. - Slug: `au-afsl-number` - URL: https://testpattern.dev/patterns/au-afsl-number - Type: regex - Engine: universal - Confidence: low - Jurisdictions: au - Regulations: AML/CTF Act (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, financial - Scope: wide - Risk rating: 7 - Pattern: `(?i)\b(?:AFSL|AFS\s+licen[cs]e|Australian\s+Financial\s+Services)\s*(?:number|no|#)?\s*[:#-]?\s*\d{6}\b` - Corroborative keywords: AFSL, AFS licence, AFS license, Australian Financial Services, Australian Financial Services Licence, financial services licence, financial services license, ASIC licence, ASIC license, licensee, authorised representative, authorized representative, financial adviser, financial advisor, government, agency, department, ministry, public sector, civil service (+24 more) - Example matches: `AFSL 234567`, `AFS licence number 456789`, `Australian Financial Services 123456` - Known false positives: Generic 6-digit numbers in invoices, reference codes, or postcodes may match without proper context. ### AHPRA Registration Number Detects Australian Health Practitioner Regulation Agency (AHPRA) registration numbers used to identify registered health practitioners across 16 professions. - Slug: `au-ahpra-registration` - URL: https://testpattern.dev/patterns/au-ahpra-registration - Type: regex - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, health - Scope: specific - Risk rating: 8 - Pattern: `\b(?:ATS|CHI|CMR|DEN|MED|MRP|NMW|OCC|OPT|OST|PAR|PHA|PHY|POD|PSY)\d{10}\b` - Corroborative keywords: AHPRA, AHPRA registration, AHPRA number, AHPRA registration number, registration number, practitioner registration, practitioner number, registration no, reg no, reg number, AHPRA reg, registered health practitioner, health practitioner registration, government, agency, department, ministry, public sector, civil service, welfare (+8 more) - Example matches: `AHPRA registration: MED0001234567`, `Practitioner number NMW0009876543`, `PSY0005551234 registered with AHPRA` - Known false positives: Internal reference codes using similar profession-prefix formats. ### AHV-Nummer Detects AHV-Nummer patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `ch-social-security-ahv` - URL: https://testpattern.dev/patterns/ch-social-security-ahv - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: ch - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b756\.\d{4}\.\d{4}\.\d{2}\b` - Corroborative keywords: AHV, AVS, sozialversicherungsnummer, social security, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `756.1234.5678.90`, `756.9876.5432.10`, `756.4567.8901.23` - Known false positives: The 756 prefix (Switzerland country code) and dot-separated format provide strong structural validation.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### AI Training Data Reference Detects references to AI training data, model datasets, and data provenance documentation in Australian contexts. - Slug: `au-ai-training-data-reference` - URL: https://testpattern.dev/patterns/au-ai-training-data-reference - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), Privacy Act 1988 (Cth) - Data categories: sensitive-data, intellectual-property - Scope: narrow - Risk rating: 6 - Example matches: `This AI training dataset contains 50,000 labelled records`, `Review the training corpus for bias before model training`, `Data provenance report for ML dataset version 3.2` - Known false positives: Generic use of training or dataset in non-AI contexts such as staff training. ### Air traffic operational procedures Identifies documents containing references to air traffic operational procedures in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-451-air-traffic-operational-procedures` - URL: https://testpattern.dev/patterns/au-top500-451-air-traffic-operational-procedures - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:air\s+traffic\s+operational\s+procedures|air\s+traffic\s+control|flight\s+procedures|separation\s+minima|flight\s+level|approach\s+control|critical\s+infrastructure)\b` - Corroborative keywords: air traffic operational procedures, air, traffic, operational, procedures, critical, infrastructure, systems - Example matches: `air traffic operational procedures`, `air traffic control`, `flight procedures` - Known false positives: Common words and phrases related to air traffic operational procedures appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Air traffic operational procedures Identifies documents containing references to air traffic operational procedures in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-451-air-traffic-operational-procedures` - URL: https://testpattern.dev/patterns/global-top500-451-air-traffic-operational-procedures - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:air\s+traffic\s+control|operational\s+procedure|separation\s+minima|flight\s+clearance|approach\s+procedure|control\s+tower|airspace\s+management|radar\s+vectoring|flight\s+information\s+region|terminal\s+control)\b` - Corroborative keywords: air traffic operational procedures, air, traffic, operational, procedures, critical, infrastructure, systems - Example matches: `air traffic control`, `operational procedure`, `separation minima` - Known false positives: Common words and phrases related to air traffic operational procedures appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Algorithmic impact assessments Identifies documents containing references to algorithmic impact assessments in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-479-algorithmic-impact-assessments` - URL: https://testpattern.dev/patterns/au-top500-479-algorithmic-impact-assessments - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:algorithmic\s+impact|impact\s+assessment|algorithmic\s+bias|automated\s+decision|AI\s+governance|algorithm\s+audit|fairness\s+assessment|transparency\s+report|privacy\s+impact|data\s+protection\s+impact|risk\s+assessment|compliance\s+review)\b` - Corroborative keywords: algorithmic impact assessments, algorithmic, impact, assessments, privacy, compliance, risk - Example matches: `algorithmic impact`, `impact assessment`, `algorithmic bias` - Known false positives: Common words and phrases related to algorithmic impact assessments appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Algorithmic impact assessments Identifies documents containing references to algorithmic impact assessments in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-479-algorithmic-impact-assessments` - URL: https://testpattern.dev/patterns/global-top500-479-algorithmic-impact-assessments - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:algorithmic\s+impact\s+assessments|algorithmic\s+impact|algorithmic\s+bias|automated\s+decision|fairness\s+assessment|transparency\s+report|AI\s+impact|machine\s+learning\s+risk|accountability\s+framework)\b` - Corroborative keywords: algorithmic impact assessments, algorithmic, impact, assessments, privacy, compliance, risk - Example matches: `algorithmic impact assessments`, `algorithmic impact`, `algorithmic bias` - Known false positives: Common words and phrases related to algorithmic impact assessments appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### All Credential Types Detects documents containing credential-related terminology. This pattern is based on a Microsoft Purview built-in sensitive information type. In Purview, this is a broad, function-based bundled detector that aggregates multiple credential SITs. This keyword-based version flags documents that may contain credentials for further review. - Slug: `global-all-credential-types` - URL: https://testpattern.dev/patterns/global-all-credential-types - Type: regex - Engine: universal - Confidence: low - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: wide - Risk rating: 10 - Pattern: `(?i)\b(?:password|passwd|pwd|secret[_ ]?key|access[_ ]?key|api[_ ]?key|private[_ ]?key|auth[_ ]?token|client[_ ]?secret|connection[_ ]?string|bearer[_ ]?token|signing[_ ]?key|encryption[_ ]?key|master[_ ]?key|shared[_ ]?access[_ ]?key)\b` - Corroborative keywords: password, secret, credential, api key, access key, token, private key, connection string, api_key, apikey, access token, auth token, authorization, bearer, conn str, connectionstring, cookie, database, host, JWT (+37 more) - Example matches: `password: MyS3cretP@ss`, `api_key = AAAA0000BBBB1111CCCC2222`, `Authorization: Bearer eyJhbGciOiJIUzI1NiJ9.AAAA.BBBB` - Known false positives: Security documentation, training materials, and policy documents frequently reference credential terminology without containing actual secrets.; Source code files contain credential-related variable names and function parameters without actual credential values. ### All Full Names Detects All Full Names patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for personal name identification. This keyword list provides name-related terms for supplementary matching. - Slug: `global-all-full-names` - URL: https://testpattern.dev/patterns/global-all-full-names - Type: keyword_list - Confidence: low - Jurisdictions: global - Regulations: CCPA/CPRA, GDPR - Data categories: pii - Scope: wide - Risk rating: 3 - Example matches: `please enter your full name below`, `applicant surname and given name`, `patient first name and last name on file` - Known false positives: Form labels, headers, or templates that reference name fields without containing actual names; Software documentation referencing name-related variables or database columns ### All Medical Terms And Conditions Detects All Medical Terms And Conditions patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that identifies health and medical terminology in documents. Keyword matching is used to flag content containing medical language. - Slug: `global-all-medical-terms` - URL: https://testpattern.dev/patterns/global-all-medical-terms - Type: keyword_list - Confidence: low - Jurisdictions: global - Regulations: GDPR, HIPAA - Data categories: phi, health - Scope: wide - Risk rating: 8 - Example matches: `patient diagnosed with diagnosis`, `treatment plan includes symptom`, `clinical notes reference treatment` - Known false positives: Educational or research materials discussing medical topics without containing actual patient data; News articles or general health information websites mentioning medical conditions ### All Physical Addresses Detects All Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `global-all-physical-addresses` - URL: https://testpattern.dev/patterns/global-all-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: global - Regulations: CCPA/CPRA, GDPR - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 street name, unit 4`, `located at 45 road example`, `deliver to 78 avenue test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### Allied intelligence exchange records Identifies documents containing references to allied intelligence exchange records in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-437-allied-intelligence-exchange-records` - URL: https://testpattern.dev/patterns/au-top500-437-allied-intelligence-exchange-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:allied\s+intelligence|intelligence\s+exchange|Five\s+Eyes|intelligence\s+sharing|allied\s+partner|coalition\s+intelligence|bilateral\s+exchange|defense\s+cooperation|national\s+security|classified\s+exchange)\b` - Corroborative keywords: allied intelligence exchange records, allied, intelligence, exchange, records, defense, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program, public benefit (+1 more) - Example matches: `allied intelligence`, `intelligence exchange`, `Five Eyes` - Known false positives: Common words and phrases related to allied intelligence exchange records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Allied intelligence exchange records Identifies documents containing references to allied intelligence exchange records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-437-allied-intelligence-exchange-records` - URL: https://testpattern.dev/patterns/global-top500-437-allied-intelligence-exchange-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:allied\s+intelligence|intelligence\s+sharing|Five\s+Eyes|intelligence\s+exchange|bilateral\s+agreement|liaison\s+report|coalition\s+intelligence|partner\s+nation|foreign\s+disclosure|releasable\s+to)\b` - Corroborative keywords: allied intelligence exchange records - Example matches: `allied intelligence`, `intelligence sharing`, `Five Eyes` - Known false positives: Common words and phrases related to allied intelligence exchange records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Alumni donor records Identifies documents containing references to alumni donor records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-354-alumni-donor-records` - URL: https://testpattern.dev/patterns/au-top500-354-alumni-donor-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:alumni\s+donor\s+records|gift\s+agreement|donor\s+register|contribution\s+history)\b` - Corroborative keywords: alumni donor records, alumni, donor, records, education, research, administration - Example matches: `alumni donor records`, `gift agreement`, `donor register` - Known false positives: Common words and phrases related to alumni donor records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Alumni donor records Identifies documents containing references to alumni donor records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-354-alumni-donor-records` - URL: https://testpattern.dev/patterns/global-top500-354-alumni-donor-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:alumni\s+donor|donor\s+record|alumni\s+giving|donation\s+history|gift\s+amount|donor\s+prospect|alumni\s+engagement|annual\s+fund|capital\s+campaign)\b` - Corroborative keywords: alumni donor records, alumni, donor, records, education, research, administration - Example matches: `alumni donor`, `donor record`, `alumni giving` - Known false positives: Common words and phrases related to alumni donor records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Anti-money-laundering alerts Detects references to anti-money-laundering alerts in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-132-anti-money-laundering-alerts` - URL: https://testpattern.dev/patterns/au-top500-132-anti-money-laundering-alerts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:AML\s+alert|suspicious\s+transaction|transaction\s+monitoring|money\s+laundering|financial\s+crime|compliance\s+alert|risk\s+assessment|customer\s+due\s+diligence)\b` - Corroborative keywords: anti-money-laundering alerts, anti, money, laundering, alerts, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable (+3 more) - Example matches: `AML alert`, `suspicious transaction`, `transaction monitoring` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Anti-money-laundering alerts Detects references to anti-money-laundering alerts in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-132-anti-money-laundering-alerts` - URL: https://testpattern.dev/patterns/global-top500-132-anti-money-laundering-alerts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:anti[\s-]+money\s+laundering|suspicious\s+activity|suspicious\s+transaction|transaction\s+monitoring|sanctions\s+screening|money\s+laundering|threshold\s+reporting)\b` - Corroborative keywords: anti-money-laundering alerts, anti, money, laundering, alerts, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable (+32 more) - Example matches: `anti-money laundering`, `suspicious activity`, `suspicious transaction` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Antitrust legal analyses Identifies documents containing references to antitrust legal analyses in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-169-antitrust-legal-analyses` - URL: https://testpattern.dev/patterns/au-top500-169-antitrust-legal-analyses - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:antitrust\s+legal\s+analyses|competition\s+law|cartel\s+conduct|price\s+fixing|market\s+allocation|bid\s+rigging|merger\s+clearance|competition\s+analysis)\b` - Corroborative keywords: antitrust legal analyses, antitrust, legal, analyses, corporate, governance - Example matches: `antitrust legal analyses`, `competition law`, `cartel conduct` - Known false positives: Common words and phrases related to antitrust legal analyses appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Antitrust legal analyses Identifies documents containing references to antitrust legal analyses in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-169-antitrust-legal-analyses` - URL: https://testpattern.dev/patterns/global-top500-169-antitrust-legal-analyses - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:antitrust\s+legal\s+analyses|antitrust\s+analysis|competition\s+law|market\s+dominance|price\s+fixing|merger\s+clearance|market\s+concentration|restraint\s+of\s+trade|competition\s+review)\b` - Corroborative keywords: antitrust legal analyses, antitrust, legal, analyses, corporate, governance - Example matches: `antitrust legal analyses`, `antitrust analysis`, `competition law` - Known false positives: Common words and phrases related to antitrust legal analyses appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### API interface specifications Identifies api interface specifications patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-244-api-interface-specifications` - URL: https://testpattern.dev/patterns/au-top500-244-api-interface-specifications - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:api\s+specification|interface\s+specification|api\s+endpoint|REST\s+API|api\s+documentation|api\s+contract|api\s+schema|service\s+interface)\b` - Corroborative keywords: api interface specifications, api, interface, specifications, software, engineering, architecture, faceprint, facial recognition, facial geometry, face scan, face ID, facial template, facial data, face detection - Example matches: `api specification`, `interface specification`, `api endpoint` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### API interface specifications Identifies api interface specifications patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-244-api-interface-specifications` - URL: https://testpattern.dev/patterns/global-top500-244-api-interface-specifications - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:API\s+specification|interface\s+specification|API\s+documentation|endpoint\s+definition|API\s+schema|REST\s+API|API\s+contract|service\s+interface|API\s+reference)\b` - Corroborative keywords: api interface specifications, api, interface, specifications, software, engineering, architecture, faceprint, facial recognition, facial geometry, face scan, face ID, facial template, facial data, face detection, field, column, row, entry, record (+24 more) - Example matches: `API specification`, `interface specification`, `API documentation` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Arrest records Identifies documents containing references to arrest records in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-402-arrest-records` - URL: https://testpattern.dev/patterns/au-top500-402-arrest-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:arrest\s+records|arrest\s+report|taken\s+into\s+custody|police\s+arrest|charging\s+document|arrest\s+warrant|offender\s+details|law\s+enforcement|booking\s+record|custody\s+register|criminal\s+justice)\b` - Corroborative keywords: arrest records, arrest, records, law, enforcement, justice, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program, public benefit (+30 more) - Example matches: `arrest records`, `arrest report`, `taken into custody` - Known false positives: Common words and phrases related to arrest records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Arrest records Identifies documents containing references to arrest records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-402-arrest-records` - URL: https://testpattern.dev/patterns/global-top500-402-arrest-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: False positive - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:arrest\s+record|arrest\s+report|booking\s+record|arrest\s+warrant|date\s+of\s+arrest|arresting\s+officer|charges\s+filed|arrest\s+log|booking\s+number|custody\s+record|taken\s+into\s+custody)\b` - Corroborative keywords: arrest records - Example matches: `arrest record`, `arrest report`, `booking record` - Known false positives: Common words and phrases related to arrest records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Asmens kodas Detects Asmens kodas patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `lt-personal-code` - URL: https://testpattern.dev/patterns/lt-personal-code - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, lt - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{11}\b` - Corroborative keywords: asmens kodas, personal code, identity number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `38801011234`, `49203035678`, `37501014567` - Known false positives: Eleven-digit numeric sequences may match phone numbers or other administrative identifiers.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### ASP.NET Machine Key Detects ASP.NET Machine Key patterns in configuration files. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `global-aspnet-machine-key` - URL: https://testpattern.dev/patterns/global-aspnet-machine-key - Type: regex - Engine: universal - Confidence: high - Detection quality: Partial - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Risk rating: 10 - Pattern: `(?i)(?:validationKey|decryptionKey)\s*=\s*"?[0-9A-Fa-f]{32,128}"?` - Corroborative keywords: machineKey, validationKey, decryptionKey, web.config, ASP.NET, machine key, encryption, validation, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie (+45 more) - Example matches: `validationKey="AAAAAAAABBBBBBBBCCCCCCCCDDDDDDDDEEEEEEEEFFFFFFFF0000000011111111"`, `decryptionKey="00112233445566778899AABBCCDDEEFF"`, `validationKey="0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF"` - Known false positives: Documentation and code samples containing example machineKey configurations with placeholder hex values.; Test configuration files with intentionally weak or example machine keys. ### Asset inventory records Identifies asset inventory records patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-307-asset-inventory-records` - URL: https://testpattern.dev/patterns/au-top500-307-asset-inventory-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:asset\s+inventory|asset\s+register|hardware\s+inventory|software\s+inventory|asset\s+tag|serial\s+number|asset\s+lifecycle|IT\s+asset\s+management|asset\s+tracking|procurement\s+record|depreciation\s+schedule|asset\s+classification)\b` - Corroborative keywords: asset inventory records, asset, inventory, records, operations, resilience - Example matches: `asset inventory`, `asset register`, `hardware inventory` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Asset inventory records Identifies asset inventory records patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-307-asset-inventory-records` - URL: https://testpattern.dev/patterns/global-top500-307-asset-inventory-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:asset\s+inventory|asset\s+register|hardware\s+inventory|software\s+inventory|asset\s+tag|serial\s+number|asset\s+lifecycle|configuration\s+item|IT\s+asset\s+management|depreciation\s+schedule|procurement\s+record|asset\s+tracking)\b` - Corroborative keywords: asset inventory records, asset, inventory, records, operations, resilience - Example matches: `asset inventory`, `asset register`, `hardware inventory` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Asylum claim narratives Identifies documents containing references to asylum claim narratives in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-390-asylum-claim-narratives` - URL: https://testpattern.dev/patterns/au-top500-390-asylum-claim-narratives - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:asylum\s+claim\s+narratives|protection\s+visa|country\s+of\s+origin)\b` - Corroborative keywords: asylum claim narratives, asylum, claim, narratives, government, citizen, services, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program, public benefit (+1 more) - Example matches: `asylum claim narratives`, `protection visa`, `country of origin` - Known false positives: Common words and phrases related to asylum claim narratives appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Asylum claim narratives Identifies documents containing references to asylum claim narratives in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-390-asylum-claim-narratives` - URL: https://testpattern.dev/patterns/global-top500-390-asylum-claim-narratives - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:asylum\s+claim\s+narratives|asylum\s+seeker|refugee\s+claim|protection\s+visa|persecution\s+claim|country\s+of\s+origin|asylum\s+application|refugee\s+status|humanitarian\s+protection|credibility\s+assessment|asylum\s+tribunal|claim\s+statement)\b` - Corroborative keywords: asylum claim narratives - Example matches: `asylum claim narratives`, `asylum seeker`, `refugee claim` - Known false positives: Common words and phrases related to asylum claim narratives appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Attorney-client privileged communications Identifies documents containing references to attorney-client privileged communications in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-164-attorney-client-privileged-communications` - URL: https://testpattern.dev/patterns/au-top500-164-attorney-client-privileged-communications - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:attorney[\s-]+client\s+privileged\s+communications|legal\s+professional\s+privilege|privileged\s+and\s+confidential|solicitor[\s-]+client\s+privilege|without\s+prejudice|litigation\s+privilege|dominant\s+purpose|legal\s+advice\s+privilege|confidential\s+communication|attorney\s+work\s+product|in\s+confidence)\b` - Corroborative keywords: attorney-client privileged communications, attorney, client, privileged, communications, corporate, legal, governance, PRIVILEGED, ATTORNEY-CLIENT, WORK PRODUCT, CONFIDENTIAL, PROTECTED, field, column, row, entry, record, value, form (+10 more) - Example matches: `attorney-client privileged communications`, `legal professional privilege`, `privileged and confidential` - Known false positives: Common words and phrases related to attorney-client privileged communications appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Attorney-client privileged communications Identifies documents containing references to attorney-client privileged communications in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-164-attorney-client-privileged-communications` - URL: https://testpattern.dev/patterns/global-top500-164-attorney-client-privileged-communications - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:attorney[\s-]+client\s+privileged\s+communications|attorney[\s-]+client\s+privilege|legal\s+professional\s+privilege|privileged\s+and\s+confidential|work\s+product\s+doctrine|solicitor[\s-]+client\s+privilege|litigation\s+privilege|without\s+prejudice|legal\s+hold|privilege\s+log|confidential\s+legal|protected\s+communication)\b` - Corroborative keywords: attorney-client privileged communications, attorney, client, privileged, communications, corporate, legal, governance, PRIVILEGED, ATTORNEY-CLIENT, WORK PRODUCT, CONFIDENTIAL, PROTECTED, field, column, row, entry, record, value, form (+22 more) - Example matches: `attorney-client privileged communications`, `attorney-client privilege`, `legal professional privilege` - Known false positives: Common words and phrases related to attorney-client privileged communications appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Au Number Plates Detects Australian number plate patterns. Standard plate formats only; personalised plates excluded. Requires vehicle/registration keyword context. - Slug: `au-number-plates` - URL: https://testpattern.dev/patterns/au-number-plates - Type: regex - Engine: universal - Confidence: low - Detection quality: Partial - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: location, pii - Scope: wide - Risk rating: 5 - Pattern: `\b[A-Z]{2}[\s\-]?\d{2}[\s\-]?[A-Z]{2}\b` - Corroborative keywords: registration, rego, number plate, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender, given name, last name, maiden name, middle name (+12 more) - Example matches: `AB12CD`, `XY99ZZ`, `DL45KM` - Known false positives: Common words and phrases related to au number plates appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Australia Medicare Card Identifier Identifies Australian Medicare card numbers using Func_australian_medical_account_number validation. Filters same-digit sequences. Requires corroborative health-scheme keywords for reliable detection. - Slug: `au-medicare-card-identifier` - URL: https://testpattern.dev/patterns/au-medicare-card-identifier - Type: regex - Engine: universal - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: phi, health, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b\d{8}\b` - Corroborative keywords: health scheme, health fund, provider number, patient ID, medical account, Medibank, bulk billing, health cover, medicare, medicare number, medicare card, medicare no, health insurance number - Example matches: `12345678`, `98765432` - Known false positives: Generic eight-digit reference numbers in non-health contexts. ### Australian Birth Date Indicator Identifies date-of-birth references in Australian documents using multiple structural date regex patterns (numeric slash, numeric dot, written month, ISO format) combined with birth-record and personal-information keywords. - Slug: `au-birth-date-indicator` - URL: https://testpattern.dev/patterns/au-birth-date-indicator - Type: regex - Engine: boost_regex - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Risk rating: 7 - Pattern: `\b(?:(?:0?[1-9]|[12][0-9]|3[01])[\/\-\.](?:0?[1-9]|1[012])[\/\-\.](?:19|20)\d{2}|(?:0?[1-9]|[12][0-9]|3[01])(?:st|nd|rd|th)?\s+(?:Jan(?:uary)?|Feb(?:ruary)?|Mar(?:ch)?|Apr(?:il)?|May|Jun(?:e)?|Jul(?:y)?|Aug(?:ust)?|Sep(?:tember)?|Oct(?:ober)?|Nov(?:ember)?|Dec(?:ember)?)\s+(?:19|20)\d{2}|(?:19|20)\d{2}[\-\/](?:0[1-9]|1[012])[\-\/](?:0[1-9]|[12]\d|3[01]))\b` - Corroborative keywords: DOB, date of birth, birth date, born, born on, birthday, d.o.b, d.o.b., DOB:, D.O.B, D.O.B., date of birth:, DateOfBirth, birthdate, Date of Birth (DD/MM/YYYY), DOB (required), Enter your date of birth, age, year of birth, birth year - Example matches: `DOB: 15/03/1990`, `Born on 1st January 1985`, `Date of birth: 25.12.2000` - Known false positives: Non-DOB dates such as invoice dates, event dates, and document timestamps. ### Australian Branch Routing Code Identifies Australian Bank State Branch (BSB) routing codes in 3-digit dash 3-digit or continuous 6-digit formats. Supports space separator. Requires corroborative financial-institution keywords. - Slug: `au-branch-routing-code` - URL: https://testpattern.dev/patterns/au-branch-routing-code - Type: regex - Engine: universal - Confidence: low - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: pii, financial - Scope: wide - Risk rating: 9 - Pattern: `\b\d{3}[\-\s]?\d{3}\b` - Corroborative keywords: BSB, bank state branch, branch number, routing code, account number, bank account, account no, routing number, sort code, IBAN, SWIFT, BIC - Example matches: `062-000`, `012345`, `923-100` - Known false positives: 6-digit reference codes, postcodes, or dates in non-financial contexts. ### Australian Business Number Detects Australian Business Numbers (ABNs), which are unique 11-digit identifiers issued by the Australian Business Register to entities carrying on a business in Australia. ABNs are commonly formatted as groups of 2-3-3-3 digits separated by spaces or hyphens. The ABN includes a check digit mechanism, but this pattern relies on format matching combined with corroborative evidence rather than algorithmic validation. - Slug: `au-business-number` - URL: https://testpattern.dev/patterns/au-business-number - Type: regex - Engine: boost_regex - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: financial, business-id - Scope: narrow - Risk rating: 5 - Pattern: `\b\d{2}[\s-]?\d{3}[\s-]?\d{3}[\s-]?\d{3}\b` - Corroborative keywords: ABN, Australian business number, business number, A.B.N., australian business number, bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC - Example matches: `51 824 753 556`, `51-824-753-556`, `51824753556` - Known false positives: Sequences of 11 digits appearing in unrelated contexts such as tracking numbers, serial codes, or account references ### Australian Citizenship Certificate Detects Australian Citizenship Certificate number patterns including prefixed formats (ACC, CDM, ACS, CAS followed by 4-8 digits) and numeric-only formats (0 + 10 digits). - Slug: `au-citizenship-certificate` - URL: https://testpattern.dev/patterns/au-citizenship-certificate - Type: regex - Engine: universal - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b(?:ACC|CDM|ACS|CAS)\s?\d{4,8}\b` - Corroborative keywords: citizenship, citizenship certificate, Australian citizen, evidence number, stock number, naturalisation, naturalization, certificate of citizenship, immigration, Home Affairs, visa grant, visa subclass, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `ACC12345678`, `CDM 1234`, `ACS56789` - Known false positives: Common words and phrases related to australian citizenship certificate appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Australian Company Number Detects Australian Company Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `au-company-number` - URL: https://testpattern.dev/patterns/au-company-number - Type: regex - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: AML/CTF Act (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: pii, government-id - Scope: narrow - Risk rating: 5 - Pattern: `\b\d{3}\s?\d{3}\s?\d{3}\b` - Corroborative keywords: ACN, australian company number, company number, ASIC - Example matches: `123 456 789`, `123456789`, `004 085 616` - Known false positives: Common words and phrases related to australian company number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Australian Deposit Account Reference Identifies references to Australian consumer deposit account numbers in financial and compliance documents. Uses structural anchors with proximity constraints. - Slug: `au-deposit-account-reference` - URL: https://testpattern.dev/patterns/au-deposit-account-reference - Type: regex - Engine: boost_regex - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Risk rating: 8 - Pattern: `(?is)\b(?:deposit\s+account|account\s+(?:number|no\.?|#|ref(?:erence)?)|bank\s+account|savings\s+account|cheque\s+account|transaction\s+account)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/]{4,24}\b` - Corroborative keywords: deposit account, bank account number, BSB, account number, savings account, cheque account, transaction account, direct debit, bank account, account no, routing number, sort code, IBAN, SWIFT, BIC, field, column, row, entry, record (+24 more) - Example matches: `account number A12345678`, `deposit account B062000ACC12`, `bank account X1234-5678/90` - Known false positives: Financial terminology in published reports or textbooks without actual data. ### Australian Individual Name Record Identifies Australian personal names using structural regex for capitalised name patterns combined with family-name and forename census dictionaries. Supports Western, Vietnamese, Indian, Chinese, and Korean naming patterns. - Slug: `au-individual-name-record` - URL: https://testpattern.dev/patterns/au-individual-name-record - Type: keyword_dictionary - Confidence: low - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii, personal-name - Scope: wide - Risk rating: 6 - Example matches: `Customer name: Sarah Williams`, `Patient: Nguyen Van Minh`, `Employee details for Raj Kumar Singh` - Known false positives: Common surnames such as Brown, Young, or Green appear frequently as everyday words. ### Australian Landline Number Identifies Australian fixed-line telephone numbers across domestic bracketed, unbracketed, and international formats for area codes 02, 03, 07, and 08. Uses lookaround boundaries and supports hyphen separators within digit groups. - Slug: `au-fixed-line-telephone` - URL: https://testpattern.dev/patterns/au-fixed-line-telephone - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii, contact-information - Scope: narrow - Risk rating: 5 - Pattern: `(?$10M) or systemic policy impact. These documents reveal the State's assessment of its own weaknesses, settlement authority, and tactical approach. Note: trainable classifier recommended for production deployment using document structural features. - Slug: `major-litigation-strategy-document` - URL: https://testpattern.dev/patterns/major-litigation-strategy-document - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Evidence Act 1977 (Qld), RTI Act 2009 (Qld) - Data categories: legal, government - Scope: wide - Risk rating: 8 - Pattern: `(?i)\b(?:litigation|case|trial|defence)\s+strategy\b` - Corroborative keywords: privileged, LPP, confidential, PROTECTED, prospects of success, risk assessment, strengths, weaknesses, recommended approach, settlement, exposure, legal professional privilege, legal, counsel, privilege, litigation, proceedings, court, jurisdiction, attorney (+27 more) - Example matches: `PROTECTED — LEGAL PROFESSIONAL PRIVILEGE Litigation Strategy — Privileged and Confidential Matter: State of Queensland v Consolidated Mining Ltd Exposure: $45M (estimated) 1. Prospects of Success The State's prospects are assessed as moderate. Key weaknesses include...`, `This case strategy document is subject to LPP. The defence strategy for the representative proceeding requires immediate review. Risk assessment: the State's position on causation is vulnerable and settlement authority should be obtained.`, `CONFIDENTIAL — PRIVILEGED Trial Strategy Brief Prepared for: Director-General, Department of Health Re: Class of claims arising from Caboolture Hospital incident Recommended Approach: Defend liability, concede quantum on limited basis` - Known false positives: Academic legal textbooks discussing litigation strategy concepts; Law firm marketing materials referencing strategy services; Published court judgments discussing parties' strategies ### Major outage root-cause analyses Identifies major outage root-cause analyses patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-315-major-outage-root-cause-analyses` - URL: https://testpattern.dev/patterns/au-top500-315-major-outage-root-cause-analyses - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:major\s+outage|root\s+cause\s+analysis|post[\s-]+incident\s+review|service\s+disruption|incident\s+report|corrective\s+action|contributing\s+factor|impact\s+assessment|lessons\s+learned)\b` - Corroborative keywords: major outage root-cause analyses, major, outage, root, cause, analyses, operations, resilience, SCADA, PLC, DCS, HMI, Modbus, Modbus TCP, Modbus RTU, DNP3, OPC-UA, OPC Classic, IEC 61850, IEC 60870 (+10 more) - Example matches: `major outage`, `root cause analysis`, `post-incident review` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Major outage root-cause analyses Identifies major outage root-cause analyses patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-315-major-outage-root-cause-analyses` - URL: https://testpattern.dev/patterns/global-top500-315-major-outage-root-cause-analyses - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:major\s+outage|root\s+cause\s+analysis|post[\s-]+incident\s+review|service\s+disruption|contributing\s+factor|corrective\s+action|preventive\s+measure|incident\s+summary|lessons\s+learned)\b` - Corroborative keywords: major outage root-cause analyses, major, outage, root, cause, analyses, operations, resilience, SCADA, PLC, DCS, HMI, Modbus, Modbus TCP, Modbus RTU, DNP3, OPC-UA, OPC Classic, IEC 61850, IEC 60870 (+39 more) - Example matches: `major outage`, `root cause analysis`, `post-incident review` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Malaysia Passport Number Detects Malaysia passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `my-passport-number` - URL: https://testpattern.dev/patterns/my-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: my - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b[AHK]\d{8}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `A12345678`, `H98765432`, `K23456789` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Malta Driver's License Number Detects Malta driver's license number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `mt-drivers-license` - URL: https://testpattern.dev/patterns/mt-drivers-license - Type: regex - Engine: universal - Confidence: medium - Detection quality: Mixed - Jurisdictions: mt, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\b\d{5,7}[A-Z]?\b` - Corroborative keywords: driver, licence, license, driving, DL, ID number, identification, ID card, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `12345`, `1234567A`, `123456` - Known false positives: Generic numeric sequences matching the driver's license format appearing in unrelated contexts. ### Malta Passport Number Detects Malta passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `mt-passport-number` - URL: https://testpattern.dev/patterns/mt-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: mt, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b\d{7}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `1234567`, `9876543`, `4567890` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Malta Physical Addresses Detects Malta Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `mt-physical-addresses` - URL: https://testpattern.dev/patterns/mt-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: mt, eu - Regulations: GDPR - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 triq name, unit 4`, `located at 45 street example`, `deliver to 78 road test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### Malta Tax ID Number Detects Malta Tax ID Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Due to the numeric format, corroborative evidence keywords are essential for reliable detection. - Slug: `mt-tax-id` - URL: https://testpattern.dev/patterns/mt-tax-id - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: mt, eu - Regulations: gdpr - Data categories: pii, financial, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b\d{7,8}[A-Z]?\b` - Corroborative keywords: tax identification, TIN, numru tat-taxxa, Malta tax, IRD, tax identification number, tax number, tax return, NIF, tax ID, inland revenue, taxpayer identification, αριθμός φορολογικού μητρώου, ΑΦΜ, φορολογικός, Abgabenkontonummer, adóazonosító, adószám, belastingnummer, BSN (+44 more) - Example matches: `1234567A`, `12345678`, `9876543M` - Known false positives: Generic numeric sequences in non-tax contexts such as reference numbers or account identifiers; Numbers from other identification schemes with similar digit patterns ### Malware sample repositories Identifies malware sample repositories patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-291-malware-sample-repositories` - URL: https://testpattern.dev/patterns/au-top500-291-malware-sample-repositories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:malware\s+sample|yara|sample\s+hash|malicious\s+binary)\b` - Corroborative keywords: malware sample repositories, malware, sample, repositories, security, operations, threat, data - Example matches: `Malware sample repositories`, `malware sample repositories`, `Malware sample repositories` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Malware sample repositories Identifies malware sample repositories patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-291-malware-sample-repositories` - URL: https://testpattern.dev/patterns/global-top500-291-malware-sample-repositories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:malware\s+sample|yara|sample\s+hash|malicious\s+binary)\b` - Corroborative keywords: malware sample repositories, malware, sample, repositories, security, operations, threat, data - Example matches: `Malware sample repositories`, `malware sample repositories`, `Malware sample repositories` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Management Action Plan Detects management action plans documenting remediation timelines for audit findings and vulnerabilities. - Slug: `au-management-action-plan` - URL: https://testpattern.dev/patterns/au-management-action-plan - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: IPA 2009 (Qld), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: audit, governance - Scope: narrow - Risk rating: 7 - Example matches: `Management action plan: remediation plan with due date and responsible officer`, `MAP implementation status: corrective action and target completion dates`, `Management response to audit finding with risk treatment and finding closure` - Known false positives: Generic action plan in non-audit contexts. ### Manager assessment notes Identifies documents containing references to manager assessment notes in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-072-manager-assessment-notes` - URL: https://testpattern.dev/patterns/au-top500-072-manager-assessment-notes - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:manager\s+assessment|supervisor\s+notes|manager\s+feedback|assessment\s+notes|manager\s+comments|direct\s+report|line\s+manager|manager\s+review|leadership\s+assessment|manager\s+evaluation|supervisory\s+notes|manager\s+observations)\b` - Corroborative keywords: manager assessment notes, manager, assessment, notes, employment, workforce, records - Example matches: `manager assessment`, `supervisor notes`, `manager feedback` - Known false positives: Common words and phrases related to manager assessment notes appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Manager assessment notes Identifies documents containing references to manager assessment notes in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-072-manager-assessment-notes` - URL: https://testpattern.dev/patterns/global-top500-072-manager-assessment-notes - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:manager\s+assessment|supervisor\s+notes|manager\s+feedback|leadership\s+review|direct\s+report\s+assessment|manager\s+evaluation|supervisor\s+review|team\s+assessment|manager\s+comments|performance\s+feedback|one[\s-]+on[\s-]+one\s+notes)\b` - Corroborative keywords: manager assessment notes, manager, assessment, notes, employment, workforce, records - Example matches: `manager assessment`, `supervisor notes`, `manager feedback` - Known false positives: Common words and phrases related to manager assessment notes appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Manufacturing deviation records Identifies documents containing references to manufacturing deviation records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-238-manufacturing-deviation-records` - URL: https://testpattern.dev/patterns/au-top500-238-manufacturing-deviation-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:manufacturing\s+deviation|deviation\s+record|process\s+deviation|production\s+deviation|batch\s+record|lot\s+deviation|out\s+of\s+specification|manufacturing\s+defect|deviation\s+report)\b` - Corroborative keywords: manufacturing deviation records, manufacturing, deviation, records, product, quality, safety - Example matches: `manufacturing deviation`, `deviation record`, `process deviation` - Known false positives: Common words and phrases related to manufacturing deviation records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Manufacturing deviation records Identifies documents containing references to manufacturing deviation records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-238-manufacturing-deviation-records` - URL: https://testpattern.dev/patterns/global-top500-238-manufacturing-deviation-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:manufacturing\s+deviation|deviation\s+record|process\s+deviation|production\s+variance|nonconformance\s+report|batch\s+record|lot\s+deviation|manufacturing\s+exception|out\s+of\s+specification|deviation\s+approval)\b` - Corroborative keywords: manufacturing deviation records, manufacturing, deviation, records, product, quality, safety - Example matches: `manufacturing deviation`, `deviation record`, `process deviation` - Known false positives: Common words and phrases related to manufacturing deviation records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Manufacturing process tolerances Identifies documents containing references to manufacturing process tolerances in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-203-manufacturing-process-tolerances` - URL: https://testpattern.dev/patterns/au-top500-203-manufacturing-process-tolerances - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:manufacturing\s+process|process\s+tolerance|manufacturing\s+tolerances|production\s+specification|quality\s+control|process\s+parameter|trade\s+secret|proprietary\s+process|yield\s+rate|defect\s+tolerance|process\s+capability|engineering\s+specification)\b` - Corroborative keywords: manufacturing process tolerances, manufacturing, process, tolerances, intellectual, property, trade, secrets - Example matches: `manufacturing process`, `process tolerance`, `manufacturing tolerances` - Known false positives: Common words and phrases related to manufacturing process tolerances appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Manufacturing process tolerances Identifies documents containing references to manufacturing process tolerances in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-203-manufacturing-process-tolerances` - URL: https://testpattern.dev/patterns/global-top500-203-manufacturing-process-tolerances - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:manufacturing\s+tolerance|process\s+specification|quality\s+control|dimensional\s+tolerance|production\s+parameters|process\s+capability|yield\s+specification|material\s+specification|engineering\s+tolerance|process\s+control|manufacturing\s+process)\b` - Corroborative keywords: manufacturing process tolerances, manufacturing, process, tolerances, intellectual, property, trade, secrets - Example matches: `manufacturing tolerance`, `process specification`, `quality control` - Known false positives: Common words and phrases related to manufacturing process tolerances appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Marital status Identifies documents containing references to marital status in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-013-marital-status` - URL: https://testpattern.dev/patterns/au-top500-013-marital-status - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:marital\s+status|de\s+facto|domestic\s+partner|relationship\s+status|civil\s+union)\b` - Corroborative keywords: marital status, marital, status, personal, identity, demographics, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender, given name (+44 more) - Example matches: `marital status`, `de facto`, `domestic partner` - Known false positives: Common words and phrases related to marital status appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Marital status Identifies documents containing references to marital status in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-013-marital-status` - URL: https://testpattern.dev/patterns/global-top500-013-marital-status - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:marital\s+status|de\s+facto|domestic\s+partner|civil\s+union|relationship\s+status)\b` - Corroborative keywords: marital status, marital, status, personal, identity, demographics, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender, given name (+44 more) - Example matches: `marital status`, `de facto`, `domestic partner` - Known false positives: Common words and phrases related to marital status appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Market entry strategy papers Identifies documents containing references to market entry strategy papers in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-190-market-entry-strategy-papers` - URL: https://testpattern.dev/patterns/au-top500-190-market-entry-strategy-papers - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:market\s+entry\s+strategy|market\s+entry|market\s+expansion|new\s+market|market\s+penetration|geographic\s+expansion|market\s+assessment|competitive\s+landscape|target\s+market|market\s+sizing|entry\s+barriers)\b` - Corroborative keywords: market entry strategy papers, market, entry, strategy, papers, mergers, acquisitions - Example matches: `market entry strategy`, `market entry`, `market expansion` - Known false positives: Common words and phrases related to market entry strategy papers appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Market entry strategy papers Identifies documents containing references to market entry strategy papers in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-190-market-entry-strategy-papers` - URL: https://testpattern.dev/patterns/global-top500-190-market-entry-strategy-papers - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:market\s+entry|market\s+expansion|geographic\s+expansion|new\s+market|market\s+penetration|market\s+sizing|addressable\s+market|entry\s+barriers|competitive\s+landscape|market\s+opportunity)\b` - Corroborative keywords: market entry strategy papers, market, entry, strategy, papers, mergers, acquisitions - Example matches: `market entry`, `market expansion`, `geographic expansion` - Known false positives: Common words and phrases related to market entry strategy papers appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Marketing suppression lists Identifies documents containing references to marketing suppression lists in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-372-marketing-suppression-lists` - URL: https://testpattern.dev/patterns/au-top500-372-marketing-suppression-lists - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:marketing\s+suppression\s+lists|suppression\s+list|do\s+not\s+contact|Do\s+Not\s+Call\s+Register|marketing\s+exclusion|consent\s+withdrawal|email\s+suppression|Spam\s+Act|direct\s+marketing)\b` - Corroborative keywords: marketing suppression lists, marketing, suppression, lists, customer, commercial, data, field, column, row, entry, record, value, form, register, database, extract, export, spreadsheet, table (+4 more) - Example matches: `marketing suppression lists`, `suppression list`, `do not contact` - Known false positives: Common words and phrases related to marketing suppression lists appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Marketing suppression lists Identifies documents containing references to marketing suppression lists in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-372-marketing-suppression-lists` - URL: https://testpattern.dev/patterns/global-top500-372-marketing-suppression-lists - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:marketing\s+suppression\s+lists|suppression\s+list|opt[\s-]+out\s+list|do\s+not\s+contact|marketing\s+preferences|email\s+suppression|communication\s+preferences|opt[\s-]+out\s+request|suppression\s+file|mailing\s+list\s+removal|consent\s+withdrawal)\b` - Corroborative keywords: marketing suppression lists, marketing, suppression, lists, customer, commercial, data - Example matches: `marketing suppression lists`, `suppression list`, `opt-out list` - Known false positives: Common words and phrases related to marketing suppression lists appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Marriage certificate number Identifies documents containing references to marriage certificate number in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-029-marriage-certificate-number` - URL: https://testpattern.dev/patterns/au-top500-029-marriage-certificate-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:marriage\s+certificate|marriage\s+registration|certificate\s+of\s+marriage|births\s+deaths\s+marriages|marriage\s+record|wedding\s+certificate|matrimonial\s+record|registered\s+marriage|civil\s+marriage)\b` - Corroborative keywords: marriage certificate number, marriage, certificate, number, government, ids, civil, status, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie (+44 more) - Example matches: `marriage certificate`, `marriage registration`, `certificate of marriage` - Known false positives: Common words and phrases related to marriage certificate number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Marriage certificate number Identifies documents containing references to marriage certificate number in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-029-marriage-certificate-number` - URL: https://testpattern.dev/patterns/global-top500-029-marriage-certificate-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:marriage\s+certificate\s+number|marriage\s+certificate|marriage\s+registration|certificate\s+of\s+marriage|civil\s+registration|vital\s+records|certificate\s+number|nuptial\s+registration|births\s+deaths\s+marriages|wedding\s+certificate)\b` - Corroborative keywords: marriage certificate number, marriage, certificate, number, government, ids, civil, status, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie (+44 more) - Example matches: `marriage certificate number`, `marriage certificate`, `marriage registration` - Known false positives: Common words and phrases related to marriage certificate number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### MBI 'Detects MBI patterns. Excluded letters: S, L, O, I, B, Z.' This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `us-medicare-beneficiary-id` - URL: https://testpattern.dev/patterns/us-medicare-beneficiary-id - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: us - Regulations: CCPA/CPRA, FTC Act s5, HIPAA, State Breach Laws (US) - Data categories: phi, healthcare - Scope: specific - Risk rating: 8 - Pattern: `\b[1-9][AC-HJKMNP-RT-Y][0-9AC-HJKMNP-RT-Y]\d[AC-HJKMNP-RT-Y][0-9AC-HJKMNP-RT-Y]\d[AC-HJKMNP-RT-Y]{2}\d{2}\b` - Corroborative keywords: MRN, medical record number, patient ID, NPI, DEA, medicare, medicaid, insurance ID, member ID, beneficiary, ICD-10, ICD-9, CPT, NDC, SNOMED, HCPCS, diagnosis code, procedure code, drug code - Example matches: `1AC4DE7HJ90`, `9YT2FG8KP12`, `3HK5MN7PR34` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### Medical Specialties Detects Medical Specialties patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that identifies health and medical terminology in documents. Keyword matching is used to flag content containing medical language. - Slug: `global-medical-specialties` - URL: https://testpattern.dev/patterns/global-medical-specialties - Type: keyword_list - Confidence: low - Jurisdictions: global - Regulations: GDPR, HIPAA - Data categories: phi, health - Scope: wide - Risk rating: 8 - Example matches: `patient diagnosed with cardiology`, `treatment plan includes dermatology`, `clinical notes reference endocrinology` - Known false positives: Educational or research materials discussing medical topics without containing actual patient data; News articles or general health information websites mentioning medical conditions ### Medicare Provider Number Detects Medicare Provider Number patterns. An 8-character code consisting of 6 digits, a location character, and a check character. Validated by location and check character sets. - Slug: `au-medicare-provider-number` - URL: https://testpattern.dev/patterns/au-medicare-provider-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Partial - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b\d{6}[0-9A-HJKLMNPQRTUVWXY][ABFHJKLTWXY]\b` - Corroborative keywords: Medicare, provider number, Medicare provider, IHI, Individual Healthcare Identifier, healthcare identifier, HPI, HPI-I, HPI-O, provider identifier, AHPRA, registration number, prescriber number, PBS prescriber, pharmaceutical benefits, MRN, medical record number, patient ID, NPI, DEA (+5 more) - Example matches: `123456AW`, `000000AA`, `999999YX` - Known false positives: Common words and phrases related to medicare provider number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Medication histories Identifies medication histories references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `au-top500-324-medication-histories` - URL: https://testpattern.dev/patterns/au-top500-324-medication-histories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:medication\s+history|prescription\s+history|drug\s+history|dispensing\s+record|patient\s+medication)\b` - Corroborative keywords: medication histories, medication, histories, health, biomedical, information, drug name, drug strength, dosage, quantity prescribed, repeats, prescription, dispensing, compounding - Example matches: `medication history`, `prescription history`, `drug history` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### Medication histories Identifies medication histories references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `global-top500-324-medication-histories` - URL: https://testpattern.dev/patterns/global-top500-324-medication-histories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Partial - Jurisdictions: global - Regulations: GDPR - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:medication\s+history|prescription\s+history|drug\s+history|medication\s+list|dispensing\s+record|medication\s+reconciliation)\b` - Corroborative keywords: medication histories, medication, histories, health, biomedical, information, drug name, drug strength, dosage, quantity prescribed, repeats, prescription, dispensing, compounding, field, column, row, entry, record, value (+23 more) - Example matches: `medication history`, `prescription history`, `drug history` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### Mental Health Involuntary Treatment Order Detects involuntary treatment orders (ITOs) under the Mental Health Act 2016 (Qld) including treatment authority documents, Mental Health Review Tribunal decisions, forensic orders, and authorised doctor assessments. These records contain the most sensitive details about a person's psychiatric condition, involuntary detention, and compulsory treatment — disclosure causes severe harm to the individual's dignity, employment, and personal relationships. - Slug: `mental-health-involuntary-treatment-order` - URL: https://testpattern.dev/patterns/mental-health-involuntary-treatment-order - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Human Rights Act 2019 (Qld), IPA 2009 (Qld), Mental Health Act 2016 (Qld) - Data categories: health, government - Scope: wide - Risk rating: 8 - Pattern: `(?i)\b(involuntary\s+treatment\s+order|treatment\s+authority|mental\s+health\s+review\s+tribunal|forensic\s+order|authorised\s+doctor\s+(?:assessment|examination|recommendation)|ITO-\d{4}-\d{3,5}|MH-\d{4}-\d{3,4})\b` - Corroborative keywords: PROTECTED, Privacy, involuntary treatment order, ITO, treatment authority, Mental Health Act 2016, forensic order, authorised doctor, mental health review tribunal, patient, clinical file number, examination authority, community treatment order, inpatient treatment, electroconvulsive therapy, seclusion, restraint, treating psychiatrist, clinical, medical (+55 more) - Example matches: `PROTECTED Privacy. Involuntary Treatment Order — Mental Health Act 2016 (Qld) Part 3. Patient: David James RICHARDSON, DOB 15/08/1992, Clinical File No. MH-2026-3471. An authorised doctor assessment was conducted on 04/03/2026 at the Park Centre for Mental Health. The patient meets criteria for an involuntary treatment order under s.12. Treatment authority issued for inpatient treatment including antipsychotic medication. Review by Mental Health Review Tribunal scheduled within 28 days.`, `Queensland Health — Mental Health Review Tribunal Decision. Case Reference: ITO-2026-08742. In the matter of the review of the forensic order for Karen Michelle SUNG. The Tribunal is satisfied that the patient continues to present a risk as described under s.117 of the Mental Health Act 2016. The forensic order is confirmed. The authorised doctor is directed to continue the current treatment authority. Next review date: 15/09/2026.`, `Memorandum — Authorised Doctor Recommendation. Re: Community Treatment Order for patient MRN 6729841. The examination authority was exercised at the Townsville University Hospital Emergency Department on 02/03/2026. The patient was assessed as requiring involuntary treatment under s.13 Mental Health Act 2016 (Qld). Clinical presentation: acute psychotic episode with paranoid ideation. Treating psychiatrist: Dr Anita Kapoor. Recommendation: community treatment order with fortnightly depot injection and weekly case manager review.` - Known false positives: Mental health awareness and anti-stigma campaign materials; Published policy reviews and legislative reform documents discussing the Mental Health Act framework; Academic research on involuntary treatment outcomes using anonymised cohort data ### Merchant acquiring credentials Detects references to merchant acquiring credentials in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-111-merchant-acquiring-credentials` - URL: https://testpattern.dev/patterns/au-top500-111-merchant-acquiring-credentials - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:merchant\s+acquiring|merchant\s+ID|acquiring\s+bank|terminal\s+ID|merchant\s+credentials|payment\s+gateway|PCI\s+DSS|card\s+acceptance|merchant\s+account|payment\s+processing)\b` - Corroborative keywords: merchant acquiring credentials, merchant, acquiring, credentials, financial, accounts, payments, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie, credential (+16 more) - Example matches: `merchant acquiring`, `merchant id`, `acquiring bank` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Merchant acquiring credentials Detects references to merchant acquiring credentials in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-111-merchant-acquiring-credentials` - URL: https://testpattern.dev/patterns/global-top500-111-merchant-acquiring-credentials - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR, PCI-DSS - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:merchant\s+ID|acquiring\s+bank|merchant\s+account|payment\s+gateway|terminal\s+ID|merchant\s+credentials|API\s+key|settlement\s+account|payment\s+processor|merchant\s+number|POS\s+terminal)\b` - Corroborative keywords: merchant acquiring credentials, merchant, acquiring, credentials, financial, accounts, payments, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie, credential (+44 more) - Example matches: `merchant ID`, `acquiring bank`, `merchant account` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Microsoft Bing Maps Key Detects Microsoft Bing Maps API key patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `global-microsoft-bing-maps-key` - URL: https://testpattern.dev/patterns/global-microsoft-bing-maps-key - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Risk rating: 10 - Pattern: `(?i)(?:bing[._-]?maps[._-]?key|bingmaps[._-]?key|maps[._-]?api[._-]?key)\s*[:=]\s*"?[A-Za-z0-9_\-\s]{60,74}"?` - Corroborative keywords: Bing Maps, bingmaps, maps key, virtualearth, dev.virtualearth.net, map api, geocode, bing, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie (+45 more) - Example matches: `bing_maps_key=AAAA0000BBBB1111CCCC2222DDDD3333EEEE4444FFFF5555GGGG6666HHHH7777`, `bingmaps_key: "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz012345678901"`, `maps_api_key="0000000000000000000000000000000000000000000000000000000000000000"` - Known false positives: Bing Maps documentation and sample applications with placeholder API keys.; Other 64-character API keys from non-Bing services. ### Microsoft Entra Client Access Token Detects Microsoft Entra (formerly Azure AD) client access token patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `azure-entra-client-access-token` - URL: https://testpattern.dev/patterns/azure-entra-client-access-token - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Risk rating: 10 - Pattern: `\beyJ[A-Za-z0-9_-]{20,}\.[A-Za-z0-9_-]{20,}\.[A-Za-z0-9_-]{20,}\b` - Corroborative keywords: Entra, Azure AD, access_token, bearer, login.microsoftonline.com, Microsoft identity, OAuth, client credentials, api key, api_key, apikey, access key, access token, auth token, authorization, conn str, connection string, connectionstring, cookie, credential (+44 more) - Example matches: `eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCJ9.eyJzdWIiOiIxMjM0NTY3ODkwIiwiYXVkIjoiMDAwMDAwMDAtMDAwMC0wMDAwLTAwMDAtMDAwMDAwMDAwMDAwIn0.AAAAAAAAAAAAAAAAAAAAAAAA`, `eyJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJpc3MiOiJodHRwczovL2xvZ2luLm1pY3Jvc29mdG9ubGluZS5jb20ifQ.BBBBBBBBBBBBBBBBBBBBBBBB`, `eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.eyJ0ZXN0IjoiMDAwMDAwMDAwMDAwMDAwMDAwMDAwMCJ9.CCCCCCCCCCCCCCCCCCCCCCCC` - Known false positives: JWT tokens from non-Microsoft identity providers that share the same format.; Expired or revoked access tokens in logs and audit trails. ### Microsoft Entra Client Secret Detects Microsoft Entra (formerly Azure AD) client secret patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `azure-entra-client-secret` - URL: https://testpattern.dev/patterns/azure-entra-client-secret - Type: regex - Engine: universal - Confidence: high - Detection quality: Partial - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Risk rating: 10 - Pattern: `(?i)(?:client[._-]?secret|AZURE[._-]?CLIENT[._-]?SECRET|aad[._-]?client[._-]?secret)\s*[:=]\s*"?[A-Za-z0-9~._-]{30,45}"?` - Corroborative keywords: Entra, Azure AD, client secret, app registration, tenant, AZURE_CLIENT_SECRET, client_id, application, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie (+45 more) - Example matches: `AZURE_CLIENT_SECRET=AAAA0000~BBBB.1111-CCCC_2222-DDDD3333`, `client_secret: "ABCDEFghijklmnop0123456789~._-ABCD"`, `aad_client_secret="000000000000000000000000000000000000"` - Known false positives: Microsoft identity platform documentation with example client secrets.; Generic client secret parameters from non-Microsoft OAuth providers. ### Microsoft Entra User Credentials Detects Microsoft Entra (formerly Azure AD) user credential patterns including username/password combinations targeting Microsoft login endpoints. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `azure-entra-user-credentials` - URL: https://testpattern.dev/patterns/azure-entra-user-credentials - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Risk rating: 10 - Pattern: `(?i)(?:username|user[._-]?id|upn)\s*[:=]\s*"?[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\.(?:onmicrosoft\.com|com|org|net)"?\s*[;,\n]\s*(?:password|pwd)\s*[:=]\s*"?[^\s"';,]{6,}"?` - Corroborative keywords: Entra, Azure AD, onmicrosoft.com, login.microsoftonline.com, user credentials, username, password, Microsoft 365, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie (+43 more) - Example matches: `username=admin@contoso.onmicrosoft.com;password=P@ssw0rd123`, `user_id="user@example.com" password="TestS3cret"`, `upn=test@contoso.com,pwd=000000000000` - Known false positives: Microsoft identity documentation with example user credentials.; Automated test scripts with test account credentials. ### Military service number Identifies documents containing references to military service number in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-030-military-service-number` - URL: https://testpattern.dev/patterns/au-top500-030-military-service-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:military\s+service\s+number|service\s+number|military\s+identification|ADF\s+number|Australian\s+Defence\s+Force|defence\s+service|army\s+number|navy\s+number|air\s+force\s+number|regimental\s+number)\b` - Corroborative keywords: military service number, military, service, number, government, ids, civil, status, DISP, DSPF, DSGL, ITAR, Defence and Strategic Goods, export control, controlled technology, defence industry security, DISP member, CASG, Defence Materiel, field (+27 more) - Example matches: `military service number`, `service number`, `military identification` - Known false positives: Common words and phrases related to military service number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Military service number Identifies documents containing references to military service number in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-030-military-service-number` - URL: https://testpattern.dev/patterns/global-top500-030-military-service-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:military\s+service\s+number|service\s+number|military\s+ID|armed\s+forces|defence\s+number|veteran\s+ID|military\s+record|service\s+record|enlistment\s+number|discharge\s+papers|military\s+personnel)\b` - Corroborative keywords: military service number, DISP, DSPF, DSGL, ITAR, Defence and Strategic Goods, export control, controlled technology, defence industry security, DISP member, CASG, Defence Materiel, field, column, row, entry, record, value, form, register (+21 more) - Example matches: `military service number`, `service number`, `military ID` - Known false positives: Common words and phrases related to military service number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Ministerial/Executive Briefing Detects ministerial briefings, DG briefs, and executive decision documents in Australian government. - Slug: `au-ministerial-briefing` - URL: https://testpattern.dev/patterns/au-ministerial-briefing - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: IPA 2009 (Qld), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: government - Scope: narrow - Risk rating: 8 - Example matches: `Ministerial brief: for decision by the Minister`, `Briefing note for the Director General with key issues and recommendations`, `DG briefing prepared for approval with policy recommendations` - Known false positives: Generic use of brief, minister, or briefing in non-government contexts. ### Mission briefing packages Identifies documents containing references to mission briefing packages in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-423-mission-briefing-packages` - URL: https://testpattern.dev/patterns/au-top500-423-mission-briefing-packages - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:mission\s+briefing\s+packages|mission\s+briefing|operational\s+briefing|intelligence\s+briefing|situation\s+report|mission\s+planning|pre[\s-]+deployment\s+briefing|command\s+briefing|threat\s+assessment|defence\s+intelligence|mission\s+objectives|rules\s+of\s+engagement)\b` - Corroborative keywords: mission briefing packages, mission, briefing, packages, defense, intelligence, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program, public benefit (+1 more) - Example matches: `mission briefing packages`, `mission briefing`, `operational briefing` - Known false positives: Common words and phrases related to mission briefing packages appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Mission briefing packages Identifies documents containing references to mission briefing packages in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-423-mission-briefing-packages` - URL: https://testpattern.dev/patterns/global-top500-423-mission-briefing-packages - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:mission\s+briefing|briefing\s+package|mission\s+brief|operational\s+briefing|intelligence\s+briefing|situation\s+briefing|pre[\s-]+mission\s+brief|commander\s+briefing|tactical\s+briefing|mission\s+overview|briefing\s+document|mission\s+summary)\b` - Corroborative keywords: mission briefing packages - Example matches: `mission briefing`, `briefing package`, `mission brief` - Known false positives: Common words and phrases related to mission briefing packages appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Mobile payment account IDs Detects references to mobile payment account ids in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-110-mobile-payment-account-ids` - URL: https://testpattern.dev/patterns/au-top500-110-mobile-payment-account-ids - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:mobile\s+payment\s+account\s+ids)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: mobile payment account ids, mobile, payment, account, ids, financial, accounts, payments, phone, contact, mob, cell, telephone, tel, ph, landline, home phone, work phone, business phone, direct line (+45 more) - Example matches: `Mobile payment account IDs`, `mobile payment account ids`, `Mobile payment account IDs` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Mobile payment account IDs Detects references to mobile payment account ids in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-110-mobile-payment-account-ids` - URL: https://testpattern.dev/patterns/global-top500-110-mobile-payment-account-ids - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR, PCI-DSS - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:mobile\s+payment\s+account\s+ids)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: mobile payment account ids, mobile, payment, account, ids, financial, accounts, payments, phone, contact, mob, cell, telephone, tel, ph, landline, home phone, work phone, business phone, direct line (+45 more) - Example matches: `Mobile payment account IDs`, `mobile payment account ids`, `Mobile payment account IDs` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Model risk assessment reports Identifies documents containing references to model risk assessment reports in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-478-model-risk-assessment-reports` - URL: https://testpattern.dev/patterns/au-top500-478-model-risk-assessment-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:model\s+risk|risk\s+assessment|model\s+validation|model\s+governance|risk\s+report|model\s+audit|risk\s+rating|model\s+performance|stress\s+testing|CPS\s+220|prudential\s+standard)\b` - Corroborative keywords: model risk assessment reports, model, risk, assessment, reports, privacy, compliance - Example matches: `model risk`, `risk assessment`, `model validation` - Known false positives: Common words and phrases related to model risk assessment reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Model risk assessment reports Identifies documents containing references to model risk assessment reports in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-478-model-risk-assessment-reports` - URL: https://testpattern.dev/patterns/global-top500-478-model-risk-assessment-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:model\s+risk\s+assessment\s+reports|model\s+risk|risk\s+assessment|model\s+validation|model\s+governance|model\s+inventory|stress\s+testing|model\s+performance|sensitivity\s+analysis|residual\s+risk)\b` - Corroborative keywords: model risk assessment reports, model, risk, assessment, reports, privacy, compliance - Example matches: `model risk assessment reports`, `model risk`, `risk assessment` - Known false positives: Common words and phrases related to model risk assessment reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Mongodb Detects Mongodb patterns. - Slug: `global-mongodb-connection-string` - URL: https://testpattern.dev/patterns/global-mongodb-connection-string - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Pattern: `mongodb(\+srv)?://[^:]+:[^@]+@[^/]+` - Corroborative keywords: api key, api_key, apikey, access key, secret key, private key, auth token, authorization, access token, bearer, conn str, connection string, connectionstring, cookie, credential, database, host, JWT, oauth, passphrase (+37 more) - Example matches: `mongodb://user:pass@localhost`, `mongodb+srv://admin:secret@cluster.mongodb.net`, `mongodb://app:password@db.example.com` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Mortgage underwriting packets Detects references to mortgage underwriting packets in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-124-mortgage-underwriting-packets` - URL: https://testpattern.dev/patterns/au-top500-124-mortgage-underwriting-packets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:mortgage\s+underwriting|mortgage\s+application|property\s+valuation|APS\s+220|mortgage\s+assessment|home\s+loan|borrower\s+income|settlement\s+statement|mortgage\s+approval)\b` - Corroborative keywords: mortgage underwriting packets, mortgage, underwriting, packets, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+2 more) - Example matches: `mortgage underwriting`, `mortgage application`, `property valuation` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Mortgage underwriting packets Detects references to mortgage underwriting packets in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-124-mortgage-underwriting-packets` - URL: https://testpattern.dev/patterns/global-top500-124-mortgage-underwriting-packets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:property\s+valuation|title\s+search|settlement\s+statement|borrower\s+income|mortgage\s+approval|home\s+loan|debt\s+service\s+ratio)\b` - Corroborative keywords: mortgage underwriting packets, mortgage, underwriting, packets, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+31 more) - Example matches: `property valuation`, `title search`, `settlement statement` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Mugshot image repositories Identifies documents containing references to mugshot image repositories in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-403-mugshot-image-repositories` - URL: https://testpattern.dev/patterns/au-top500-403-mugshot-image-repositories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:mugshot\s+image\s+repositories|booking\s+photo|custody\s+image|facial\s+recognition|identity\s+photograph|police\s+photograph|image\s+repository|biometric\s+image|law\s+enforcement|offender\s+photograph|detainee\s+image)\b` - Corroborative keywords: mugshot image repositories, mugshot, image, repositories, law, enforcement, justice, SCADA, PLC, DCS, HMI, Modbus, Modbus TCP, Modbus RTU, DNP3, OPC-UA, OPC Classic, IEC 61850, IEC 60870, IEC 60870-5-104 (+38 more) - Example matches: `mugshot image repositories`, `booking photo`, `custody image` - Known false positives: Common words and phrases related to mugshot image repositories appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Mugshot image repositories Identifies documents containing references to mugshot image repositories in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-403-mugshot-image-repositories` - URL: https://testpattern.dev/patterns/global-top500-403-mugshot-image-repositories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:booking\s+photo|arrest\s+photo|facial\s+image|image\s+repository|photo\s+lineup|identification\s+photo|inmate\s+photo|booking\s+image|custody\s+photograph|detainee\s+photo|biometric\s+image)\b` - Corroborative keywords: mugshot image repositories, SCADA, PLC, DCS, HMI, Modbus, Modbus TCP, Modbus RTU, DNP3, OPC-UA, OPC Classic, IEC 61850, IEC 60870, IEC 60870-5-104, BACnet, EtherNet/IP, HART, PROFINET, PROFIBUS, Foundation Fieldbus (+32 more) - Example matches: `booking photo`, `arrest photo`, `facial image` - Known false positives: Common words and phrases related to mugshot image repositories appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Multi-factor authentication seeds Identifies multi-factor authentication seeds patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-264-multi-factor-authentication-seeds` - URL: https://testpattern.dev/patterns/au-top500-264-multi-factor-authentication-seeds - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: au - Regulations: Criminal Code Act 1995 (Cth), NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)(?=\s*\b(?:otpauth://|totp|hotp|mfa)\b)(?=\s*\b(?:seed|secret|base32|authenticator)\b)\s+` - Corroborative keywords: multi-factor authentication seeds, multi, factor, authentication, seeds, credentials, keys, secrets - Example matches: `Multi-factor authentication seeds`, `multi-factor authentication seeds`, `Multi-factor authentication seeds` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Multi-factor authentication seeds Identifies multi-factor authentication seeds patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-264-multi-factor-authentication-seeds` - URL: https://testpattern.dev/patterns/global-top500-264-multi-factor-authentication-seeds - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)(?=\s*\b(?:otpauth://|totp|hotp|mfa)\b)(?=\s*\b(?:seed|secret|base32|authenticator)\b)\s+` - Corroborative keywords: multi-factor authentication seeds, multi, factor, authentication, seeds, credentials, keys, secrets - Example matches: `Multi-factor authentication seeds`, `multi-factor authentication seeds`, `Multi-factor authentication seeds` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### My Number Detects My Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `jp-my-number` - URL: https://testpattern.dev/patterns/jp-my-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: jp - Regulations: APPI - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{4}[\s.-]?\d{4}[\s.-]?\d{4}\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+16 more) - Example matches: `1234 5678 9012`, `123456789012`, `1234-5678-9012` - Known false positives: Common words and phrases related to my number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Japanese, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### MyKad Detects MyKad patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `my-identity-card` - URL: https://testpattern.dev/patterns/my-identity-card - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: my - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{6}-\d{2}-\d{4}\b` - Corroborative keywords: MyKad, NRIC, identity card, kad pengenalan, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `750101-01-1234`, `880512-14-5678`, `920303-07-4567` - Known false positives: The specific dash-separated format (XXXXXX-XX-XXXX) reduces false positives significantly.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Mysql Detects Mysql patterns. - Slug: `global-mysql-connection-string` - URL: https://testpattern.dev/patterns/global-mysql-connection-string - Type: regex - Engine: universal - Confidence: low - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Pattern: `mysql://[^:]+:[^@]+@[^/]+/\S+` - Corroborative keywords: api key, api_key, apikey, access key, secret key, private key, auth token, authorization, access token, bearer, conn str, connection string, connectionstring, cookie, credential, database, host, JWT, oauth, passphrase (+37 more) - Example matches: `mysql://root:password@localhost/mydb`, `mysql://user:pass123@db.example.com/production`, `mysql://admin:s3cret@127.0.0.1/testdb` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### National emergency response plans Identifies documents containing references to national emergency response plans in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-493-national-emergency-response-plans` - URL: https://testpattern.dev/patterns/au-top500-493-national-emergency-response-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:emergency\s+response\s+plan|national\s+emergency|disaster\s+response|emergency\s+management|crisis\s+response|Home\s+Affairs|emergency\s+coordination|disaster\s+recovery|emergency\s+declaration|civil\s+defence|critical\s+infrastructure)\b` - Corroborative keywords: national emergency response plans, national, emergency, response, plans, elections, diplomacy, statecraft, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant (+32 more) - Example matches: `emergency response plan`, `national emergency`, `disaster response` - Known false positives: Common words and phrases related to national emergency response plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### National emergency response plans Identifies documents containing references to national emergency response plans in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-493-national-emergency-response-plans` - URL: https://testpattern.dev/patterns/global-top500-493-national-emergency-response-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:national\s+emergency\s+response\s+plans|emergency\s+response|disaster\s+recovery|crisis\s+management|continuity\s+of\s+government|civil\s+defense|emergency\s+preparedness|evacuation\s+plan|incident\s+command|threat\s+assessment|critical\s+infrastructure|national\s+resilience)\b` - Corroborative keywords: national emergency response plans - Example matches: `national emergency response plans`, `emergency response`, `disaster recovery` - Known false positives: Common words and phrases related to national emergency response plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### National Id Detects National Id patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `sa-national-id` - URL: https://testpattern.dev/patterns/sa-national-id - Type: regex - Engine: universal - Confidence: medium - Detection quality: Partial - Jurisdictions: sa - Regulations: PDPL (SA) - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b[12]\d{9}\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+16 more) - Example matches: `1000000001`, `2345678901`, `1098765432` - Known false positives: Common words and phrases related to national id appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Arabic (Saudi Arabia), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### National identity number Identifies documents containing references to national identity number in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-022-national-identity-number` - URL: https://testpattern.dev/patterns/au-top500-022-national-identity-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:national\s+identity\s+number|identity\s+document|national\s+ID|government\s+ID|identity\s+card|proof\s+of\s+identity|identification\s+number|citizen\s+number|identity\s+verification|personal\s+identification)\b` - Corroborative keywords: national identity number, national, identity, number, government, ids, civil, status, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record (+23 more) - Example matches: `national identity number`, `identity document`, `national ID` - Known false positives: Common words and phrases related to national identity number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### National identity number Identifies documents containing references to national identity number in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-022-national-identity-number` - URL: https://testpattern.dev/patterns/global-top500-022-national-identity-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:national\s+identity\s+number|national\s+ID|identity\s+card|ID\s+number|identity\s+document|government\s+ID|personal\s+identification\s+number|national\s+registration|citizen\s+ID|identification\s+number|identity\s+verification)\b` - Corroborative keywords: national identity number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract, export, spreadsheet (+17 more) - Example matches: `national identity number`, `national id`, `identity card` - Known false positives: Common words and phrases related to national identity number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### National Insurance Number Detects National Insurance Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `uk-national-insurance-number` - URL: https://testpattern.dev/patterns/uk-national-insurance-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: uk - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b(?!BG|GB|NK|KN|TN|NT|ZZ)[A-CEGHJ-PR-TW-Z][A-CEGHJ-NPR-TW-Z]\s?\d{2}\s?\d{2}\s?\d{2}\s?[A-D]\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `AB 12 34 56 A`, `AB123456A`, `CE 12 34 56 B` - Known false positives: Common words and phrases related to national insurance number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In British English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### National Metering Identifier Detects National Metering Identifier (NMI) patterns used in the Australian energy market. A 10 or 11 digit number identifying electricity and gas connection points. Context-dependent: requires energy/meter keywords. - Slug: `au-national-metering-identifier` - URL: https://testpattern.dev/patterns/au-national-metering-identifier - Type: regex - Engine: universal - Confidence: low - Detection quality: Partial - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: infrastructure, energy - Scope: wide - Risk rating: 6 - Pattern: `\b\d{10,11}\b` - Corroborative keywords: NMI, National Metering Identifier, meter, MIRN, meter installation, meter installation registration number, smart meter, interval data, demand response, AEMO, NEM, National Electricity Market, dispatch, substation, transmission, distribution network - Example matches: `6102345678`, `61234567890`, `7001234567` - Known false positives: Long numeric sequences in phone numbers, account numbers, ABNs, and other identifiers may match the generic 10-11 digit pattern without energy context.; In Australian English, standard business terminology overlapping with energy detection keywords in routine correspondence and documentation. ### Nationality Identifies documents containing references to nationality in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-005-nationality` - URL: https://testpattern.dev/patterns/au-top500-005-nationality - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:national\s+origin|country\s+of\s+origin|passport\s+country|country\s+of\s+nationality|personal\s+details)\b` - Corroborative keywords: nationality, personal, identity, demographics, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender, given name, last name, maiden name (+48 more) - Example matches: `national origin`, `country of origin`, `passport country` - Known false positives: Common words and phrases related to nationality appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Nationality Identifies documents containing references to nationality in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-005-nationality` - URL: https://testpattern.dev/patterns/global-top500-005-nationality - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:national\s+origin|country\s+of\s+origin|immigration\s+status|visa\s+status|country\s+of\s+birth|ethnic\s+origin)\b` - Corroborative keywords: nationality, personal, identity, demographics, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender, given name, last name, maiden name (+48 more) - Example matches: `national origin`, `country of origin`, `immigration status` - Known false positives: Common words and phrases related to nationality appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Native Title Negotiation Strategy Detects legal strategy documents for native title negotiations, ILUAs, and compensation claims under the Native Title Act 1993 (Cth). Disclosure reveals the State's negotiation position on land rights with multi-generational consequences and multi-billion dollar implications. - Slug: `native-title-negotiation-strategy` - URL: https://testpattern.dev/patterns/native-title-negotiation-strategy - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Native Title Act 1993 (Cth) - Data categories: legal, government - Scope: wide - Risk rating: 8 - Pattern: `(?i)\b(?:native\s+title|ILUA|Indigenous\s+Land\s+Use\s+Agreement)\b` - Corroborative keywords: strategy, negotiation, legal advice, compensation, settlement, privilege, PROTECTED, extinguishment, ILUA terms, claim group, determination area, future act, legal, counsel, litigation, proceedings, court, jurisdiction, attorney, solicitor (+26 more) - Example matches: `PROTECTED — LEGAL PROFESSIONAL PRIVILEGE Native Title Negotiation Strategy Claim: Darumbal People — Federal Court QUD 6004/2001 ILUA Negotiation Phase Legal advice: The State's negotiation position on compensation should not exceed the range of $12M-$18M. The strategy for extinguishment concessions requires Crown Law approval.`, `This privileged legal advice addresses the State's strategy for the upcoming ILUA negotiation with the Quandamooka People. The negotiation position on sea country access rights is vulnerable to Federal Court challenge if not resolved.`, `CONFIDENTIAL Native Title Compensation Strategy Prepared by: Crown Law, Queensland For: Department of Resources The State's legal assessment of compensation liability for the Cape York determination area is $85M-$120M over 20 years. Settlement below this range is recommended.` - Known false positives: Public native title registers and registered ILUAs; Published Federal Court determinations; Academic articles on native title law ### NDC Detects NDC patterns. - Slug: `global-ndc-code` - URL: https://testpattern.dev/patterns/global-ndc-code - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Data categories: phi, healthcare - Scope: narrow - Pattern: `\b(\d{4}-\d{4}-\d{2}|\d{5}-\d{3}-\d{2}|\d{5}-\d{4}-\d{1})\b` - Corroborative keywords: MRN, medical record number, patient ID, NPI, DEA, medicare, medicaid, insurance ID, member ID, beneficiary, ICD-10, ICD-9, CPT, NDC, SNOMED, HCPCS, diagnosis code, procedure code, drug code, medication (+37 more) - Example matches: `0002-3227-01`, `12345-678-90`, `12345-6789-0` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### NDIS Participant Number Detects NDIS Participant Number patterns. A 9-digit number starting with the prefix 43. - Slug: `au-ndis-number` - URL: https://testpattern.dev/patterns/au-ndis-number - Type: regex - Engine: universal - Confidence: low - Detection quality: Verified - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: pii, government-id - Scope: wide - Risk rating: 7 - Pattern: `\b43\d{7}\b` - Corroborative keywords: NDIS, national disability, disability insurance, participant number, Centrelink, CRN, customer reference number, DVA, Department of Veterans Affairs, pensioner concession, seniors card, healthcare card, DVA card, concession card, DVA gold card, DVA white card, Commonwealth Seniors Health Card, Services Australia - Example matches: `430000001`, `431234567`, `439999999` - Known false positives: Common words and phrases related to ndis participant number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Netherlands Driver's License Number Detects Netherlands driver's license number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `nl-drivers-license` - URL: https://testpattern.dev/patterns/nl-drivers-license - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: nl, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\b\d{10}\b` - Corroborative keywords: driver, licence, license, driving, DL, rijbewijs, ID number, identification, ID card, permit, registration, certificate - Example matches: `1234567890`, `9876543210`, `0012345678` - Known false positives: Generic numeric sequences matching the driver's license format appearing in unrelated contexts. ### Netherlands Passport Number Detects Netherlands passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `nl-passport-number` - URL: https://testpattern.dev/patterns/nl-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: nl, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b[A-Z]{2}[A-Z0-9]{6}\d\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `BW1234563`, `NP9K76543`, `XBABCDE71` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Netherlands Physical Addresses Detects Netherlands Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `nl-physical-addresses` - URL: https://testpattern.dev/patterns/nl-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: nl, eu - Regulations: GDPR - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 straat name, unit 4`, `located at 45 weg example`, `deliver to 78 laan test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### Netherlands Tax Identification Number Detects Netherlands Tax Identification Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Due to the numeric format, corroborative evidence keywords are essential for reliable detection. - Slug: `nl-tax-id` - URL: https://testpattern.dev/patterns/nl-tax-id - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: nl, eu - Regulations: GDPR - Data categories: pii, financial, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b\d{9}\b` - Corroborative keywords: BSN, burgerservicenummer, tax identification, belastingnummer, sofinummer, TIN, tax identification number, tax number, tax return, IRD, NIF, tax ID, inland revenue, taxpayer identification, αριθμός φορολογικού μητρώου, ΑΦΜ, φορολογικός, Abgabenkontonummer, adóazonosító, adószám (+32 more) - Example matches: `123456789`, `987654321`, `112233445` - Known false positives: Generic numeric sequences in non-tax contexts such as reference numbers or account identifiers; Numbers from other identification schemes with similar digit patterns ### Netherlands Value Added Tax Number Detects Netherlands Value Added Tax Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. VAT numbers have country-specific prefixes that aid detection accuracy. - Slug: `nl-vat-number` - URL: https://testpattern.dev/patterns/nl-vat-number - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: nl, eu - Regulations: GDPR - Data categories: financial, business-identifier - Scope: narrow - Risk rating: 5 - Pattern: `\bNL\d{9}B\d{2}\b` - Corroborative keywords: BTW, omzetbelasting, VAT, BTW-nummer, belasting, value added tax, VAT number, Mehrwertsteuer, TVA, Umsatzsteuer, VAT registration, numéro de TVA, Steuernummer, tax number, tax registration, taxe sur la valeur ajoutée, adószám, imposta sul valore aggiunto, intracommunautaire, IVA (+33 more) - Example matches: `NL123456789B01`, `NL987654321B02`, `NL112233445B12` - Known false positives: Other identifier schemes that coincidentally share a similar prefix and digit structure; Test or example VAT numbers used in documentation or training materials ### Network Infrastructure Document Detects network infrastructure documentation revealing topology, VLANs, firewall rules, and attack surface. - Slug: `au-network-infrastructure-document` - URL: https://testpattern.dev/patterns/au-network-infrastructure-document - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: technology, security - Scope: narrow - Risk rating: 8 - Example matches: `Network topology diagram with VLAN configuration and firewall rule details`, `Network architecture document: DMZ, air gap, and access control list`, `Infrastructure diagram showing network boundary and network segmentation` - Known false positives: Social or business network references. ### New Zealand bank account number Detects New Zealand bank account number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Financial account numbers require corroborative evidence for reliable detection due to their generic numeric format. - Slug: `nz-bank-account` - URL: https://testpattern.dev/patterns/nz-bank-account - Type: regex - Engine: universal - Confidence: medium - Detection quality: Mixed - Jurisdictions: nz - Regulations: Privacy Act 2020 (NZ) - Data categories: pii, financial - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{2}-?\d{4}-?\d{7}-?\d{2,3}\b` - Corroborative keywords: bank account, account number, ANZ, ASB, Westpac, BNZ, Kiwibank, savings, bank account number, savings account, ACH, banking, checking, chequing, financial institution, routing, חשבון בנק, מספר חשבון, סניף, 口座番号 (+54 more) - Example matches: `12-3456-7890123-45`, `12-3456-7890123-456`, `123456789012345` - Known false positives: Generic numeric sequences such as reference numbers, invoice numbers, or identifiers from other domains; Phone numbers, postal codes, or other structured numbers with similar digit counts ### New Zealand Driver License Number Detects New Zealand driver license number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `nz-drivers-license` - URL: https://testpattern.dev/patterns/nz-drivers-license - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: nz - Regulations: Privacy Act 2020 (NZ) - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\b[A-Z]{2}\d{6}\b` - Corroborative keywords: driver, licence, license, driving, DL, ID number, identification, ID card, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `AB123456`, `XY987654`, `NZ000123` - Known false positives: Generic numeric sequences matching the driver's license format appearing in unrelated contexts. ### New Zealand Inland Revenue number Detects New Zealand Inland Revenue number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Due to the numeric format, corroborative evidence keywords are essential for reliable detection. - Slug: `nz-inland-revenue` - URL: https://testpattern.dev/patterns/nz-inland-revenue - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: nz - Regulations: Privacy Act 2020 (NZ) - Data categories: pii, financial, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b\d{8,9}\b` - Corroborative keywords: IRD, inland revenue, tax number, IR number, GST number, tax identification, TIN, tax identification number, tax return, NIF, tax ID, taxpayer identification, αριθμός φορολογικού μητρώου, ΑΦΜ, φορολογικός, Abgabenkontonummer, adóazonosító, adószám, belastingnummer, BSN (+29 more) - Example matches: `12345678`, `123456789`, `98765432` - Known false positives: Generic numeric sequences in non-tax contexts such as reference numbers or account identifiers; Numbers from other identification schemes with similar digit patterns ### New Zealand Ministry of Health Number Detects New Zealand Ministry of Health Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Due to the generic numeric format, corroborative evidence keywords are essential for reliable detection. - Slug: `nz-ministry-of-health-number` - URL: https://testpattern.dev/patterns/nz-ministry-of-health-number - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: nz - Regulations: Privacy Act 2020 (NZ) - Data categories: phi, health, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b[A-Z]{3}\d{4}\b` - Corroborative keywords: NHI, national health index, ministry of health, health number, NHI number, health identifier, health index number, health practitioner index, health service, medical record number, patient identifier, patient number, field, column, row, entry, record, value, form, register (+21 more) - Example matches: `ZZZ1234`, `ABC5678`, `XYZ9012` - Known false positives: Generic numeric sequences matching the digit pattern in non-health contexts; Reference numbers or account identifiers from other domains with similar digit counts ### New Zealand Physical Addresses Detects New Zealand Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `nz-physical-addresses` - URL: https://testpattern.dev/patterns/nz-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: nz - Regulations: Privacy Act 2020 (NZ) - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 street name, unit 4`, `located at 45 road example`, `deliver to 78 avenue test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### New Zealand Social Welfare Number Detects New Zealand Social Welfare Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Due to the generic numeric format, corroborative evidence keywords are essential for reliable detection. - Slug: `nz-social-welfare-number` - URL: https://testpattern.dev/patterns/nz-social-welfare-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: nz - Regulations: Privacy Act 2020 (NZ) - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b\d{9}\b` - Corroborative keywords: social welfare, MSD, beneficiary, welfare number, client number, benefit number, benefit recipient, Ministry of Social Development, social security, welfare client, WINZ, Work and Income, field, column, row, entry, record, value, form, register (+21 more) - Example matches: `123456789`, `987654321`, `112233445` - Known false positives: Generic numeric sequences matching the digit pattern in non-health contexts; Reference numbers or account identifiers from other domains with similar digit counts ### NHS Number Detects NHS Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `uk-nhs-number` - URL: https://testpattern.dev/patterns/uk-nhs-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: uk - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b\d{3}\s?\d{3}\s?\d{4}\b` - Corroborative keywords: identifier, number, ID, MRN, medical record number, patient ID, NPI, DEA, medicare, medicaid, insurance ID, member ID, beneficiary - Example matches: `123 456 7890`, `1234567890`, `943 476 5919` - Known false positives: Common words and phrases related to nhs number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In British English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### NIE Detects NIE patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `es-nie` - URL: https://testpattern.dev/patterns/es-nie - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, es - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b[XYZ]\d{7}[A-Z]\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `X1234567A`, `Y7654321B`, `Z0000001C` - Known false positives: Common words and phrases related to nie appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In multiple EU languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### NIR Insee Detects NIR Insee patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `fr-nir-social-security` - URL: https://testpattern.dev/patterns/fr-nir-social-security - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, fr - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b[12]\d{2}(0[1-9]|1[0-2]|[2-4][0-9])\d{2}(?:\d{3}|2[AB])\d{3}\d{2}\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+16 more) - Example matches: `185057512345678`, `293019912345612`, `190017512345634` - Known false positives: Common words and phrases related to nir insee appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In multiple EU languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Non-disclosure agreement repositories Identifies documents containing references to non-disclosure agreement repositories in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-179-non-disclosure-agreement-repositories` - URL: https://testpattern.dev/patterns/au-top500-179-non-disclosure-agreement-repositories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:non[\s-]+disclosure\s+agreement\s+repositories|non[\s-]+disclosure\s+agreement|confidentiality\s+agreement|confidential\s+information|mutual\s+NDA|unilateral\s+NDA|trade\s+secret|proprietary\s+information|disclosing\s+party|receiving\s+party|confidentiality\s+obligation)\b` - Corroborative keywords: non-disclosure agreement repositories, non, disclosure, agreement, repositories, corporate, legal, governance - Example matches: `non-disclosure agreement repositories`, `non-disclosure agreement`, `confidentiality agreement` - Known false positives: Common words and phrases related to non-disclosure agreement repositories appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Non-disclosure agreement repositories Identifies documents containing references to non-disclosure agreement repositories in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-179-non-disclosure-agreement-repositories` - URL: https://testpattern.dev/patterns/global-top500-179-non-disclosure-agreement-repositories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:non[\s-]+disclosure\s+agreement\s+repositories|non[\s-]+disclosure\s+agreement|confidentiality\s+agreement|confidential\s+information|disclosing\s+party|receiving\s+party|mutual\s+NDA|unilateral\s+NDA|trade\s+secret|proprietary\s+information|confidentiality\s+obligation)\b` - Corroborative keywords: non-disclosure agreement repositories, non, disclosure, agreement, repositories, corporate, legal, governance - Example matches: `non-disclosure agreement repositories`, `non-disclosure agreement`, `confidentiality agreement` - Known false positives: Common words and phrases related to non-disclosure agreement repositories appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Nonpublic investor presentations Identifies documents containing references to nonpublic investor presentations in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-195-nonpublic-investor-presentations` - URL: https://testpattern.dev/patterns/au-top500-195-nonpublic-investor-presentations - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:nonpublic\s+investor\s+presentation|investor\s+presentation|investor\s+deck|pitch\s+deck|investor\s+roadshow|institutional\s+investor|private\s+placement|material\s+non[\s-]+public\s+information|inside\s+information)\b` - Corroborative keywords: nonpublic investor presentations, nonpublic, investor, presentations, mergers, acquisitions, strategy - Example matches: `nonpublic investor presentation`, `investor presentation`, `investor deck` - Known false positives: Common words and phrases related to nonpublic investor presentations appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Nonpublic investor presentations Identifies documents containing references to nonpublic investor presentations in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-195-nonpublic-investor-presentations` - URL: https://testpattern.dev/patterns/global-top500-195-nonpublic-investor-presentations - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:nonpublic\s+investor\s+presentation|investor\s+deck|confidential\s+presentation|board\s+presentation|investor\s+roadshow|private\s+placement|offering\s+memorandum|institutional\s+investor|shareholder\s+presentation|capital\s+raise|investor\s+materials)\b` - Corroborative keywords: nonpublic investor presentations, nonpublic, investor, presentations, mergers, acquisitions, strategy - Example matches: `nonpublic investor presentation`, `investor deck`, `confidential presentation` - Known false positives: Common words and phrases related to nonpublic investor presentations appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Norway Physical Addresses Detects Norway Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `no-physical-addresses` - URL: https://testpattern.dev/patterns/no-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: eu, no - Regulations: Personal Data Act (Norway) - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 gate name, unit 4`, `located at 45 vei example`, `deliver to 78 vegen test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### NPI Detects NPI patterns. - Slug: `us-npi` - URL: https://testpattern.dev/patterns/us-npi - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: us - Regulations: CCPA/CPRA, FTC Act s5, HIPAA, State Breach Laws (US) - Data categories: phi, healthcare - Scope: narrow - Pattern: `\b[12]\d{9}\b` - Corroborative keywords: MRN, medical record number, patient ID, NPI, DEA, medicare, medicaid, insurance ID, member ID, beneficiary, ICD-10, ICD-9, CPT, NDC, SNOMED, HCPCS, diagnosis code, procedure code, drug code - Example matches: `1234567890`, `2345678901`, `1111111111` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### NRIC Detects NRIC patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `sg-nric` - URL: https://testpattern.dev/patterns/sg-nric - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: sg - Regulations: PDPA (SG) - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b[STFGM]\d{7}[A-Z]\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+16 more) - Example matches: `S1234567A`, `T1234567B`, `G1234567C` - Known false positives: Common words and phrases related to nric appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (Singapore), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### NSW Property Title Reference (Lot/DP) Detects Australian property title references including Lot/DP, Lot/SP, Title References, and Folio Identifiers. Requires property/title/lot/DP keyword context. - Slug: `au-property-title-reference` - URL: https://testpattern.dev/patterns/au-property-title-reference - Type: regex - Engine: universal - Confidence: low - Detection quality: Partial - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: location, pii - Scope: wide - Risk rating: 7 - Pattern: `(?i)\b(?:Lot|LOT)\s+\d+(?:/|\s+on\s+)(?:DP|SP|PS|LP|CP)\s*\d{3,7}\b` - Corroborative keywords: property, title reference, lot, deposited plan, DP, strata plan, SP, real property, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name (+55 more) - Example matches: `1/12345`, `23/1234567`, `100/99999` - Known false positives: Common words and phrases related to nsw property title reference (lot/dp) appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Nuclear safeguards information Identifies documents containing references to nuclear safeguards information in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-439-nuclear-safeguards-information` - URL: https://testpattern.dev/patterns/au-top500-439-nuclear-safeguards-information - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:nuclear\s+safeguards|safeguards\s+information|nuclear\s+material|nuclear\s+non[\s-]+proliferation|fissile\s+material|nuclear\s+facility|national\s+security|classified\s+nuclear|radioactive\s+material)\b` - Corroborative keywords: nuclear safeguards information, nuclear, safeguards, information, defense, intelligence, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program, public benefit (+1 more) - Example matches: `nuclear safeguards`, `safeguards information`, `nuclear material` - Known false positives: Common words and phrases related to nuclear safeguards information appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Nuclear safeguards information Identifies documents containing references to nuclear safeguards information in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-439-nuclear-safeguards-information` - URL: https://testpattern.dev/patterns/global-top500-439-nuclear-safeguards-information - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:nuclear\s+safeguards|fissile\s+material|enrichment\s+facility|nuclear\s+material|safeguards\s+agreement|nuclear\s+security|radioactive\s+source|nuclear\s+facility|uranium\s+enrichment)\b` - Corroborative keywords: nuclear safeguards information - Example matches: `nuclear safeguards`, `fissile material`, `enrichment facility` - Known false positives: Common words and phrases related to nuclear safeguards information appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Numéro d'identification national Detects Numéro d'identification national patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `lu-national-id-natural` - URL: https://testpattern.dev/patterns/lu-national-id-natural - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, lu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{13}\b` - Corroborative keywords: numéro d'identification, national identification, matricule, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `1975010112345`, `1988121256789`, `1992030345678` - Known false positives: Thirteen-digit numeric sequences are relatively uncommon but may appear in long reference numbers or barcodes.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Numéro d'identification national (entités) Detects Numéro d'identification national (entités) patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `lu-national-id-legal` - URL: https://testpattern.dev/patterns/lu-national-id-legal - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, lu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{11}\b` - Corroborative keywords: numéro d'identification, national identification, legal entity, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `19751234567`, `20001234567`, `19889876543` - Known false positives: Eleven-digit numeric sequences may match phone numbers or other administrative identifiers.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Número de la Seguridad Social Detects Número de la Seguridad Social patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `es-social-security` - URL: https://testpattern.dev/patterns/es-social-security - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, es - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{12}\b` - Corroborative keywords: seguridad social, NSS, social security, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `123456789012`, `987654321098`, `456789012345` - Known false positives: Twelve-digit numeric sequences may match account numbers, transaction IDs, or other administrative references.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### OAuth client secrets Identifies oauth client secrets patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-267-oauth-client-secrets` - URL: https://testpattern.dev/patterns/au-top500-267-oauth-client-secrets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth), NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:oauth\s+client\s+secrets|client\s+secret|client\s+id|authorization\s+code|access\s+token|refresh\s+token|bearer\s+token|grant\s+type|redirect\s+uri|openid\s+connect)\b` - Corroborative keywords: oauth client secrets, oauth, client, secrets, credentials, keys, OFFICIAL, OFFICIAL:Sensitive, PROTECTED, SECRET, TOP SECRET, CABINET-IN-CONFIDENCE, NOFORN, REL TO, ORCON, National Cabinet, AUSTEO, AGAO, Sensitive: Legal, Sensitive: Personal Privacy (+30 more) - Example matches: `oauth client secrets`, `client secret`, `client id` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### OAuth client secrets Identifies oauth client secrets patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-267-oauth-client-secrets` - URL: https://testpattern.dev/patterns/global-top500-267-oauth-client-secrets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:client\s+secret|client\s+id|authorization\s+code|access\s+token|refresh\s+token|bearer\s+token|openid\s+connect|grant\s+type|redirect\s+uri|token\s+endpoint)\b` - Corroborative keywords: oauth client secrets, oauth, client, secrets, credentials, keys, OFFICIAL, OFFICIAL:Sensitive, PROTECTED, SECRET, TOP SECRET, CABINET-IN-CONFIDENCE, NOFORN, REL TO, ORCON, National Cabinet, AUSTEO, AGAO, Sensitive: Legal, Sensitive: Personal Privacy (+58 more) - Example matches: `client secret`, `client id`, `authorization code` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Off-cycle payroll approvals Detects references to off-cycle payroll approvals in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-098-off-cycle-payroll-approvals` - URL: https://testpattern.dev/patterns/au-top500-098-off-cycle-payroll-approvals - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:off[\s-]+cycle\s+payroll|off[\s-]+cycle\s+approval|ad\s+hoc\s+payment|manual\s+pay\s+run|emergency\s+payment|supplementary\s+pay|termination\s+payment|final\s+pay|bonus\s+payment|one[\s-]+off\s+payment|payroll\s+approval|special\s+pay\s+run)\b` - Corroborative keywords: off-cycle payroll approvals, off, cycle, payroll, approvals, tax, operations, employee, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check, WWCC (+57 more) - Example matches: `off-cycle payroll`, `off-cycle approval`, `ad hoc payment` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Off-cycle payroll approvals Detects references to off-cycle payroll approvals in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-098-off-cycle-payroll-approvals` - URL: https://testpattern.dev/patterns/global-top500-098-off-cycle-payroll-approvals - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:off[\s-]+cycle\s+payroll\s+approvals|off[\s-]+cycle\s+payroll|ad\s+hoc\s+payment|special\s+payroll\s+run|emergency\s+payment|supplemental\s+pay|interim\s+payment|bonus\s+payment|correction\s+run|manual\s+payment|off[\s-]+cycle\s+approval)\b` - Corroborative keywords: off-cycle payroll approvals, off, cycle, payroll, approvals, tax, operations, employee, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check, WWCC (+86 more) - Example matches: `off-cycle payroll approvals`, `off-cycle payroll`, `ad hoc payment` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Offensive cyber capability documentation Identifies documents containing references to offensive cyber capability documentation in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-440-offensive-cyber-capability-documentation` - URL: https://testpattern.dev/patterns/au-top500-440-offensive-cyber-capability-documentation - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:offensive\s+cyber|exploit\s+framework|capability\s+development)\b` - Corroborative keywords: offensive cyber capability documentation, offensive, cyber, capability, documentation, defense, intelligence, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+2 more) - Example matches: `Offensive cyber capability documentation`, `offensive cyber capability documentation`, `Offensive cyber capability documentation` - Known false positives: Common words and phrases related to offensive cyber capability documentation appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### One-time recovery codes Identifies one-time recovery codes patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-265-one-time-recovery-codes` - URL: https://testpattern.dev/patterns/au-top500-265-one-time-recovery-codes - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth), NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:one[\s-]+time\s+recovery\s+codes|recovery\s+codes|backup\s+codes|one[\s-]+time\s+password|emergency\s+access|recovery\s+key|account\s+recovery|single[\s-]+use\s+codes|scratch\s+codes|mfa\s+recovery)\b` - Corroborative keywords: one-time recovery codes, one, time, recovery, codes, credentials, keys, secrets - Example matches: `one-time recovery codes`, `recovery codes`, `backup codes` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### One-time recovery codes Identifies one-time recovery codes patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-265-one-time-recovery-codes` - URL: https://testpattern.dev/patterns/global-top500-265-one-time-recovery-codes - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:recovery\s+code|one[\s-]+time\s+code|backup\s+code|emergency\s+code|recovery\s+token|account\s+recovery|mfa\s+recovery|bypass\s+code|scratch\s+code|reset\s+code)\b` - Corroborative keywords: one-time recovery codes, one, time, recovery, codes, credentials, keys, secrets - Example matches: `recovery code`, `one-time code`, `backup code` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Openai Key Detects Openai Key patterns. - Slug: `global-openai-key` - URL: https://testpattern.dev/patterns/global-openai-key - Type: regex - Engine: universal - Confidence: low - Detection quality: Mixed - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `\bsk-[A-Za-z0-9\s]{48,52}\b` - Corroborative keywords: api key, api_key, apikey, access key, secret key, private key, auth token, authorization, access token, bearer, conn str, connection string, connectionstring, cookie, credential, database, host, JWT, oauth, passphrase (+37 more) - Example matches: `sk-ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuv`, `sk-0123456789ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijkl`, `sk-abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUV` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### OpenSSH Private Key Header Detects OpenSSH private key PEM headers in source code, configuration files, and documents. Private keys should never appear in plaintext. - Slug: `global-openssh-private` - URL: https://testpattern.dev/patterns/global-openssh-private - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Pattern: `-----BEGIN OPENSSH PRIVATE KEY-----` - Corroborative keywords: private key, secret key, key file, PEM, certificate, RSA, cryptographic, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie, credential (+42 more) - Example matches: `-----BEGIN OPENSSH PRIVATE KEY-----`, `-----BEGIN OPENSSH PRIVATE KEY----- MIIE...`, `-----BEGIN OPENSSH PRIVATE KEY----- Proc-Type:` - Known false positives: PEM-encoded certificates or public keys that use similar header formats ### Operational runbooks Identifies operational runbooks patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-256-operational-runbooks` - URL: https://testpattern.dev/patterns/au-top500-256-operational-runbooks - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:operational\s+runbook|runbook\s+procedure|incident\s+response|escalation\s+procedure|on[\s-]+call\s+playbook|standard\s+operating\s+procedure|troubleshooting\s+guide|operational\s+procedure|recovery\s+steps|service\s+operations)\b` - Corroborative keywords: operational runbooks, operational, runbooks, software, engineering, architecture - Example matches: `operational runbook`, `runbook procedure`, `incident response` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Operational runbooks Identifies operational runbooks patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-256-operational-runbooks` - URL: https://testpattern.dev/patterns/global-top500-256-operational-runbooks - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:operational\s+runbook|runbook\s+procedure|incident\s+response|escalation\s+procedure|troubleshooting\s+guide|standard\s+operating\s+procedure|on[\s-]+call\s+playbook|recovery\s+procedure|maintenance\s+runbook|operations\s+manual)\b` - Corroborative keywords: operational runbooks, operational, runbooks, software, engineering, architecture - Example matches: `operational runbook`, `runbook procedure`, `incident response` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Oracle Connection String Detects Oracle Connection String patterns. - Slug: `global-oracle-connection-string` - URL: https://testpattern.dev/patterns/global-oracle-connection-string - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Risk rating: 10 - Pattern: `(?:Data Source|HOST|data source|host)\s*=\s*[\s\S]{1,300}?(?:PASSWORD|password)\s*=\s*[^;)\s]+` - Corroborative keywords: api key, api_key, apikey, access key, secret key, private key, auth token, authorization, access token, bearer, conn str, connection string, connectionstring, cookie, credential, database, host, JWT, oauth, passphrase (+37 more) - Example matches: `Data Source=mydb;PASSWORD=secret`, `HOST=oracledb.example.com; PASSWORD=s3cret`, `Data Source=(DESCRIPTION=(ADDRESS=(HOST=myhost)));PASSWORD=pass` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Organised Crime Task Force Intelligence Detects documents containing strategic and tactical intelligence on organised crime networks including network mapping, financial flow analysis, key facilitator identification, and cross-jurisdictional cooperation intelligence. QPS Taskforce Maxima handles OMCG investigations. Disclosure enables criminal organisations to restructure and eliminate suspected informants. - Slug: `organised-crime-task-force-intelligence` - URL: https://testpattern.dev/patterns/organised-crime-task-force-intelligence - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Crime and Corruption Act 2001 (Qld), PPRA 2000 (Qld) - Data categories: law-enforcement, government - Scope: wide - Risk rating: 9 - Pattern: `(?i)\b(organised\s+crime\s+(?:intelligence|assessment|briefing)|criminal\s+network\s+(?:intelligence|analysis|mapping)|OMCG\s+intelligence|outlaw\s+motorcycle\s+gang\s+(?:intelligence|assessment)|Taskforce\s+Maxima|syndicate\s+intelligence|task\s+force\s+intelligence\s+(?:report|briefing))\b` - Corroborative keywords: PROTECTED, Law-Enforcement, RESTRICTED, Taskforce Maxima, QPS, CCC, Crime and Corruption Commission, link analysis, network mapping, key facilitator, financial flow analysis, money laundering, drug trafficking, OMCG, outlaw motorcycle gang, crime family, investigation, enforcement, prosecution, arrest (+52 more) - Example matches: `PROTECTED Law-Enforcement. Taskforce Maxima — Organised Crime Intelligence Assessment. Subject network: Rebels OMCG South-East Queensland chapter. Link analysis identifies 34 associates across three tiers. Key facilitator: Wayne Douglas CAMPBELL controls methamphetamine distribution through Gold Coast. Financial flow analysis reveals laundering through three identified businesses. Network mapping at Annexure C.`, `RESTRICTED. Organised crime task force intelligence briefing — Operation RESOLVE. Criminal network intelligence update: Italian crime family network in Brisbane identified. Syndicate intelligence indicates control of construction industry extortion and illegal gambling. Cross-jurisdictional cooperation with AFP and NSW Crime Commission for financial flow tracking.`, `OMCG intelligence report. Mongols MC Queensland expansion assessment. Task force intelligence confirms establishment of three new chapters in regional Queensland. Key facilitator identified as travelling between chapters coordinating drug supply. Link analysis with Rebels and Bandidos networks shows conflict escalation risk.` - Known false positives: Published ACIC and state crime commission reports on organised crime trends; Academic research on organised crime using public sources; True crime books and documentaries based on concluded cases ### Osobna iskaznica Detects Osobna iskaznica patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `hr-identity-card` - URL: https://testpattern.dev/patterns/hr-identity-card - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, hr - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{9}\b` - Corroborative keywords: osobna iskaznica, identity card, OIB, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `123456789`, `987654321`, `456789012` - Known false positives: Nine-digit numeric sequences are common in phone numbers, bank accounts, and other administrative references.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Osobni identifikacijski broj (OIB) Detects Osobni identifikacijski broj (OIB) patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `hr-personal-id-oib` - URL: https://testpattern.dev/patterns/hr-personal-id-oib - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, hr - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 5 - Pattern: `\b\d{11}\b` - Corroborative keywords: OIB, osobni identifikacijski broj, personal identification, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `12345678901`, `98765432109`, `45678901234` - Known false positives: Eleven-digit numeric sequences may match phone numbers or other administrative identifiers.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### OT cyber incident reports Identifies documents containing references to ot cyber incident reports in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-456-ot-cyber-incident-reports` - URL: https://testpattern.dev/patterns/au-top500-456-ot-cyber-incident-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:ot\s+cyber\s+incident\s+reports|OT\s+cyber\s+incident|ICS\s+incident|industrial\s+cyber|incident\s+report|threat\s+actor|indicators\s+of\s+compromise|critical\s+infrastructure|incident\s+response)\b` - Corroborative keywords: ot cyber incident reports, cyber, incident, reports, critical, infrastructure, systems, SCADA, PLC, DCS, HMI, Modbus, Modbus TCP, Modbus RTU, DNP3, OPC-UA, OPC Classic, IEC 61850, IEC 60870, IEC 60870-5-104 (+38 more) - Example matches: `ot cyber incident reports`, `ot cyber incident`, `ICS incident` - Known false positives: Common words and phrases related to ot cyber incident reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### OT cyber incident reports Identifies documents containing references to ot cyber incident reports in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-456-ot-cyber-incident-reports` - URL: https://testpattern.dev/patterns/global-top500-456-ot-cyber-incident-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:OT\s+cyber\s+incident|ICS\s+incident|industrial\s+cyber|SCADA\s+compromise|incident\s+report|containment\s+measures|attack\s+timeline|operational\s+technology|industrial\s+control\s+system|critical\s+infrastructure|threat\s+actor|indicators\s+of\s+compromise)\b` - Corroborative keywords: ot cyber incident reports, cyber, incident, reports, critical, infrastructure, systems, SCADA, PLC, DCS, HMI, Modbus, Modbus TCP, Modbus RTU, DNP3, OPC-UA, OPC Classic, IEC 61850, IEC 60870, IEC 60870-5-104 (+38 more) - Example matches: `OT cyber incident`, `ics incident`, `industrial cyber` - Known false positives: Common words and phrases related to ot cyber incident reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### OT Security Assessment Detects operational technology (OT) security assessment reports for SCADA, ICS, and industrial control systems. - Slug: `au-ot-security-assessment` - URL: https://testpattern.dev/patterns/au-ot-security-assessment - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: Criminal Code Act 1995 (Cth), SOCI Act 2018 (Cth) - Data categories: security, infrastructure - Scope: narrow - Risk rating: 10 - Example matches: `OT security assessment: SCADA security vulnerability findings`, `ICS security audit with industrial control security risk assessment`, `Control system vulnerability assessment and penetration test results` - Known false positives: Generic security assessment in non-OT contexts. ### Overpayment recovery records Detects references to overpayment recovery records in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-097-overpayment-recovery-records` - URL: https://testpattern.dev/patterns/au-top500-097-overpayment-recovery-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:overpayment\s+recovery\s+records)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: overpayment recovery records, overpayment, recovery, records, payroll, tax, operations, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+31 more) - Example matches: `Overpayment recovery records`, `overpayment recovery records`, `Overpayment recovery records` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Overpayment recovery records Detects references to overpayment recovery records in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-097-overpayment-recovery-records` - URL: https://testpattern.dev/patterns/global-top500-097-overpayment-recovery-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:overpayment\s+recovery\s+records)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: overpayment recovery records, overpayment, recovery, records, payroll, tax, operations, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+31 more) - Example matches: `Overpayment recovery records`, `overpayment recovery records`, `Overpayment recovery records` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### PAN Detects PAN patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `in-pan` - URL: https://testpattern.dev/patterns/in-pan - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: in - Regulations: DPDPA, IT Act 2000 (India) - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b[A-Z]{5}\d{4}[A-Z]\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate, transaction, transfer, payment, deposit, withdrawal, debit, credit, field, column, row (+23 more) - Example matches: `ABCDE1234F`, `ZZZZZ9999Z`, `AADCB2230E` - Known false positives: Common words and phrases related to pan appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Hindi and English (India), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Parliamentary Document Detects parliamentary documents including QTBs, Senate Estimates briefs, and parliamentary correspondence. - Slug: `au-parliamentary-document` - URL: https://testpattern.dev/patterns/au-parliamentary-document - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: IPA 2009 (Qld), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: government - Scope: narrow - Risk rating: 8 - Example matches: `QTB: likely question for Senate Estimates committee hearing`, `Parliamentary question with talking points and suggested response`, `Brief for parliamentary correspondence to House of Representatives` - Known false positives: References to parliament or Senate in tourism or general contexts. ### Passport Detects Passport patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `uk-passport-number` - URL: https://testpattern.dev/patterns/uk-passport-number - Type: regex - Engine: universal - Confidence: low - Detection quality: Partial - Jurisdictions: uk - Data categories: pii, government-id - Scope: wide - Risk rating: 8 - Pattern: `\b\d{9}\b` - Corroborative keywords: passport, passport number, travel document, australian passport, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `123456789`, `987654321`, `501234567` - Known false positives: Common words and phrases related to passport appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In British English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Passport application packets Identifies documents containing references to passport application packets in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-391-passport-application-packets` - URL: https://testpattern.dev/patterns/au-top500-391-passport-application-packets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:passport\s+application\s+packets|travel\s+document|identity\s+document|photo\s+identification)\b` - Corroborative keywords: passport application packets, passport, application, packets, government, citizen, services, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `passport application packets`, `travel document`, `identity document` - Known false positives: Common words and phrases related to passport application packets appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Passport application packets Identifies documents containing references to passport application packets in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-391-passport-application-packets` - URL: https://testpattern.dev/patterns/global-top500-391-passport-application-packets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:passport\s+application\s+packets|passport\s+renewal|passport\s+number|travel\s+document|identity\s+verification|passport\s+office|citizenship\s+evidence|birth\s+certificate|passport\s+photograph|consular\s+services|passport\s+issuance|nationality\s+verification)\b` - Corroborative keywords: passport application packets, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract, export, spreadsheet (+17 more) - Example matches: `passport application packets`, `passport renewal`, `passport number` - Known false positives: Common words and phrases related to passport application packets appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Password hash databases Identifies password hash databases patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-262-password-hash-databases` - URL: https://testpattern.dev/patterns/au-top500-262-password-hash-databases - Type: regex - Engine: boost_regex - Confidence: low - Detection quality: Mixed - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth), NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `\bpassword\s+hash\s+databases\b` - Corroborative keywords: password hash databases, password, hash, databases, credentials, keys, secrets, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie, credential (+15 more) - Example matches: `Password hash databases`, `password hash databases`, `Password hash databases` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Password hash databases Identifies password hash databases patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-262-password-hash-databases` - URL: https://testpattern.dev/patterns/global-top500-262-password-hash-databases - Type: regex - Engine: boost_regex - Confidence: low - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `\bpassword\s+hash\s+databases\b` - Corroborative keywords: password hash databases, password, hash, databases, credentials, keys, secrets, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie, credential (+43 more) - Example matches: `Password hash databases`, `password hash databases`, `Password hash databases` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Password reset tokens Detects password reset tokens and recovery URLs in documents, emails, and logs. Reset tokens are high-risk credentials — a leaked token enables account takeover without knowing the current password. No Microsoft built-in SIT exists for this pattern. - Slug: `global-top500-263-password-reset-tokens` - URL: https://testpattern.dev/patterns/global-top500-263-password-reset-tokens - Type: regex - Engine: boost_regex - Confidence: medium - Jurisdictions: global - Regulations: GDPR, CCPA, HIPAA, PCI-DSS - Data categories: credentials, security - Scope: wide - Risk rating: 9 - Pattern: `(?:(?:reset|recover|forgot|confirm)[\s\-_]*(?:password|account|identity|email)[\s\S]{0,80}(?:token|code|key|link)[\s=:]\s*[A-Za-z0-9\-_]{20,}|(?:token|code|key)[\s=:]\s*[A-Fa-f0-9]{32,}|[?&](?:token|reset_token|recovery_token|confirmation_token)=[A-Za-z0-9\-_\.]{20,})` - Corroborative keywords: password reset, reset token, recovery token, forgot password, reset link, recovery link, confirmation token, reset your password, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie (+17 more) - Example matches: `Reset your password using this link: https://example.com/reset?token=a1b2c3d4e5f6a1b2c3d4e5f6a1b2c3d4`, `reset password token: 4f8a2b1c9d3e7f0a4b8c2d1e9f3a7b0c`, `forgot password recovery code=eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9.abc123` - Known false positives: Session tokens and API tokens in application logs that are not password reset tokens.; OAuth authorization codes and CSRF tokens that share similar format.; Automated email templates containing password reset URL patterns without actual token values. ### Patch exception records Identifies patch exception records patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-287-patch-exception-records` - URL: https://testpattern.dev/patterns/au-top500-287-patch-exception-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:patch\s+exception\s+records|patch\s+exception|risk\s+acceptance|patch\s+deferral|compensating\s+control|vulnerability\s+exception|risk\s+register|exception\s+approval|change\s+management|patch\s+compliance)\b` - Corroborative keywords: patch exception records, patch, exception, records, security, operations, threat, data - Example matches: `patch exception records`, `patch exception`, `risk acceptance` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Patch exception records Identifies patch exception records patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-287-patch-exception-records` - URL: https://testpattern.dev/patterns/global-top500-287-patch-exception-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:patch\s+exception|risk\s+acceptance|compensating\s+control|exception\s+request|patch\s+deferral|vulnerability\s+exception|risk\s+register|exception\s+expiry|asset\s+owner|remediation\s+plan|change\s+advisory)\b` - Corroborative keywords: patch exception records, patch, exception, records, security, operations, threat, data - Example matches: `patch exception`, `risk acceptance`, `compensating control` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Patent draft claims Identifies documents containing references to patent draft claims in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-205-patent-draft-claims` - URL: https://testpattern.dev/patterns/au-top500-205-patent-draft-claims - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:patent\s+draft|draft\s+claims|patent\s+claims|patent\s+application|provisional\s+patent|patent\s+specification|prior\s+art|patent\s+filing|invention\s+disclosure|claims\s+language|patent\s+prosecution|IP\s+Australia)\b` - Corroborative keywords: patent draft claims, patent, draft, claims, intellectual, property, trade, secrets - Example matches: `patent draft`, `draft claims`, `patent claims` - Known false positives: Common words and phrases related to patent draft claims appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Patent draft claims Identifies documents containing references to patent draft claims in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-205-patent-draft-claims` - URL: https://testpattern.dev/patterns/global-top500-205-patent-draft-claims - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:patent\s+claim|patent\s+draft|patent\s+application|prior\s+art|invention\s+disclosure|patent\s+specification|claims\s+language|patent\s+prosecution|provisional\s+application|patent\s+filing|patent\s+pending)\b` - Corroborative keywords: patent draft claims, patent, draft, claims, intellectual, property, trade, secrets - Example matches: `patent claim`, `patent draft`, `patent application` - Known false positives: Common words and phrases related to patent draft claims appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Patent Prosecution Strategy Pre-Filing Detects legal strategy for patent prosecution before filing, including prior art assessments, claim drafting strategy, and freedom-to-operate opinions. Disclosure destroys patent novelty or reveals prosecution strategy to competitors. Note: trainable classifier recommended for production deployment. - Slug: `patent-prosecution-strategy-pre-filing` - URL: https://testpattern.dev/patterns/patent-prosecution-strategy-pre-filing - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: global - Regulations: Patents Act 1990 (Cth) - Data categories: legal - Scope: wide - Risk rating: 7 - Pattern: `(?i)\b(?:patent\s+(?:prosecution|application|strategy)|patent)\b` - Corroborative keywords: pre-filing, draft claims, prior art, freedom to operate, FTO, novelty, privilege, PROTECTED, CONFIDENTIAL, claim drafting, patentability, inventive step, provisional application, legal, counsel, litigation, proceedings, court, jurisdiction, attorney (+13 more) - Example matches: `CONFIDENTIAL — LEGAL PROFESSIONAL PRIVILEGE Patent Prosecution Strategy — Pre-Filing Invention: Novel water purification membrane (UQ Research Collaboration) Prior Art Assessment: Three potentially invalidating references identified Draft claims strategy: Narrow independent claim 1 to avoid Smith et al. (2023) prior art.`, `This privileged patent strategy addresses the freedom to operate analysis for the new diagnostic device. The FTO opinion identifies two blocking patents requiring design-around strategy before patent application filing.`, `PROTECTED Pre-Filing Patent Assessment Client: Queensland Health Innovation Unit Subject: Novel rapid diagnostic test — COVID variant detection Patentability assessment: Novelty confirmed subject to prior art search. Draft claims attached for review before provisional application lodgement.` - Known false positives: Published granted patents and patent specifications; Published PCT or international patent applications; Academic materials on patent prosecution ### Patent/IP Reference Detects references to patents, intellectual property registrations, and IP Australia filings. - Slug: `au-patent-ip-reference` - URL: https://testpattern.dev/patterns/au-patent-ip-reference - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), Privacy Act 1988 (Cth) - Data categories: intellectual-property - Scope: narrow - Risk rating: 8 - Example matches: `Patent application filed with IP Australia: patent pending`, `Patent claim analysis for prior art review and patentability assessment`, `Intellectual property portfolio including trademark and design registration` - Known false positives: Use of patent as adjective in non-IP contexts. ### Patentability assessments Identifies documents containing references to patentability assessments in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-206-patentability-assessments` - URL: https://testpattern.dev/patterns/au-top500-206-patentability-assessments - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:patentability\s+assessment|patentability\s+opinion|freedom\s+to\s+operate|FTO\s+analysis|prior\s+art\s+search|novelty\s+assessment|inventive\s+step|patent\s+landscape|patent\s+validity|infringement\s+analysis|IP\s+assessment|patent\s+strategy)\b` - Corroborative keywords: patentability assessments, patentability, assessments, intellectual, property, trade, secrets - Example matches: `patentability assessment`, `patentability opinion`, `freedom to operate` - Known false positives: Common words and phrases related to patentability assessments appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Patentability assessments Identifies documents containing references to patentability assessments in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-206-patentability-assessments` - URL: https://testpattern.dev/patterns/global-top500-206-patentability-assessments - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:patentability\s+assessment|patentability\s+opinion|freedom\s+to\s+operate|prior\s+art\s+search|novelty\s+assessment|patent\s+landscape|infringement\s+analysis|patent\s+validity|patent\s+review|inventive\s+step)\b` - Corroborative keywords: patentability assessments, patentability, assessments, intellectual, property, trade, secrets - Example matches: `patentability assessment`, `patentability opinion`, `freedom to operate` - Known false positives: Common words and phrases related to patentability assessments appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Pathology reports Identifies pathology reports references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `au-top500-327-pathology-reports` - URL: https://testpattern.dev/patterns/au-top500-327-pathology-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:pathology\s+report|tissue\s+sample|laboratory\s+report)\b` - Corroborative keywords: pathology reports, pathology, reports, health, biomedical, information, My Health Record, pathology result, diagnostic imaging, discharge summary, prescription record, immunisation history, immunization history, organ donor, clinical trial, medical history, allergy, blood test, X-ray, MRI (+3 more) - Example matches: `pathology report`, `tissue sample`, `laboratory report` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### Pathology reports Identifies pathology reports references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `global-top500-327-pathology-reports` - URL: https://testpattern.dev/patterns/global-top500-327-pathology-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:pathology\s+report|biopsy\s+report|tissue\s+sample|microscopic\s+examination|gross\s+description|surgical\s+pathology)\b` - Corroborative keywords: pathology reports, pathology, reports, health, biomedical, information, My Health Record, pathology result, diagnostic imaging, discharge summary, prescription record, immunisation history, immunization history, organ donor, clinical trial, medical history, allergy, blood test, X-ray, MRI (+32 more) - Example matches: `pathology report`, `biopsy report`, `tissue sample` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### Payment Card PAN Identifies payment card Primary Account Numbers (PANs) for Visa, Mastercard (including 2-series BINs), American Express, and Discover. Uses Func_credit_card Luhn validator with AllDigitsSameFilter. - Slug: `global-payment-card-pan` - URL: https://testpattern.dev/patterns/global-payment-card-pan - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Regulations: CCPA/CPRA, GDPR - Data categories: pii, financial - Scope: narrow - Risk rating: 9 - Pattern: `\b(?:4\d{3}|5[1-5]\d{2}|2[2-7]\d{2}|3[47]\d{2}|6(?:011|5\d{2}))\d{4}\d{4}\d{1,4}\b` - Corroborative keywords: payment card, card number, Visa, Mastercard, American Express, Amex, Discover, PAN, PCI, credit card, card no, CC, visa, mastercard, amex, american express, discover, jcb, diners club - Example matches: `4111111111111111`, `5500000000000004`, `2221000000000000` - Known false positives: Generic numeric sequences resembling card numbers.; Test card numbers in documentation or code. ### Payment card primary account numbers Detects references to payment card primary account numbers in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-105-payment-card-primary-account-numbers` - URL: https://testpattern.dev/patterns/au-top500-105-payment-card-primary-account-numbers - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:payment\s+card\s+primary\s+account\s+numbers)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: payment card primary account numbers, payment, card, primary, account, numbers, financial, accounts, payments, credit card, card number, card no, CC, visa, mastercard, amex, american express, discover, jcb, diners club (+34 more) - Example matches: `Payment card primary account numbers`, `payment card primary account numbers`, `Payment card primary account numbers` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Payment card primary account numbers Detects references to payment card primary account numbers in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-105-payment-card-primary-account-numbers` - URL: https://testpattern.dev/patterns/global-top500-105-payment-card-primary-account-numbers - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR, PCI-DSS - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:payment\s+card\s+primary\s+account\s+numbers)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: payment card primary account numbers, payment, card, primary, account, numbers, financial, accounts, payments, credit card, card number, card no, CC, visa, mastercard, amex, american express, discover, jcb, diners club (+34 more) - Example matches: `Payment card primary account numbers`, `payment card primary account numbers`, `Payment card primary account numbers` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Payment fraud investigation files Detects references to payment fraud investigation files in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-120-payment-fraud-investigation-files` - URL: https://testpattern.dev/patterns/au-top500-120-payment-fraud-investigation-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:payment\s+fraud|fraud\s+investigation|suspicious\s+matter|fraud\s+case|fraudulent\s+transaction|investigation\s+file|chargeback\s+fraud|identity\s+fraud|fraud\s+report|suspicious\s+activity)\b` - Corroborative keywords: payment fraud investigation files, payment, fraud, investigation, files, financial, accounts, payments, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+2 more) - Example matches: `payment fraud`, `fraud investigation`, `suspicious matter` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Payment fraud investigation files Detects references to payment fraud investigation files in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-120-payment-fraud-investigation-files` - URL: https://testpattern.dev/patterns/global-top500-120-payment-fraud-investigation-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR, PCI-DSS - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:payment\s+fraud|fraud\s+investigation|suspicious\s+transaction|unauthorized\s+transaction|fraudulent\s+activity|dispute\s+case|fraud\s+alert|suspicious\s+activity\s+report|fraud\s+case|investigation\s+file)\b` - Corroborative keywords: payment fraud investigation files, payment, fraud, investigation, files, financial, accounts, payments, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+31 more) - Example matches: `payment fraud`, `fraud investigation`, `suspicious transaction` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Payment/Remittance Advice Detects payment advices, remittance notices, and electronic funds transfer confirmations. - Slug: `au-payment-remittance-advice` - URL: https://testpattern.dev/patterns/au-payment-remittance-advice - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: narrow - Risk rating: 7 - Example matches: `Remittance advice: amount paid $5,432.10 via EFT`, `Payment advice for electronic funds transfer dated 15/01/2026`, `Remittance notice: bank transfer confirmed, amount received $10,000` - Known false positives: Generic payment or transfer language in non-remittance contexts. ### Payroll bank account details Detects references to payroll bank account details in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-081-payroll-bank-account-details` - URL: https://testpattern.dev/patterns/au-top500-081-payroll-bank-account-details - Type: regex - Engine: boost_regex - Confidence: low - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `\bpayroll\s+bank\s+account\s+details\b` - Corroborative keywords: payroll bank account details, payroll, bank, account, details, tax, operations, bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC, employee, benefits, termination, hire date (+66 more) - Example matches: `Payroll bank account details`, `payroll bank account details`, `Payroll bank account details` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Payroll bank account details Detects references to payroll bank account details in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-081-payroll-bank-account-details` - URL: https://testpattern.dev/patterns/global-top500-081-payroll-bank-account-details - Type: regex - Engine: boost_regex - Confidence: low - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `\bpayroll\s+bank\s+account\s+details\b` - Corroborative keywords: payroll bank account details, payroll, bank, account, details, tax, operations, bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC, employee, benefits, termination, hire date (+94 more) - Example matches: `Payroll bank account details`, `payroll bank account details`, `Payroll bank account details` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Payroll deduction records Detects references to payroll deduction records in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-086-payroll-deduction-records` - URL: https://testpattern.dev/patterns/au-top500-086-payroll-deduction-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:payroll\s+deduction\s+records|salary\s+sacrifice|superannuation\s+contribution|union\s+fees|health\s+insurance|pre[\s-]+tax\s+deduction|post[\s-]+tax\s+deduction|HECS\s+repayment|child\s+support\s+deduction|payroll\s+withholding|net\s+pay)\b` - Corroborative keywords: payroll deduction records, payroll, deduction, records, tax, operations, employee, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check, WWCC, Blue Card (+56 more) - Example matches: `payroll deduction records`, `salary sacrifice`, `superannuation contribution` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Payroll deduction records Detects references to payroll deduction records in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-086-payroll-deduction-records` - URL: https://testpattern.dev/patterns/global-top500-086-payroll-deduction-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:payroll\s+deduction\s+records|payroll\s+deduction|salary\s+sacrifice|pre[\s-]+tax\s+deduction|post[\s-]+tax\s+deduction|voluntary\s+deduction|insurance\s+premium|union\s+dues|superannuation\s+contribution|benefit\s+deduction|net\s+pay)\b` - Corroborative keywords: payroll deduction records, payroll, deduction, records, tax, operations, employee, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check, WWCC, Blue Card (+85 more) - Example matches: `payroll deduction records`, `payroll deduction`, `salary sacrifice` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Payroll exception reports Detects references to payroll exception reports in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-095-payroll-exception-reports` - URL: https://testpattern.dev/patterns/au-top500-095-payroll-exception-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:payroll\s+exception\s+reports|exception\s+report|payroll\s+error|variance\s+report|payroll\s+audit|reconciliation\s+exception|pay\s+run\s+error|payroll\s+correction)\b` - Corroborative keywords: payroll exception reports, payroll, exception, reports, tax, operations, employee, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check, WWCC, Blue Card (+56 more) - Example matches: `payroll exception reports`, `exception report`, `payroll error` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Payroll exception reports Detects references to payroll exception reports in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-095-payroll-exception-reports` - URL: https://testpattern.dev/patterns/global-top500-095-payroll-exception-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:payroll\s+exception\s+reports|payroll\s+exception|exception\s+report|variance\s+report|payroll\s+discrepancy|error\s+report|reconciliation\s+exception|pay\s+variance|payroll\s+audit)\b` - Corroborative keywords: payroll exception reports, payroll, exception, reports, tax, operations, employee, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check, WWCC, Blue Card (+85 more) - Example matches: `payroll exception reports`, `payroll exception`, `exception report` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Payroll journal entries Detects references to payroll journal entries in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-093-payroll-journal-entries` - URL: https://testpattern.dev/patterns/au-top500-093-payroll-journal-entries - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:payroll\s+journal\s+entries|journal\s+entry|general\s+ledger|payroll\s+accrual|wages\s+expense|PAYG\s+liability|superannuation\s+payable|payroll\s+clearing|chart\s+of\s+accounts|payroll\s+reconciliation)\b` - Corroborative keywords: payroll journal entries, payroll, journal, entries, tax, operations, employee, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check, WWCC, Blue Card (+56 more) - Example matches: `payroll journal entries`, `journal entry`, `general ledger` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Payroll journal entries Detects references to payroll journal entries in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-093-payroll-journal-entries` - URL: https://testpattern.dev/patterns/global-top500-093-payroll-journal-entries - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:payroll\s+journal\s+entries|payroll\s+journal|journal\s+entry|general\s+ledger|payroll\s+posting|debit\s+credit|account\s+code|cost\s+centre|payroll\s+accrual|wages\s+expense|payroll\s+liability)\b` - Corroborative keywords: payroll journal entries, payroll, journal, entries, tax, operations, employee, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check, WWCC, Blue Card (+85 more) - Example matches: `payroll journal entries`, `payroll journal`, `journal entry` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Payroll Master File with Tax File Numbers Detects bulk payroll data files containing employee names, Tax File Numbers (TFNs), bank account details, and salary information. Disclosure enables mass identity theft, fraudulent tax returns, and targeted social engineering. - Slug: `payroll-master-file-with-tax-file-numbers` - URL: https://testpattern.dev/patterns/payroll-master-file-with-tax-file-numbers - Type: regex - Engine: universal - Confidence: high - Detection quality: Error - Jurisdictions: au - Regulations: Criminal Code 1899 (Qld), Privacy Act 1988 (Cth), Tax Admin Act 1953 (Cth) - Data categories: financial, government - Scope: wide - Risk rating: 10 - Pattern: `\b\d{8,9}\b` - Corroborative keywords: payroll, TFN, tax file number, salary, remuneration, bank account, direct deposit, master file, payroll extract, STP, Single Touch Payroll, BSB, gross pay, net pay, PAYG, financial, fiscal, monetary, accounting, treasury (+25 more) - Example matches: `Payroll Master File Extract — Department of Health. Employee: Smith, John. TFN: 123456789. BSB: 064-000. Account: 12345678. Gross Salary: $95,420. PAYG: $24,108. Employee: Jones, Mary. TFN: 987654321. BSB: 084-004. Account: 87654321. Gross Salary: $102,350.`, `PROTECTED — STP Payroll Data Export. Single Touch Payroll extract for pay period ending 15 Feb 2026. Contains 2,847 employee records with tax file numbers and bank account details for direct deposit processing.` - Known false positives: HR onboarding forms requesting a single employee's TFN; Aggregate payroll reports with summary statistics but no individual records ### Payroll system access logs Detects references to payroll system access logs in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-100-payroll-system-access-logs` - URL: https://testpattern.dev/patterns/au-top500-100-payroll-system-access-logs - Type: regex - Engine: boost_regex - Confidence: low - Detection quality: Partial - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `\bpayroll\s+system\s+access\s+logs\b` - Corroborative keywords: payroll system access logs, payroll, system, access, logs, tax, operations, employee, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check, WWCC (+57 more) - Example matches: `Payroll system access logs`, `payroll system access logs`, `Payroll system access logs` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Payroll system access logs Detects references to payroll system access logs in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-100-payroll-system-access-logs` - URL: https://testpattern.dev/patterns/global-top500-100-payroll-system-access-logs - Type: regex - Engine: boost_regex - Confidence: low - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `\bpayroll\s+system\s+access\s+logs\b` - Corroborative keywords: payroll system access logs, payroll, system, access, logs, tax, operations, employee, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check, WWCC (+86 more) - Example matches: `Payroll system access logs`, `payroll system access logs`, `Payroll system access logs` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### PBS Prescriber Number Detects PBS Prescriber Number patterns. A 7-digit number with check digit validation using weights [0,5,8,4,2,1], mod 11. - Slug: `au-pbs-prescriber-number` - URL: https://testpattern.dev/patterns/au-pbs-prescriber-number - Type: regex - Engine: universal - Confidence: low - Detection quality: Verified - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: pii, government-id - Scope: wide - Risk rating: 8 - Pattern: `\b\d{7}\b` - Corroborative keywords: prescriber, PBS, Pharmaceutical Benefits, IHI, Individual Healthcare Identifier, healthcare identifier, HPI, HPI-I, HPI-O, provider identifier, AHPRA, registration number, prescriber number, PBS prescriber, pharmaceutical benefits, Medicare provider, provider number, medication, drug name, drug strength (+6 more) - Example matches: `1234567`, `0000001`, `9876543` - Known false positives: Common words and phrases related to pbs prescriber number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Penetration testing reports Identifies penetration testing reports patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-252-penetration-testing-reports` - URL: https://testpattern.dev/patterns/au-top500-252-penetration-testing-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: au - Regulations: Criminal Code Act 1995 (Cth), SOCI Act 2018 (Cth) - Data categories: credentials, security - Scope: wide - Risk rating: 10 - Pattern: `(?i)\b(?:penetration\s+test(?:ing)?\s+(?:report|findings?|assessment)|pen\s*test\s+(?:report|results)|offensive\s+security\s+(?:assessment|report)|external\s+(?:penetration|security)\s+test)\b` - Corroborative keywords: penetration testing reports, penetration, testing, reports, software, engineering, architecture - Example matches: `Penetration testing reports`, `penetration testing reports`, `Penetration testing reports` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Penetration testing reports Identifies penetration testing reports patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-252-penetration-testing-reports` - URL: https://testpattern.dev/patterns/global-top500-252-penetration-testing-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:penetration\s+testing|pentest\s+report|vulnerability\s+finding|security\s+assessment|attack\s+vector|risk\s+rating|scope\s+of\s+engagement|executive\s+summary)\b` - Corroborative keywords: penetration testing reports, penetration, testing, reports, software, engineering, architecture - Example matches: `penetration testing`, `pentest report`, `vulnerability finding` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Pension account identifiers Detects references to pension account identifiers in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-089-pension-account-identifiers` - URL: https://testpattern.dev/patterns/au-top500-089-pension-account-identifiers - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:pension\s+account\s+identifiers)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: pension account identifiers, pension, account, identifiers, payroll, tax, operations, bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC, employee, benefits, termination, hire date (+94 more) - Example matches: `Pension account identifiers`, `pension account identifiers`, `Pension account identifiers` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Pension account identifiers Detects references to pension account identifiers in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-089-pension-account-identifiers` - URL: https://testpattern.dev/patterns/global-top500-089-pension-account-identifiers - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:pension\s+account\s+identifiers)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: pension account identifiers, pension, account, identifiers, payroll, tax, operations, bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC, employee, benefits, termination, hire date (+94 more) - Example matches: `Pension account identifiers`, `pension account identifiers`, `Pension account identifiers` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Pension entitlement records Identifies documents containing references to pension entitlement records in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-388-pension-entitlement-records` - URL: https://testpattern.dev/patterns/au-top500-388-pension-entitlement-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:pension\s+entitlement\s+records|age\s+pension|Services\s+Australia|income\s+test|assets\s+test|concession\s+card)\b` - Corroborative keywords: pension entitlement records, pension, entitlement, records, government, citizen, services, bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC, employee, payroll, benefits, termination (+96 more) - Example matches: `pension entitlement records`, `age pension`, `Services Australia` - Known false positives: Common words and phrases related to pension entitlement records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Pension entitlement records Identifies documents containing references to pension entitlement records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-388-pension-entitlement-records` - URL: https://testpattern.dev/patterns/global-top500-388-pension-entitlement-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:pension\s+entitlement\s+records|pension\s+benefit|retirement\s+benefit|pension\s+calculation|annuity\s+payment|pension\s+fund|retirement\s+income|pension\s+eligibility|pension\s+statement|benefit\s+accrual|pension\s+scheme)\b` - Corroborative keywords: pension entitlement records, bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC, employee, payroll, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9 (+90 more) - Example matches: `pension entitlement records`, `pension benefit`, `retirement benefit` - Known false positives: Common words and phrases related to pension entitlement records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Performance review reports Identifies documents containing references to performance review reports in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-062-performance-review-reports` - URL: https://testpattern.dev/patterns/au-top500-062-performance-review-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:performance\s+review|performance\s+appraisal|annual\s+review|performance\s+rating|KPI\s+assessment|performance\s+outcome|reviewer\s+comments|performance\s+cycle|development\s+goals|performance\s+improvement|employee\s+rating|performance\s+feedback)\b` - Corroborative keywords: performance review reports, performance, review, reports, employment, workforce, records, employee, payroll, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check (+87 more) - Example matches: `performance review`, `performance appraisal`, `annual review` - Known false positives: Common words and phrases related to performance review reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Performance review reports Identifies documents containing references to performance review reports in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-062-performance-review-reports` - URL: https://testpattern.dev/patterns/global-top500-062-performance-review-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:performance\s+review|annual\s+review|performance\s+rating|performance\s+assessment|employee\s+evaluation|review\s+cycle|performance\s+score|goal\s+achievement|performance\s+improvement|mid[\s-]+year\s+review)\b` - Corroborative keywords: performance review reports, performance, review, reports, employment, workforce, records, employee, payroll, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check (+87 more) - Example matches: `performance review`, `annual review`, `performance rating` - Known false positives: Common words and phrases related to performance review reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Personal email address Identifies documents containing references to personal email address in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-044-personal-email-address` - URL: https://testpattern.dev/patterns/au-top500-044-personal-email-address - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:personal\s+email\s+address|personal\s+email|private\s+email|email\s+contact|email\s+address|correspondence\s+email|contact\s+email)\b` - Corroborative keywords: personal email address, personal, email, address, contact, location, data, age, birthday, citizenship, city, date of birth, DOB, ethnicity, fax, first name, full name, gender, given name, last name (+58 more) - Example matches: `personal email address`, `personal email`, `private email` - Known false positives: Common words and phrases related to personal email address appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Personal email address Identifies documents containing references to personal email address in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-044-personal-email-address` - URL: https://testpattern.dev/patterns/global-top500-044-personal-email-address - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:personal\s+email\s+address|personal\s+email|email\s+address|private\s+email|personal\s+inbox|contact\s+email|home\s+email|email\s+contact)\b` - Corroborative keywords: personal email address, personal, email, address, contact, location, data, age, birthday, citizenship, city, date of birth, DOB, ethnicity, fax, first name, full name, gender, given name, last name (+58 more) - Example matches: `personal email address`, `personal email`, `email address` - Known false positives: Common words and phrases related to personal email address appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Personal phone number Identifies documents containing references to personal phone number in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-043-personal-phone-number` - URL: https://testpattern.dev/patterns/au-top500-043-personal-phone-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:personal\s+phone\s+number|mobile\s+number|cell\s+number|telephone\s+number|contact\s+number|home\s+phone|phone\s+contact|call\s+back\s+number|SMS\s+number|direct\s+dial|personal\s+mobile)\b` - Corroborative keywords: personal phone number, personal, phone, number, contact, location, data, mobile, mob, cell, telephone, tel, ph, landline, home phone, work phone, business phone, direct line, contact number, phone number (+43 more) - Example matches: `personal phone number`, `mobile number`, `cell number` - Known false positives: Common words and phrases related to personal phone number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Personal phone number Identifies documents containing references to personal phone number in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-043-personal-phone-number` - URL: https://testpattern.dev/patterns/global-top500-043-personal-phone-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:personal\s+phone\s+number|mobile\s+number|cell\s+phone|telephone\s+number|phone\s+number|contact\s+number|home\s+phone|personal\s+mobile|private\s+number|direct\s+line|personal\s+contact|callback\s+number)\b` - Corroborative keywords: personal phone number, personal, phone, number, contact, location, data, mobile, mob, cell, telephone, tel, ph, landline, home phone, work phone, business phone, direct line, contact number, phone number (+43 more) - Example matches: `personal phone number`, `mobile number`, `cell phone` - Known false positives: Common words and phrases related to personal phone number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Personalausweis Detects Personalausweis patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `at-identity-card` - URL: https://testpattern.dev/patterns/at-identity-card - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, at - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b\d{8}\b` - Corroborative keywords: personalausweis, identity card, Ausweis, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `12345678`, `98765432`, `45678901` - Known false positives: Eight-digit numeric sequences are extremely common in dates, phone numbers, account numbers, and other non-identity contexts.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Personalausweis Detects Personalausweis patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `de-identity-card` - URL: https://testpattern.dev/patterns/de-identity-card - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, de - Regulations: GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b[CFGHJKLMNPRTVWXYZ][CFGHJKLMNPRTVWXYZ0-9]{8}\d?\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+16 more) - Example matches: `CF1234567`, `LM9876543`, `T12345678` - Known false positives: Common words and phrases related to personalausweis appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In multiple EU languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Personalization feature vectors Identifies documents containing references to personalization feature vectors in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-379-personalization-feature-vectors` - URL: https://testpattern.dev/patterns/au-top500-379-personalization-feature-vectors - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:personalization\s+feature\s+vectors|user\s+profile|machine\s+learning|behavioral\s+data)\b` - Corroborative keywords: personalization feature vectors, personalization, feature, vectors, customer, commercial, data - Example matches: `personalization feature vectors`, `user profile`, `machine learning` - Known false positives: Common words and phrases related to personalization feature vectors appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Personalization feature vectors Identifies documents containing references to personalization feature vectors in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-379-personalization-feature-vectors` - URL: https://testpattern.dev/patterns/global-top500-379-personalization-feature-vectors - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:personalization\s+feature\s+vectors|feature\s+vector|user\s+embedding|recommendation\s+model|behavioral\s+profile|user\s+preference\s+model|personalization\s+engine|content\s+recommendation|collaborative\s+filtering|user\s+segmentation|profile\s+scoring|preference\s+prediction)\b` - Corroborative keywords: personalization feature vectors, personalization, feature, vectors, customer, commercial, data - Example matches: `personalization feature vectors`, `feature vector`, `user embedding` - Known false positives: Common words and phrases related to personalization feature vectors appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Personas kods Detects Personas kods patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `lv-personal-code` - URL: https://testpattern.dev/patterns/lv-personal-code - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: eu, lv - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{6}-\d{5}\b` - Corroborative keywords: personas kods, personal code, identity number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `010175-12345`, `120388-56789`, `150392-45678` - Known false positives: The dash-separated format (XXXXXX-XXXXX) may match date-reference combinations in administrative systems.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Personnummer Detects Personnummer patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `se-personnummer` - URL: https://testpattern.dev/patterns/se-personnummer - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, se - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b(19|20)?\d{6}[-+]?\d{4}\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+16 more) - Example matches: `19900101-1234`, `900101-1234`, `200101+1234` - Known false positives: Common words and phrases related to personnummer appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In multiple EU languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### PESEL Detects PESEL patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `pl-pesel` - URL: https://testpattern.dev/patterns/pl-pesel - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, pl - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: wide - Risk rating: 9 - Pattern: `\b\d{11}\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `85010112345`, `90123156789`, `00210198765` - Known false positives: Long numeric sequences in unrelated contexts (tracking numbers, serial codes) matching the PESEL format ### Philippine Identification System (PhilSys) Detects Philippine Identification System (PhilSys) patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `ph-national-id` - URL: https://testpattern.dev/patterns/ph-national-id - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: ph - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{4}-\d{7}-\d{1}\b` - Corroborative keywords: PhilSys, PSN, national ID, Philippine identification, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `1234-5678901-2`, `9876-5432109-8`, `4567-8901234-5` - Known false positives: The specific dash-separated format (XXXX-XXXXXXX-X) significantly reduces false positives.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Philippines Passport Number Detects Philippines passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `ph-passport-number` - URL: https://testpattern.dev/patterns/ph-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: ph - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b[A-Z]{2}\d{7}[A-Z]\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `EC1234567A`, `PB9876543X`, `AB2345678C` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Phishing simulation results Identifies phishing simulation results patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-293-phishing-simulation-results` - URL: https://testpattern.dev/patterns/au-top500-293-phishing-simulation-results - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:phishing\s+simulation|campaign\s+results|click\s+rate|report\s+phish)\b` - Corroborative keywords: phishing simulation results, phishing, simulation, results, security, operations, threat, data - Example matches: `Phishing simulation results`, `phishing simulation results`, `Phishing simulation results` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Phishing simulation results Identifies phishing simulation results patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-293-phishing-simulation-results` - URL: https://testpattern.dev/patterns/global-top500-293-phishing-simulation-results - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:phishing\s+simulation|campaign\s+results|click\s+rate|report\s+phish)\b` - Corroborative keywords: phishing simulation results, phishing, simulation, results, security, operations, threat, data - Example matches: `Phishing simulation results`, `phishing simulation results`, `Phishing simulation results` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Physical badge access maps Identifies documents containing references to physical badge access maps in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-457-physical-badge-access-maps` - URL: https://testpattern.dev/patterns/au-top500-457-physical-badge-access-maps - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:physical\s+badge\s+access\s+maps|badge\s+access|access\s+control|door\s+access|card\s+reader|security\s+zone|restricted\s+area|entry\s+point|facility\s+access|clearance\s+level|critical\s+infrastructure)\b` - Corroborative keywords: physical badge access maps, physical, badge, access, maps, critical, infrastructure, systems - Example matches: `physical badge access maps`, `badge access`, `access control` - Known false positives: Common words and phrases related to physical badge access maps appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Physical badge access maps Identifies documents containing references to physical badge access maps in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-457-physical-badge-access-maps` - URL: https://testpattern.dev/patterns/global-top500-457-physical-badge-access-maps - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:badge\s+access|access\s+control\s+map|door\s+access|security\s+zone|card\s+reader|facility\s+access|restricted\s+area|physical\s+security|access\s+level|clearance\s+zone|perimeter\s+control|entry\s+point)\b` - Corroborative keywords: physical badge access maps, physical, badge, access, maps, critical, infrastructure, systems - Example matches: `badge access`, `access control map`, `door access` - Known false positives: Common words and phrases related to physical badge access maps appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### PII data-flow maps Identifies pii data-flow maps patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-260-pii-data-flow-maps` - URL: https://testpattern.dev/patterns/au-top500-260-pii-data-flow-maps - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:pii\s+data[\s-]+flow\s+maps|data\s+flow|pii\s+mapping|personal\s+information|data\s+lineage|data\s+inventory|privacy\s+impact|data\s+processing|data\s+subject|information\s+flow|data\s+architecture)\b` - Corroborative keywords: pii data-flow maps, pii, data, flow, maps, software, engineering, architecture - Example matches: `pii data-flow maps`, `data flow`, `pii mapping` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### PII data-flow maps Identifies pii data-flow maps patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-260-pii-data-flow-maps` - URL: https://testpattern.dev/patterns/global-top500-260-pii-data-flow-maps - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:data\s+flow|data\s+map|personal\s+information|data\s+inventory|privacy\s+impact|data\s+lineage|data\s+classification|data\s+processing|data\s+controller|data\s+processor|records\s+of\s+processing)\b` - Corroborative keywords: pii data-flow maps, pii, data, flow, maps, software, engineering, architecture - Example matches: `data flow`, `data map`, `personal information` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Pipeline pressure and flow setpoints Identifies documents containing references to pipeline pressure and flow setpoints in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-445-pipeline-pressure-and-flow-setpoints` - URL: https://testpattern.dev/patterns/au-top500-445-pipeline-pressure-and-flow-setpoints - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:pipeline\s+pressure|flow\s+setpoint|pipeline\s+setpoint|pressure\s+alarm|flow\s+rate|critical\s+infrastructure|pipeline\s+operations|operating\s+pressure|gas\s+pipeline|oil\s+pipeline|process\s+safety)\b` - Corroborative keywords: pipeline pressure and flow setpoints, pipeline, pressure, flow, setpoints, critical, infrastructure, systems - Example matches: `pipeline pressure`, `flow setpoint`, `pipeline setpoint` - Known false positives: Common words and phrases related to pipeline pressure and flow setpoints appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Pipeline pressure and flow setpoints Identifies documents containing references to pipeline pressure and flow setpoints in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-445-pipeline-pressure-and-flow-setpoints` - URL: https://testpattern.dev/patterns/global-top500-445-pipeline-pressure-and-flow-setpoints - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:pipeline\s+pressure|flow\s+setpoint|pipeline\s+operations|maximum\s+allowable\s+operating\s+pressure|compressor\s+station|metering\s+station|pipeline\s+control|pressure\s+relief|flow\s+rate|pipeline\s+safety|leak\s+detection)\b` - Corroborative keywords: pipeline pressure and flow setpoints, pipeline, pressure, flow, setpoints, critical, infrastructure, systems - Example matches: `pipeline pressure`, `flow setpoint`, `pipeline operations` - Known false positives: Common words and phrases related to pipeline pressure and flow setpoints appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### PKCS#8 Private Key Header Detects PKCS#8 private key PEM headers in source code, configuration files, and documents. Private keys should never appear in plaintext. - Slug: `global-pkcs8-private` - URL: https://testpattern.dev/patterns/global-pkcs8-private - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Pattern: `-----BEGIN PRIVATE KEY-----` - Corroborative keywords: private key, secret key, key file, PEM, certificate, RSA, cryptographic, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie, credential (+42 more) - Example matches: `-----BEGIN PRIVATE KEY-----`, `-----BEGIN PRIVATE KEY----- MIIE...`, `-----BEGIN PRIVATE KEY----- Proc-Type:` - Known false positives: PEM-encoded certificates or public keys that use similar header formats ### Place of birth Identifies documents containing references to place of birth in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-004-place-of-birth` - URL: https://testpattern.dev/patterns/au-top500-004-place-of-birth - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:place\s+of\s+birth|born\s+in|city\s+of\s+birth|country\s+of\s+birth|town\s+of\s+birth|birth\s+location|birth\s+city|birth\s+country)\b` - Corroborative keywords: place of birth, place, birth, personal, identity, demographics, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender, given name (+51 more) - Example matches: `place of birth`, `born in`, `city of birth` - Known false positives: Common words and phrases related to place of birth appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Place of birth Identifies documents containing references to place of birth in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-004-place-of-birth` - URL: https://testpattern.dev/patterns/global-top500-004-place-of-birth - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:place\s+of\s+birth|born\s+in|city\s+of\s+birth|country\s+of\s+birth|town\s+of\s+birth|birth\s+location|birth\s+registration|birth\s+record|birth\s+certificate)\b` - Corroborative keywords: place of birth, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender, given name, last name, maiden name, middle name, mobile, name (+46 more) - Example matches: `place of birth`, `born in`, `city of birth` - Known false positives: Common words and phrases related to place of birth appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Plagiarism investigation files Identifies documents containing references to plagiarism investigation files in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-352-plagiarism-investigation-files` - URL: https://testpattern.dev/patterns/au-top500-352-plagiarism-investigation-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:plagiarism\s+investigation\s+files|academic\s+misconduct|academic\s+integrity|similarity\s+report|disciplinary\s+hearing|contract\s+cheating|misconduct\s+panel|integrity\s+breach)\b` - Corroborative keywords: plagiarism investigation files, plagiarism, investigation, files, education, research, administration - Example matches: `plagiarism investigation files`, `academic misconduct`, `academic integrity` - Known false positives: Common words and phrases related to plagiarism investigation files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Plagiarism investigation files Identifies documents containing references to plagiarism investigation files in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-352-plagiarism-investigation-files` - URL: https://testpattern.dev/patterns/global-top500-352-plagiarism-investigation-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:plagiarism\s+investigation|academic\s+misconduct|academic\s+integrity|similarity\s+report|originality\s+check|disciplinary\s+hearing|academic\s+dishonesty|plagiarism\s+finding|misconduct\s+panel|integrity\s+violation|plagiarism\s+detection)\b` - Corroborative keywords: plagiarism investigation files, plagiarism, investigation, files, education, research, administration - Example matches: `plagiarism investigation`, `academic misconduct`, `academic integrity` - Known false positives: Common words and phrases related to plagiarism investigation files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Plaintext passwords Identifies plaintext passwords patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-261-plaintext-passwords` - URL: https://testpattern.dev/patterns/au-top500-261-plaintext-passwords - Type: regex - Engine: boost_regex - Confidence: low - Detection quality: Mixed - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth), NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `\bplaintext\s+passwords\b` - Corroborative keywords: plaintext passwords, plaintext, passwords, credentials, keys, secrets, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie, credential, database (+15 more) - Example matches: `Plaintext passwords`, `plaintext passwords`, `Plaintext passwords` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Plaintext passwords Identifies plaintext passwords patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-261-plaintext-passwords` - URL: https://testpattern.dev/patterns/global-top500-261-plaintext-passwords - Type: regex - Engine: boost_regex - Confidence: low - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `\bplaintext\s+passwords\b` - Corroborative keywords: plaintext passwords, plaintext, passwords, credentials, keys, secrets, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie, credential, database (+43 more) - Example matches: `Plaintext passwords`, `plaintext passwords`, `Plaintext passwords` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Plant shutdown and startup procedures Identifies documents containing references to plant shutdown and startup procedures in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-448-plant-shutdown-and-startup-procedures` - URL: https://testpattern.dev/patterns/au-top500-448-plant-shutdown-and-startup-procedures - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:plant\s+shutdown|startup\s+procedure|shutdown\s+procedure|emergency\s+shutdown|startup\s+sequence|critical\s+infrastructure|process\s+safety|operational\s+procedure|plant\s+operations|safety\s+checklist)\b` - Corroborative keywords: plant shutdown and startup procedures, plant, shutdown, startup, procedures, critical, infrastructure, systems - Example matches: `plant shutdown`, `startup procedure`, `shutdown procedure` - Known false positives: Common words and phrases related to plant shutdown and startup procedures appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Plant shutdown and startup procedures Identifies documents containing references to plant shutdown and startup procedures in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-448-plant-shutdown-and-startup-procedures` - URL: https://testpattern.dev/patterns/global-top500-448-plant-shutdown-and-startup-procedures - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:plant\s+shutdown|startup\s+procedure|shutdown\s+sequence|emergency\s+shutdown|startup\s+checklist|process\s+safety|turnaround\s+procedure|trip\s+sequence|safety\s+instrumented\s+system)\b` - Corroborative keywords: plant shutdown and startup procedures, plant, shutdown, startup, procedures, critical, infrastructure, systems - Example matches: `plant shutdown`, `startup procedure`, `shutdown sequence` - Known false positives: Common words and phrases related to plant shutdown and startup procedures appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### PLC logic programs Identifies documents containing references to plc logic programs in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-442-plc-logic-programs` - URL: https://testpattern.dev/patterns/au-top500-442-plc-logic-programs - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:programmable\s+logic\s+controller|ladder\s+logic|structured\s+text|function\s+block|industrial\s+control|control\s+program|critical\s+infrastructure|IEC\s+61131|rung\s+logic|process\s+control)\b` - Corroborative keywords: plc logic programs, plc, logic, programs, critical, infrastructure, systems, SCADA, PLC, DCS, HMI, Modbus, Modbus TCP, Modbus RTU, DNP3, OPC-UA, OPC Classic, IEC 61850, IEC 60870, IEC 60870-5-104 (+9 more) - Example matches: `programmable logic controller`, `ladder logic`, `structured text` - Known false positives: Common words and phrases related to plc logic programs appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### PLC logic programs Identifies documents containing references to plc logic programs in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-442-plc-logic-programs` - URL: https://testpattern.dev/patterns/global-top500-442-plc-logic-programs - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:programmable\s+logic\s+controller|ladder\s+logic|structured\s+text|function\s+block|rung\s+diagram|IEC\s+61131|control\s+program|industrial\s+automation|I\/O\s+module|scan\s+cycle)\b` - Corroborative keywords: plc logic programs, plc, logic, programs, critical, infrastructure, systems, SCADA, PLC, DCS, HMI, Modbus, Modbus TCP, Modbus RTU, DNP3, OPC-UA, OPC Classic, IEC 61850, IEC 60870, IEC 60870-5-104 (+38 more) - Example matches: `programmable logic controller`, `ladder logic`, `structured text` - Known false positives: Common words and phrases related to plc logic programs appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Plea negotiation documentation Identifies documents containing references to plea negotiation documentation in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-417-plea-negotiation-documentation` - URL: https://testpattern.dev/patterns/au-top500-417-plea-negotiation-documentation - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:plea\s+negotiation\s+documentation|plea\s+bargain|plea\s+agreement|plea\s+deal|guilty\s+plea|charge\s+negotiation|sentence\s+indication|prosecution\s+negotiation|plea\s+discussion|plea\s+arrangement|charge\s+reduction|plea\s+conference)\b` - Corroborative keywords: plea negotiation documentation, plea, negotiation, documentation, law, enforcement, justice, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+31 more) - Example matches: `plea negotiation documentation`, `plea bargain`, `plea agreement` - Known false positives: Common words and phrases related to plea negotiation documentation appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Plea negotiation documentation Identifies documents containing references to plea negotiation documentation in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-417-plea-negotiation-documentation` - URL: https://testpattern.dev/patterns/global-top500-417-plea-negotiation-documentation - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:plea\s+negotiation|plea\s+agreement|plea\s+bargain|plea\s+deal|guilty\s+plea|plea\s+offer|plea\s+hearing|sentencing\s+recommendation|charge\s+reduction|plea\s+arrangement|plea\s+conference|plea\s+colloquy)\b` - Corroborative keywords: plea negotiation documentation - Example matches: `plea negotiation`, `plea agreement`, `plea bargain` - Known false positives: Common words and phrases related to plea negotiation documentation appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Poland Driver's License Number Detects Poland driver's license number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `pl-drivers-license` - URL: https://testpattern.dev/patterns/pl-drivers-license - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: pl, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\b[A-Z]{5}\d{5}\b|\b\d{5}/\d{2}/\d{4}\b` - Corroborative keywords: driver, licence, license, driving, DL, prawo jazdy, ID number, identification, ID card, permit, registration, certificate, field, column, row, entry, record, value, form, register (+21 more) - Example matches: `ABCDE12345`, `XYZAB98765`, `12345/06/2024` - Known false positives: Generic alphanumeric sequences matching the driver's license format appearing in unrelated contexts. ### Poland Passport Detects Poland passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `pl-passport-number` - URL: https://testpattern.dev/patterns/pl-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: pl, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b[A-Z]{2}\d{7}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `ZS1234567`, `AW9876543`, `BC2345678` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Poland Physical Addresses Detects Poland Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `pl-physical-addresses` - URL: https://testpattern.dev/patterns/pl-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: pl, eu - Regulations: GDPR - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 ulica name, unit 4`, `located at 45 aleja example`, `deliver to 78 plac test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### Poland Tax Identification Number Detects Poland Tax Identification Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Due to the numeric format, corroborative evidence keywords are essential for reliable detection. - Slug: `pl-tax-id` - URL: https://testpattern.dev/patterns/pl-tax-id - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: pl, eu - Regulations: GDPR - Data categories: pii, financial, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b\d{3}-?\d{3}-?\d{2}-?\d{2}\b` - Corroborative keywords: NIP, PESEL, numer identyfikacji podatkowej, tax identification, Urząd Skarbowy, TIN, tax identification number, tax number, tax return, IRD, NIF, tax ID, inland revenue, taxpayer identification, αριθμός φορολογικού μητρώου, ΑΦΜ, φορολογικός, Abgabenkontonummer, adóazonosító, adószám (+20 more) - Example matches: `123-456-78-90`, `1234567890`, `987-654-32-10` - Known false positives: Generic numeric sequences in non-tax contexts such as reference numbers or account identifiers; Numbers from other identification schemes with similar digit patterns ### Police Body Worn Camera Metadata Detects metadata records from police body-worn camera (BWC) systems including activation timestamps, officer identification, incident cross-references, and footage catalogue entries. This pattern targets the metadata and logs, NOT the footage itself. BWC metadata reveals which officers attended which incidents, activation patterns, and evidence chain-of-custody details. - Slug: `police-body-worn-camera-metadata` - URL: https://testpattern.dev/patterns/police-body-worn-camera-metadata - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: PPRA 2000 (Qld), Police Service Admin Act 1990 (Qld) - Data categories: law-enforcement, government - Scope: narrow - Risk rating: 7 - Pattern: `(?i)\b(body\s+worn\s+camera\s+(?:metadata|log|record|activation)|BWC\s+(?:activation|footage|reference|log|record)|(?:activation|deactivation)\s+(?:timestamp|log|record)|footage\s+(?:reference|catalogue|index)|officer\s+(?:ID|identification)\s+(?:badge|number))\b` - Corroborative keywords: SENSITIVE, Law-Enforcement, body worn camera, BWC, activation log, footage reference, officer ID, incident link, QPS, digital evidence, evidence management, chain of custody, activation timestamp, deactivation, investigation, enforcement, prosecution, arrest, evidence, forensic (+51 more) - Example matches: `SENSITIVE Law-Enforcement. QPS Body Worn Camera Activation Log. Officer: Const. S. Morales, Badge 23841, Fortitude Valley Patrol Group. BWC Unit ID: BWC-FV-0284. Activation timestamp: 2026-02-14T22:14:33+10:00. Deactivation timestamp: 2026-02-14T23:47:12+10:00. Duration: 01:32:39. Incident link: OCC-0458723. Footage reference: BWC-FV-0284-20260214-221433.mp4. Category: Use of Force. Chain of custody: uploaded to DEMS at 2026-02-15T01:12:08+10:00.`, `Body Worn Camera Metadata Report — Weekly Summary. Period: 10-16 February 2026. South Brisbane District. Total activations: 847. Activations by category: General Duties 412, Traffic 198, DFV Attendance 127, Use of Force 48, Watch House 62. Officer ID 14892 (Sgt Thompson): 23 activations, 14.2 hours total footage. Footage reference index attached. All records uploaded to Digital Evidence Management System within 24 hours.`, `QPS Digital Evidence — BWC Record. Footage catalogue entry for Operation FALCON evidence bundle. BWC activation record: Officer ID 22104 (Const. Chen), activation timestamp 2026-01-28T19:23:41+10:00, location GPS coordinates -27.4698, 153.0251 (West End). Incident link: QP-2026-0034521. Evidence category: Drug search — PPRA s.30. Chain of custody log: downloaded by Det. Sgt K. O'Brien, CIB South Brisbane, 29 January 2026.` - Known false positives: Published QPS BWC policy and operational guidelines; Government procurement tenders for BWC equipment; Academic research on BWC effectiveness and policing outcomes ### Police identity number Identifies documents containing references to police identity number in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-035-police-identity-number` - URL: https://testpattern.dev/patterns/au-top500-035-police-identity-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:police\s+identity\s+number|police\s+ID|officer\s+identification|badge\s+number|police\s+registration|law\s+enforcement\s+ID|constable\s+number|AFP\s+number|sworn\s+officer|police\s+service\s+number|police\s+force|national\s+police\s+check)\b` - Corroborative keywords: police identity number, police, identity, number, government, ids, civil, status, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+30 more) - Example matches: `police identity number`, `police id`, `officer identification` - Known false positives: Common words and phrases related to police identity number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Police identity number Identifies documents containing references to police identity number in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-035-police-identity-number` - URL: https://testpattern.dev/patterns/global-top500-035-police-identity-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:police\s+identity\s+number|police\s+ID|officer\s+badge\s+number|badge\s+number|police\s+registration|law\s+enforcement\s+ID|officer\s+identification|police\s+service\s+number|police\s+warrant\s+number|constable\s+number|police\s+reference|officer\s+number)\b` - Corroborative keywords: police identity number - Example matches: `police identity number`, `police id`, `officer badge number` - Known false positives: Common words and phrases related to police identity number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Police Use-of-Force Investigation (Internal) Detects internal investigation documents of police use of lethal or serious force, including compelled officer statements under s.7.2 PPRA and Ethical Standards Command evidence before investigation completion. - Slug: `police-use-of-force-investigation-internal` - URL: https://testpattern.dev/patterns/police-use-of-force-investigation-internal - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: PPRA 2000 (Qld), Police Service Admin Act 1990 (Qld) - Data categories: law-enforcement, government - Scope: wide - Risk rating: 7 - Pattern: `(?i)\b(critical\s+incident\s+(?:investigation|report|review)|police\s+shooting\s+investigation|use\s+of\s+force\s+investigation|Ethical\s+Standards\s+Command|ESC\s+investigation|discharge\s+of\s+firearm\s+(?:investigation|report)|lethal\s+force\s+review)\b` - Corroborative keywords: PROTECTED, Law-Enforcement, RESTRICTED, INTERNAL INVESTIGATION, Ethical Standards Command, ESC, self-incrimination notice, s.7.2 PPRA, compelled statement, body-worn camera, tactical assessment, discharge report, investigation, enforcement, prosecution, arrest, evidence, forensic, suspect, witness (+48 more) - Example matches: `PROTECTED — INTERNAL INVESTIGATION. QPS Ethical Standards Command — Critical Incident Investigation. Police shooting, Ipswich 14/01/2025. Subject officer: SC M. DAVIES, Reg 18742. Discharge of firearm report. Self-incrimination notice under s.7.2 PPRA. Compelled statement obtained. Body-worn camera under review.`, `RESTRICTED — Internal Investigation. Use of force investigation — lethal force review. ESC-2025-0034. Taser and firearm use during pursuit. Tactical assessment: force may be disproportionate. Self-incrimination notice served. Compelled statements not admissible criminally.`, `Critical incident report — preliminary. Police shooting investigation commenced. ESC team deployed. Self-incrimination notices issued. Body-worn camera secured. Parallel coronial and CCC oversight.` - Known false positives: Published oversight body reports; Media reporting on use-of-force incidents; Police training materials ### Policy attestation records Identifies documents containing references to policy attestation records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-477-policy-attestation-records` - URL: https://testpattern.dev/patterns/au-top500-477-policy-attestation-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:policy\s+attestation|attestation\s+record|policy\s+compliance|signed\s+attestation|annual\s+attestation|compliance\s+declaration|policy\s+acknowledgement|attestation\s+date|privacy\s+policy|risk\s+attestation|compliance\s+certification|regulatory\s+attestation)\b` - Corroborative keywords: policy attestation records, policy, attestation, records, privacy, compliance, risk - Example matches: `policy attestation`, `attestation record`, `policy compliance` - Known false positives: Common words and phrases related to policy attestation records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Policy attestation records Identifies documents containing references to policy attestation records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-477-policy-attestation-records` - URL: https://testpattern.dev/patterns/global-top500-477-policy-attestation-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:policy\s+attestation|attestation\s+record|policy\s+acknowledgment|employee\s+attestation|compliance\s+attestation|annual\s+certification|policy\s+acceptance|training\s+completion|code\s+of\s+conduct|privacy\s+compliance|attestation\s+date|sign[\s-]+off\s+record)\b` - Corroborative keywords: policy attestation records, policy, attestation, records, privacy, compliance, risk - Example matches: `policy attestation`, `attestation record`, `policy acknowledgment` - Known false positives: Common words and phrases related to policy attestation records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Policy exception approvals Identifies documents containing references to policy exception approvals in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-175-policy-exception-approvals` - URL: https://testpattern.dev/patterns/au-top500-175-policy-exception-approvals - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:policy\s+exception\s+approvals|policy\s+exception|exception\s+approval|waiver\s+request|deviation\s+approval|risk\s+acceptance|policy\s+override|delegated\s+authority|exception\s+register|compensating\s+control|approved\s+deviation)\b` - Corroborative keywords: policy exception approvals, policy, exception, approvals, corporate, legal, governance - Example matches: `policy exception approvals`, `policy exception`, `exception approval` - Known false positives: Common words and phrases related to policy exception approvals appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Policy exception approvals Identifies documents containing references to policy exception approvals in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-175-policy-exception-approvals` - URL: https://testpattern.dev/patterns/global-top500-175-policy-exception-approvals - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:policy\s+exception\s+approvals|policy\s+exception|exception\s+approval|waiver\s+request|deviation\s+approval|risk\s+acceptance|compensating\s+control|exception\s+justification|approving\s+authority|time[\s-]+limited\s+exception|policy\s+override|exception\s+register)\b` - Corroborative keywords: policy exception approvals, policy, exception, approvals, corporate, legal, governance - Example matches: `policy exception approvals`, `policy exception`, `exception approval` - Known false positives: Common words and phrases related to policy exception approvals appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Policy violation findings Identifies documents containing references to policy violation findings in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-171-policy-violation-findings` - URL: https://testpattern.dev/patterns/au-top500-171-policy-violation-findings - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:policy\s+violation\s+findings|policy\s+violation|non[\s-]+compliance\s+finding|breach\s+of\s+policy|disciplinary\s+finding|corrective\s+action|remediation\s+required|compliance\s+breach|policy\s+infringement|investigation\s+finding|warning\s+letter)\b` - Corroborative keywords: policy violation findings, policy, violation, findings, corporate, legal, governance - Example matches: `policy violation findings`, `policy violation`, `non-compliance finding` - Known false positives: Common words and phrases related to policy violation findings appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Policy violation findings Identifies documents containing references to policy violation findings in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-171-policy-violation-findings` - URL: https://testpattern.dev/patterns/global-top500-171-policy-violation-findings - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:policy\s+violation\s+findings|policy\s+violation|non[\s-]+compliance\s+finding|disciplinary\s+action|corrective\s+action|compliance\s+breach|policy\s+infringement|remediation\s+required|written\s+warning|code\s+of\s+conduct\s+breach|policy\s+exception)\b` - Corroborative keywords: policy violation findings, policy, violation, findings, corporate, legal, governance - Example matches: `policy violation findings`, `policy violation`, `non-compliance finding` - Known false positives: Common words and phrases related to policy violation findings appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Politically exposed person assessment files Identifies documents containing references to politically exposed person assessment files in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-485-politically-exposed-person-assessment-files` - URL: https://testpattern.dev/patterns/au-top500-485-politically-exposed-person-assessment-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:politically\s+exposed\s+person|PEP\s+assessment|PEP\s+screening|enhanced\s+due\s+diligence|beneficial\s+owner|sanctions\s+screening|risk\s+assessment|customer\s+due\s+diligence|high[\s-]+risk\s+customer|source\s+of\s+wealth)\b` - Corroborative keywords: politically exposed person assessment files, politically, exposed, person, assessment, files, elections, diplomacy, statecraft, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body (+33 more) - Example matches: `politically exposed person`, `pep assessment`, `PEP screening` - Known false positives: Common words and phrases related to politically exposed person assessment files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Politically exposed person assessment files Identifies documents containing references to politically exposed person assessment files in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-485-politically-exposed-person-assessment-files` - URL: https://testpattern.dev/patterns/global-top500-485-politically-exposed-person-assessment-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:politically\s+exposed\s+person\s+assessment\s+files|politically\s+exposed\s+person|PEP\s+screening|PEP\s+assessment|enhanced\s+due\s+diligence|anti[\s-]+money\s+laundering|beneficial\s+ownership|sanctions\s+screening|risk\s+rating|high[\s-]+risk\s+individual)\b` - Corroborative keywords: politically exposed person assessment files - Example matches: `politically exposed person assessment files`, `politically exposed person`, `PEP screening` - Known false positives: Common words and phrases related to politically exposed person assessment files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Port facility security manifests Identifies documents containing references to port facility security manifests in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-452-port-facility-security-manifests` - URL: https://testpattern.dev/patterns/au-top500-452-port-facility-security-manifests - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:port\s+facility\s+security\s+manifests|port\s+facility|security\s+manifest|maritime\s+security|ISPS\s+code|vessel\s+manifest|cargo\s+manifest|berth\s+allocation|harbour\s+master|port\s+authority|restricted\s+zone|critical\s+infrastructure)\b` - Corroborative keywords: port facility security manifests, port, facility, security, manifests, critical, infrastructure, systems - Example matches: `port facility security manifests`, `port facility`, `security manifest` - Known false positives: Common words and phrases related to port facility security manifests appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Port facility security manifests Identifies documents containing references to port facility security manifests in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-452-port-facility-security-manifests` - URL: https://testpattern.dev/patterns/global-top500-452-port-facility-security-manifests - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:port\s+facility|security\s+manifest|maritime\s+security|ISPS\s+code|vessel\s+security|port\s+security\s+plan|cargo\s+manifest|berth\s+allocation|facility\s+security\s+officer|maritime\s+transport|port\s+access\s+control)\b` - Corroborative keywords: port facility security manifests, port, facility, security, manifests, critical, infrastructure, systems - Example matches: `port facility`, `security manifest`, `maritime security` - Known false positives: Common words and phrases related to port facility security manifests appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Portugal Driver's License Number Detects Portugal driver's license number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `pt-drivers-license` - URL: https://testpattern.dev/patterns/pt-drivers-license - Type: regex - Engine: universal - Confidence: medium - Detection quality: Mixed - Jurisdictions: pt, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\b[A-Z]{1,2}-\d{6,7}\b` - Corroborative keywords: driver, licence, license, driving, DL, carta de conducao, ID number, identification, ID card, permit, registration, certificate, field, column, row, entry, record, value, form, register (+21 more) - Example matches: `A-123456`, `AB-1234567`, `X-9876543` - Known false positives: Generic alphanumeric sequences matching the driver's license format appearing in unrelated contexts. ### Portugal Passport Number Detects Portugal passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `pt-passport-number` - URL: https://testpattern.dev/patterns/pt-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: pt, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b[A-Z]{2}\d{6}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `PT123456`, `AB987654`, `XY234567` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Portugal Tax Identification Number Detects Portugal Tax Identification Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Due to the numeric format, corroborative evidence keywords are essential for reliable detection. - Slug: `pt-tax-id` - URL: https://testpattern.dev/patterns/pt-tax-id - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: pt, eu - Regulations: GDPR - Data categories: pii, financial, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b\d{9}\b` - Corroborative keywords: NIF, número de identificação fiscal, contribuinte, tax identification, finanças, TIN, tax identification number, tax number, tax return, IRD, tax ID, inland revenue, taxpayer identification, αριθμός φορολογικού μητρώου, ΑΦΜ, φορολογικός, Abgabenkontonummer, adóazonosító, adószám, belastingnummer (+19 more) - Example matches: `123456789`, `987654321`, `112233445` - Known false positives: Generic numeric sequences in non-tax contexts such as reference numbers or account identifiers; Numbers from other identification schemes with similar digit patterns ### Portuguese Physical Addresses Detects Portuguese Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `pt-physical-addresses` - URL: https://testpattern.dev/patterns/pt-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: pt, eu - Regulations: GDPR - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 rua name, unit 4`, `located at 45 avenida example`, `deliver to 78 travessa test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### Post-merger integration plans Identifies documents containing references to post-merger integration plans in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-186-post-merger-integration-plans` - URL: https://testpattern.dev/patterns/au-top500-186-post-merger-integration-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), Privacy Act 1988 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:post[\s-]+merger\s+integration|integration\s+plan|PMI\s+plan|day\s+one\s+readiness|integration\s+workstream|integration\s+timeline|cultural\s+integration|systems\s+integration|organizational\s+restructure|change\s+management|transition\s+planning|merger\s+integration)\b` - Corroborative keywords: post-merger integration plans, post, merger, integration, plans, mergers, acquisitions, strategy, acquisition, takeover, due diligence, scheme of arrangement, material non-public information, MNPI, inside information, price sensitive, price sensitive information - Example matches: `post-merger integration`, `integration plan`, `PMI plan` - Known false positives: Common words and phrases related to post-merger integration plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Post-merger integration plans Identifies documents containing references to post-merger integration plans in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-186-post-merger-integration-plans` - URL: https://testpattern.dev/patterns/global-top500-186-post-merger-integration-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:post[\s-]+merger\s+integration|PMI\s+plan|integration\s+workstream|day\s+one\s+readiness|transition\s+plan|integration\s+milestone|cultural\s+integration|systems\s+migration|organizational\s+design|integration\s+office|change\s+management)\b` - Corroborative keywords: post-merger integration plans, post, merger, integration, plans, mergers, acquisitions, strategy, acquisition, takeover, due diligence, scheme of arrangement, material non-public information, MNPI, inside information, price sensitive, price sensitive information, field, column, row (+26 more) - Example matches: `post-merger integration`, `pmi plan`, `integration workstream` - Known false positives: Common words and phrases related to post-merger integration plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Postgresql Detects Postgresql patterns. - Slug: `global-postgresql-connection-string` - URL: https://testpattern.dev/patterns/global-postgresql-connection-string - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Pattern: `postgres(ql)?://[^:]+:[^@]+@[^/]+/\S+` - Corroborative keywords: api key, api_key, apikey, access key, secret key, private key, auth token, authorization, access token, bearer, conn str, connection string, connectionstring, cookie, credential, database, host, JWT, oauth, passphrase (+37 more) - Example matches: `postgresql://user:pass@localhost/mydb`, `postgres://admin:secret@db.example.com/prod`, `postgresql://app:p@ssw0rd@10.0.0.1/data` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### PPSR Security Agreement Detects Personal Property Securities Register (PPSR) security agreements and related collateral documentation. - Slug: `au-ppsr-security-agreement` - URL: https://testpattern.dev/patterns/au-ppsr-security-agreement - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: legal, financial - Scope: narrow - Risk rating: 7 - Example matches: `PPSR security interest registration: financing statement for collateral`, `Personal Property Securities Act: secured party and grantor agreement`, `PMSI registration on PPSR with perfected security interest and priority` - Known false positives: Generic property or security references in non-PPSR contexts. ### Pre-Announcement Grant Funding Recommendation Detects ministerial briefing notes or departmental submissions recommending specific grant funding decisions before public announcement. - Slug: `pre-announcement-grant-funding-recommendation` - URL: https://testpattern.dev/patterns/pre-announcement-grant-funding-recommendation - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Financial Accountability Act 2009 (Qld) - Data categories: financial, government - Scope: wide - Risk rating: 8 - Corroborative keywords: recommend, recommendation, submission, brief, briefing note, approval, grant, funding, program, initiative, Minister, Director-General, decision, PROTECTED, not for release, pre-announcement, decision pending, financial, fiscal, monetary (+27 more) - Example matches: `PROTECTED — Briefing Note for the Minister. Subject: Grant Funding Recommendations — Community Recovery Program Round 2. Recommendation: That the Minister approve funding of $8.4M across 23 applicants as listed in Attachment A. Decision pending — not for release until ministerial announcement.`, `Submission to Director-General. Pre-announcement. Recommendation: Approve the attached grant funding allocations for the Regional Innovation Fund ($12.6M total). 15 successful applicants recommended from 89 applications. PROTECTED — decision pending.` - Known false positives: Post-announcement media releases and grant outcome notifications; Grant program guidelines and application forms ### Pre-Release Earnings Guidance with Financials Detects draft earnings guidance, profit warnings, or financial results before market disclosure. For QLD Government, this applies to GOCs subject to continuous disclosure obligations. - Slug: `pre-release-earnings-guidance-with-financials` - URL: https://testpattern.dev/patterns/pre-release-earnings-guidance-with-financials - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: global - Regulations: Corporations Act 2001 (Cth), Criminal Code 1899 (Qld) - Data categories: financial - Scope: wide - Risk rating: 10 - Corroborative keywords: earnings, profit, revenue, financial results, guidance, draft, pre-release, embargoed, not for release, pre-announcement, per share, dividend, EBITDA, NPAT, underlying profit, Energy Queensland, Stanwell, CS Energy, Sunwater, Queensland Rail (+14 more) - Example matches: `PROTECTED — EMBARGOED UNTIL ASX ANNOUNCEMENT. Draft Earnings Guidance FY26. NPAT forecast: $245M (down 12% on prior year). EBITDA: $890M. Dividend recommendation: 45 cents per share (reduced from 60 cents). Underlying profit impacted by coal price decline.`, `Pre-release — Not for distribution. Energy Queensland Financial Results H1 FY26. Revenue: $4.2B. NPAT: $310M. Profit warning: Full-year NPAT expected to be 15-20% below guidance. Board to consider dividend revision. PROTECTED — insider information.` - Known false positives: Published financial results and ASX announcements; Analyst reports and market commentary with estimated earnings ### Pre-release national budget drafts Identifies documents containing references to pre-release national budget drafts in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-491-pre-release-national-budget-drafts` - URL: https://testpattern.dev/patterns/au-top500-491-pre-release-national-budget-drafts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:pre[\s-]+release\s+budget|budget\s+draft|national\s+budget|budget\s+estimates|appropriation\s+bill|fiscal\s+outlook|budget\s+papers|expenditure\s+estimates|revenue\s+measures|budget\s+sensitive)\b` - Corroborative keywords: pre-release national budget drafts, pre, release, national, budget, drafts, elections, diplomacy, statecraft, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body (+33 more) - Example matches: `pre-release budget`, `budget draft`, `national budget` - Known false positives: Common words and phrases related to pre-release national budget drafts appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Pre-release national budget drafts Identifies documents containing references to pre-release national budget drafts in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-491-pre-release-national-budget-drafts` - URL: https://testpattern.dev/patterns/global-top500-491-pre-release-national-budget-drafts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:pre[\s-]+release\s+national\s+budget\s+drafts|national\s+budget|budget\s+draft|fiscal\s+policy|revenue\s+estimates|expenditure\s+forecast|budget\s+allocation|fiscal\s+year|budget\s+embargo)\b` - Corroborative keywords: pre-release national budget drafts - Example matches: `pre-release national budget drafts`, `national budget`, `budget draft` - Known false positives: Common words and phrases related to pre-release national budget drafts appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Pre-release test result datasets Identifies documents containing references to pre-release test result datasets in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-224-pre-release-test-result-datasets` - URL: https://testpattern.dev/patterns/au-top500-224-pre-release-test-result-datasets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:pre[\s-]+release\s+test\s+results|test\s+dataset|test\s+results|quality\s+assurance|regression\s+testing|validation\s+results|pre[\s-]+release\s+testing|test\s+report|acceptance\s+testing|performance\s+testing)\b` - Corroborative keywords: pre-release test result datasets, pre, release, test, result, datasets, product, quality, safety, My Health Record, pathology result, diagnostic imaging, discharge summary, prescription record, immunisation history, immunization history, organ donor, clinical trial, medical history, allergy (+35 more) - Example matches: `pre-release test results`, `test dataset`, `test results` - Known false positives: Common words and phrases related to pre-release test result datasets appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Pre-release test result datasets Identifies documents containing references to pre-release test result datasets in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-224-pre-release-test-result-datasets` - URL: https://testpattern.dev/patterns/global-top500-224-pre-release-test-result-datasets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:pre[\s-]+release\s+test\s+result\s+datasets|pre[\s-]+release\s+test|test\s+results|test\s+dataset|product\s+quality|safety\s+testing|validation\s+results|verification\s+testing|regression\s+test|acceptance\s+test)\b` - Corroborative keywords: pre-release test result datasets, pre, release, test, result, datasets, product, quality, safety, My Health Record, pathology result, diagnostic imaging, discharge summary, prescription record, immunisation history, immunization history, organ donor, clinical trial, medical history, allergy (+35 more) - Example matches: `pre-release test result datasets`, `pre-release test`, `test results` - Known false positives: Common words and phrases related to pre-release test result datasets appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Preauthorization records Identifies preauthorization records references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `au-top500-335-preauthorization-records` - URL: https://testpattern.dev/patterns/au-top500-335-preauthorization-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:prior\s+authorization|medical\s+authorization|insurance\s+approval|treatment\s+approval|clinical\s+authorization|coverage\s+determination|utilization\s+review|referral\s+authorization)\b` - Corroborative keywords: preauthorization records, preauthorization, records, health, biomedical, information, patient, clinical, medical, hospital, practitioner, diagnosis, treatment, prescription, physician, nurse, therapy, examination, consultation, referral - Example matches: `prior authorization`, `medical authorization`, `insurance approval` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### Preauthorization records Identifies preauthorization records references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `global-top500-335-preauthorization-records` - URL: https://testpattern.dev/patterns/global-top500-335-preauthorization-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:prior\s+authorization|insurance\s+authorization|coverage\s+determination|medical\s+necessity|utilization\s+review|claims\s+approval|health\s+plan|authorization\s+request)\b` - Corroborative keywords: preauthorization records, preauthorization, records, health, biomedical, information, patient, clinical, medical, hospital, practitioner, diagnosis, treatment, prescription, physician, nurse, therapy, examination, consultation, referral (+29 more) - Example matches: `prior authorization`, `insurance authorization`, `coverage determination` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### Premium payment histories Detects references to premium payment histories in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-139-premium-payment-histories` - URL: https://testpattern.dev/patterns/au-top500-139-premium-payment-histories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:premium\s+payment|payment\s+history|insurance\s+premium|premium\s+schedule|policy\s+renewal|premium\s+adjustment|overdue\s+premium|payment\s+record)\b` - Corroborative keywords: premium payment histories, premium, payment, histories, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+2 more) - Example matches: `premium payment`, `payment history`, `insurance premium` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Premium payment histories Detects references to premium payment histories in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-139-premium-payment-histories` - URL: https://testpattern.dev/patterns/global-top500-139-premium-payment-histories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:premium\s+payment|insurance\s+premium|payment\s+history|premium\s+schedule|premium\s+due|policy\s+renewal|premium\s+arrears|instalment\s+payment|premium\s+notice|lapsed\s+policy|premium\s+collection|policyholder\s+payment)\b` - Corroborative keywords: premium payment histories, premium, payment, histories, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+31 more) - Example matches: `premium payment`, `insurance premium`, `payment history` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Previous legal names and aliases Identifies documents containing references to previous legal names and aliases in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-002-previous-legal-names-and-aliases` - URL: https://testpattern.dev/patterns/au-top500-002-previous-legal-names-and-aliases - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:previous\s+name|former\s+name|maiden\s+name|also\s+known\s+as|name\s+change|deed\s+poll|previous\s+legal\s+name|former\s+surname|birth\s+name)\b` - Corroborative keywords: previous legal names and aliases, previous, legal, names, aliases, personal, identity, demographics, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name (+1710 more) - Example matches: `previous name`, `former name`, `maiden name` - Known false positives: Common words and phrases related to previous legal names and aliases appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Previous legal names and aliases Identifies documents containing references to previous legal names and aliases in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-002-previous-legal-names-and-aliases` - URL: https://testpattern.dev/patterns/global-top500-002-previous-legal-names-and-aliases - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:previous\s+legal\s+names|former\s+name|maiden\s+name|also\s+known\s+as|name\s+change|deed\s+poll|prior\s+surname|previous\s+surname|birth\s+name|assumed\s+name)\b` - Corroborative keywords: previous legal names and aliases, previous, legal, names, aliases, personal, identity, demographics, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name (+72 more) - Example matches: `previous legal names`, `former name`, `maiden name` - Known false positives: Common words and phrases related to previous legal names and aliases appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Pricing engine logic Identifies documents containing references to pricing engine logic in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-215-pricing-engine-logic` - URL: https://testpattern.dev/patterns/au-top500-215-pricing-engine-logic - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:pricing\s+engine\s+logic|pricing\s+algorithm|pricing\s+model|dynamic\s+pricing|price\s+calculation|margin\s+formula|discount\s+logic|trade\s+secret|proprietary\s+pricing|competitive\s+pricing)\b` - Corroborative keywords: pricing engine logic, pricing, engine, logic, intellectual, property, trade, secrets - Example matches: `pricing engine logic`, `pricing algorithm`, `pricing model` - Known false positives: Common words and phrases related to pricing engine logic appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Pricing engine logic Identifies documents containing references to pricing engine logic in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-215-pricing-engine-logic` - URL: https://testpattern.dev/patterns/global-top500-215-pricing-engine-logic - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:pricing\s+engine\s+logic|pricing\s+algorithm|pricing\s+model|intellectual\s+property|trade\s+secrets|proprietary\s+pricing|dynamic\s+pricing|margin\s+calculation|discount\s+logic|rate\s+engine)\b` - Corroborative keywords: pricing engine logic, pricing, engine, logic, intellectual, property, trade, secrets - Example matches: `pricing engine logic`, `pricing algorithm`, `pricing model` - Known false positives: Common words and phrases related to pricing engine logic appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Pricing strategy models Identifies documents containing references to pricing strategy models in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-192-pricing-strategy-models` - URL: https://testpattern.dev/patterns/au-top500-192-pricing-strategy-models - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:pricing\s+strategy|pricing\s+model|price\s+optimization|margin\s+analysis|price\s+elasticity|competitive\s+pricing|discount\s+structure|pricing\s+tier|cost[\s-]+plus\s+pricing|value[\s-]+based\s+pricing|price\s+sensitivity|rate\s+card)\b` - Corroborative keywords: pricing strategy models, pricing, strategy, models, mergers, acquisitions - Example matches: `pricing strategy`, `pricing model`, `price optimization` - Known false positives: Common words and phrases related to pricing strategy models appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Pricing strategy models Identifies documents containing references to pricing strategy models in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-192-pricing-strategy-models` - URL: https://testpattern.dev/patterns/global-top500-192-pricing-strategy-models - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:pricing\s+strategy|price\s+model|pricing\s+optimization|margin\s+analysis|discount\s+structure|price\s+elasticity|competitive\s+pricing|cost[\s-]+plus\s+pricing|price\s+sensitivity|revenue\s+optimization|pricing\s+tier)\b` - Corroborative keywords: pricing strategy models, pricing, strategy, models, mergers, acquisitions - Example matches: `pricing strategy`, `price model`, `pricing optimization` - Known false positives: Common words and phrases related to pricing strategy models appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Prisoner identification number Identifies documents containing references to prisoner identification number in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-036-prisoner-identification-number` - URL: https://testpattern.dev/patterns/au-top500-036-prisoner-identification-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:prisoner\s+identification\s+number|prisoner\s+ID|inmate\s+number|correctional\s+services|custodial\s+number|detention\s+number|prison\s+record|offender\s+ID|justice\s+number)\b` - Corroborative keywords: prisoner identification number, prisoner, identification, number, government, ids, civil, status, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+30 more) - Example matches: `prisoner identification number`, `prisoner id`, `inmate number` - Known false positives: Common words and phrases related to prisoner identification number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Prisoner identification number Identifies documents containing references to prisoner identification number in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-036-prisoner-identification-number` - URL: https://testpattern.dev/patterns/global-top500-036-prisoner-identification-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:prisoner\s+identification\s+number|prisoner\s+ID|inmate\s+number|inmate\s+identification|prisoner\s+number|correctional\s+ID|custodial\s+number|detention\s+number|offender\s+ID|incarceration\s+number|prison\s+record|booking\s+number)\b` - Corroborative keywords: prisoner identification number - Example matches: `prisoner identification number`, `prisoner id`, `inmate number` - Known false positives: Common words and phrases related to prisoner identification number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Privacy complaint investigations Identifies documents containing references to privacy complaint investigations in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-473-privacy-complaint-investigations` - URL: https://testpattern.dev/patterns/au-top500-473-privacy-complaint-investigations - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:privacy\s+complaint\s+investigations|privacy\s+complaint|complaint\s+investigation|OAIC\s+complaint|remedial\s+action|interference\s+with\s+privacy|breach\s+finding)\b` - Corroborative keywords: privacy complaint investigations, privacy, complaint, investigations, compliance, risk - Example matches: `privacy complaint investigations`, `privacy complaint`, `complaint investigation` - Known false positives: Common words and phrases related to privacy complaint investigations appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Privacy complaint investigations Identifies documents containing references to privacy complaint investigations in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-473-privacy-complaint-investigations` - URL: https://testpattern.dev/patterns/global-top500-473-privacy-complaint-investigations - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:privacy\s+complaint|complaint\s+investigation|investigation\s+findings|privacy\s+breach|regulatory\s+complaint|privacy\s+compliance|corrective\s+action|complaint\s+resolution)\b` - Corroborative keywords: privacy complaint investigations, privacy, complaint, investigations, compliance, risk - Example matches: `privacy complaint`, `complaint investigation`, `investigation findings` - Known false positives: Common words and phrases related to privacy complaint investigations appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Private code forks Identifies private code forks patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-242-private-code-forks` - URL: https://testpattern.dev/patterns/au-top500-242-private-code-forks - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:private\s+fork|code\s+fork|forked\s+repository|internal\s+fork|proprietary\s+fork|branch\s+copy|upstream\s+fork|private\s+branch|source\s+fork|code\s+clone)\b` - Corroborative keywords: private code forks, private, code, forks, software, engineering, architecture - Example matches: `private fork`, `code fork`, `forked repository` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Private code forks Identifies private code forks patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-242-private-code-forks` - URL: https://testpattern.dev/patterns/global-top500-242-private-code-forks - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:code\s+fork|private\s+fork|forked\s+repository|branch\s+copy|internal\s+fork|proprietary\s+fork|code\s+branch|derived\s+work|upstream\s+repository|fork\s+access)\b` - Corroborative keywords: private code forks, private, code, forks, software, engineering, architecture - Example matches: `code fork`, `private fork`, `forked repository` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Private source code repositories Identifies private source code repositories patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-241-private-source-code-repositories` - URL: https://testpattern.dev/patterns/au-top500-241-private-source-code-repositories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:private\s+repository|source\s+code|git\s+repository|code\s+repository|private\s+repo|internal\s+repository|proprietary\s+code|version\s+control|access\s+control)\b` - Corroborative keywords: private source code repositories, private, source, code, repositories, software, engineering, architecture - Example matches: `private repository`, `source code`, `git repository` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Private source code repositories Identifies private source code repositories patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-241-private-source-code-repositories` - URL: https://testpattern.dev/patterns/global-top500-241-private-source-code-repositories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:source\s+code|private\s+repository|code\s+repository|git\s+repository|version\s+control|proprietary\s+code|internal\s+repo|confidential\s+source|access\s+control|repository\s+access)\b` - Corroborative keywords: private source code repositories, private, source, code, repositories, software, engineering, architecture - Example matches: `source code`, `private repository`, `code repository` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Privileged account inventories Identifies privileged account inventories patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-309-privileged-account-inventories` - URL: https://testpattern.dev/patterns/au-top500-309-privileged-account-inventories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:privileged\s+account|service\s+account|admin\s+account|root\s+access|domain\s+admin|elevated\s+privileges|privileged\s+access\s+management|break\s+glass\s+account|emergency\s+access|credential\s+vault|account\s+inventory)\b` - Corroborative keywords: privileged account inventories, privileged, account, inventories, operations, resilience - Example matches: `privileged account`, `service account`, `admin account` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Privileged account inventories Identifies privileged account inventories patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-309-privileged-account-inventories` - URL: https://testpattern.dev/patterns/global-top500-309-privileged-account-inventories - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:privileged\s+account|privileged\s+access|service\s+account|admin\s+account|privileged\s+identity|domain\s+admin|root\s+account|break\s+glass|credential\s+vault|access\s+review)\b` - Corroborative keywords: privileged account inventories, privileged, account, inventories, operations, resilience - Example matches: `privileged account`, `privileged access`, `service account` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Probation and parole files Identifies documents containing references to probation and parole files in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-413-probation-and-parole-files` - URL: https://testpattern.dev/patterns/au-top500-413-probation-and-parole-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:probation\s+and\s+parole\s+files|probation\s+order|parole\s+conditions|community\s+corrections|supervised\s+release|parole\s+board|probation\s+officer|offender\s+management|parole\s+hearing|correctional\s+services|reporting\s+conditions|community\s+service\s+order)\b` - Corroborative keywords: probation and parole files, probation, parole, files, law, enforcement, justice, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+31 more) - Example matches: `probation and parole files`, `probation order`, `parole conditions` - Known false positives: Common words and phrases related to probation and parole files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Probation and parole files Identifies documents containing references to probation and parole files in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-413-probation-and-parole-files` - URL: https://testpattern.dev/patterns/global-top500-413-probation-and-parole-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:probation\s+officer|parole\s+board|supervised\s+release|probation\s+conditions|parole\s+hearing|probation\s+violation|parole\s+officer|community\s+supervision|probation\s+report|parole\s+eligibility)\b` - Corroborative keywords: probation and parole files - Example matches: `probation officer`, `parole board`, `supervised release` - Known false positives: Common words and phrases related to probation and parole files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Procurement fraud investigation files Identifies documents containing references to procurement fraud investigation files in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-158-procurement-fraud-investigation-files` - URL: https://testpattern.dev/patterns/au-top500-158-procurement-fraud-investigation-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:procurement\s+fraud\s+investigation\s+files|procurement\s+fraud|fraud\s+investigation|bid\s+rigging|tender\s+irregularity|corrupt\s+conduct|forensic\s+audit)\b` - Corroborative keywords: procurement fraud investigation files, procurement, fraud, investigation, files, supplier, management - Example matches: `procurement fraud investigation files`, `procurement fraud`, `fraud investigation` - Known false positives: Common words and phrases related to procurement fraud investigation files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Procurement fraud investigation files Identifies documents containing references to procurement fraud investigation files in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-158-procurement-fraud-investigation-files` - URL: https://testpattern.dev/patterns/global-top500-158-procurement-fraud-investigation-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:procurement\s+fraud\s+investigation\s+files|procurement\s+fraud|fraud\s+investigation|supplier\s+fraud|tender\s+irregularity|bid\s+rigging|forensic\s+audit|conflict\s+of\s+interest|due\s+diligence)\b` - Corroborative keywords: procurement fraud investigation files, procurement, fraud, investigation, files, supplier, management - Example matches: `procurement fraud investigation files`, `procurement fraud`, `fraud investigation` - Known false positives: Common words and phrases related to procurement fraud investigation files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Procurement Tender Evaluation with Pricing Detects weighted evaluation matrices scoring tender responses, including commercial pricing from multiple bidders in government procurement processes. - Slug: `procurement-tender-evaluation-with-pricing` - URL: https://testpattern.dev/patterns/procurement-tender-evaluation-with-pricing - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Financial Accountability Act 2009 (Qld) - Data categories: financial, government - Scope: wide - Risk rating: 8 - Pattern: `QLD-\d{4}-\d{3,6}` - Corroborative keywords: tender, procurement, RFT, RFP, ITT, evaluation, assessment, scoring, price, cost, value for money, confidential, PROTECTED, probity, evaluation committee, financial, fiscal, monetary, accounting, treasury (+25 more) - Example matches: `PROTECTED — Tender Evaluation Report. RFT QLD-2026-04521: ICT Infrastructure Services. Evaluation committee scoring: Tenderer A — Technical: 78/100, Price: $14.2M. Tenderer B — Technical: 82/100, Price: $16.8M. Value for money assessment: Tenderer A recommended. Probity advisor: approved.`, `Commercial-in-Confidence. Procurement evaluation matrix — Road construction RFP. Weighted criteria: Price 40%, Methodology 30%, Experience 30%. Bidder pricing: Company X $45.6M, Company Y $52.1M, Company Z $48.3M. Recommendation to evaluation committee.` - Known false positives: Published tender notices and procurement advertisements on QTenders; Procurement policy templates with example scoring matrices ### Product hazard analyses Identifies documents containing references to product hazard analyses in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-239-product-hazard-analyses` - URL: https://testpattern.dev/patterns/au-top500-239-product-hazard-analyses - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:product\s+hazard|hazard\s+analysis|risk\s+assessment|safety\s+hazard|hazard\s+identification|risk\s+mitigation|safety\s+analysis|product\s+recall|consumer\s+safety|hazard\s+control)\b` - Corroborative keywords: product hazard analyses, product, hazard, analyses, quality, safety - Example matches: `product hazard`, `hazard analysis`, `risk assessment` - Known false positives: Common words and phrases related to product hazard analyses appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Product hazard analyses Identifies documents containing references to product hazard analyses in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-239-product-hazard-analyses` - URL: https://testpattern.dev/patterns/global-top500-239-product-hazard-analyses - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:product\s+hazard|hazard\s+analysis|risk\s+assessment|safety\s+hazard|hazard\s+identification|risk\s+mitigation|hazard\s+control|safety\s+analysis|product\s+safety)\b` - Corroborative keywords: product hazard analyses, product, hazard, analyses, quality, safety - Example matches: `product hazard`, `hazard analysis`, `risk assessment` - Known false positives: Common words and phrases related to product hazard analyses appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Product recall decision files Identifies documents containing references to product recall decision files in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-228-product-recall-decision-files` - URL: https://testpattern.dev/patterns/au-top500-228-product-recall-decision-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:product\s+recall\s+decision|recall\s+notice|product\s+recall|safety\s+recall|mandatory\s+recall|voluntary\s+recall|consumer\s+safety|hazard\s+notification|recall\s+action|product\s+withdrawal)\b` - Corroborative keywords: product recall decision files, product, recall, decision, files, quality, safety - Example matches: `product recall decision`, `recall notice`, `product recall` - Known false positives: Common words and phrases related to product recall decision files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Product recall decision files Identifies documents containing references to product recall decision files in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-228-product-recall-decision-files` - URL: https://testpattern.dev/patterns/global-top500-228-product-recall-decision-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:product\s+recall\s+decision\s+files|product\s+recall|recall\s+decision|safety\s+recall|quality\s+recall|hazard\s+assessment|recall\s+notice|consumer\s+safety|recall\s+investigation|voluntary\s+recall)\b` - Corroborative keywords: product recall decision files, product, recall, decision, files, quality, safety - Example matches: `product recall decision files`, `product recall`, `recall decision` - Known false positives: Common words and phrases related to product recall decision files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Product requirement specifications Identifies documents containing references to product requirement specifications in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-221-product-requirement-specifications` - URL: https://testpattern.dev/patterns/au-top500-221-product-requirement-specifications - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:product\s+requirement\s+specifications|requirements\s+document|functional\s+requirements|technical\s+specifications|product\s+specification|design\s+requirements|acceptance\s+criteria|quality\s+standard|compliance\s+requirement|performance\s+specification)\b` - Corroborative keywords: product requirement specifications, product, requirement, specifications, quality, safety - Example matches: `product requirement specifications`, `requirements document`, `functional requirements` - Known false positives: Common words and phrases related to product requirement specifications appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Product requirement specifications Identifies documents containing references to product requirement specifications in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-221-product-requirement-specifications` - URL: https://testpattern.dev/patterns/global-top500-221-product-requirement-specifications - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:product\s+requirement\s+specifications|product\s+requirements|functional\s+specification|product\s+specification|quality\s+assurance|safety\s+requirements|acceptance\s+criteria|design\s+input|requirements\s+document|technical\s+specification)\b` - Corroborative keywords: product requirement specifications, product, requirement, specifications, quality, safety - Example matches: `product requirement specifications`, `product requirements`, `functional specification` - Known false positives: Common words and phrases related to product requirement specifications appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Product sunset plans Identifies documents containing references to product sunset plans in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-194-product-sunset-plans` - URL: https://testpattern.dev/patterns/au-top500-194-product-sunset-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:product\s+sunset|sunset\s+plan|end\s+of\s+life|EOL\s+plan|product\s+discontinuation|product\s+retirement|phase[\s-]+out\s+plan|deprecation\s+plan|migration\s+plan|legacy\s+product|product\s+lifecycle)\b` - Corroborative keywords: product sunset plans, product, sunset, plans, mergers, acquisitions, strategy - Example matches: `product sunset`, `sunset plan`, `end of life` - Known false positives: Common words and phrases related to product sunset plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Product sunset plans Identifies documents containing references to product sunset plans in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-194-product-sunset-plans` - URL: https://testpattern.dev/patterns/global-top500-194-product-sunset-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:product\s+sunset|end\s+of\s+life|product\s+discontinuation|deprecation\s+plan|product\s+retirement|sunset\s+timeline|migration\s+plan|customer\s+notification|legacy\s+product|product\s+lifecycle)\b` - Corroborative keywords: product sunset plans, product, sunset, plans, mergers, acquisitions, strategy - Example matches: `product sunset`, `end of life`, `product discontinuation` - Known false positives: Common words and phrases related to product sunset plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Professional license number Identifies documents containing references to professional license number in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-038-professional-license-number` - URL: https://testpattern.dev/patterns/au-top500-038-professional-license-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:professional\s+license\s+number)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: professional license number, professional, license, number, government, ids, civil, status, drivers licence, driver licence, drivers license, driver license, DL, licence number, license number, ID, identifier, reference, code, index (+23 more) - Example matches: `Professional license number`, `professional license number`, `Professional license number` - Known false positives: Common words and phrases related to professional license number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Professional license number Identifies documents containing references to professional license number in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-038-professional-license-number` - URL: https://testpattern.dev/patterns/global-top500-038-professional-license-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:professional\s+license\s+number)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: professional license number, drivers licence, driver licence, drivers license, driver license, DL, licence number, license number, ID, identifier, number, reference, code, index, serial, account, file number, case number, record number, ref (+17 more) - Example matches: `structured record with identifier and contextual anchors` - Known false positives: Common words and phrases related to professional license number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Proprietary algorithm designs Identifies documents containing references to proprietary algorithm designs in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-201-proprietary-algorithm-designs` - URL: https://testpattern.dev/patterns/au-top500-201-proprietary-algorithm-designs - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:proprietary\s+algorithm|algorithm\s+design|proprietary\s+logic|trade\s+secret|confidential\s+algorithm|intellectual\s+property|source\s+code|machine\s+learning\s+model|neural\s+network|computational\s+method|proprietary\s+software|algorithm\s+specification)\b` - Corroborative keywords: proprietary algorithm designs, proprietary, algorithm, designs, intellectual, property, trade, secrets, intellectual property, trade secret, patent, copyright, trademark, confidential, invention, prototype, formula, source code, design document, research and development (+7 more) - Example matches: `proprietary algorithm`, `algorithm design`, `proprietary logic` - Known false positives: Common words and phrases related to proprietary algorithm designs appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Proprietary algorithm designs Identifies documents containing references to proprietary algorithm designs in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-201-proprietary-algorithm-designs` - URL: https://testpattern.dev/patterns/global-top500-201-proprietary-algorithm-designs - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:proprietary\s+algorithm|trade\s+secret|confidential\s+design|intellectual\s+property|source\s+code|machine\s+learning\s+model|neural\s+network\s+architecture|algorithm\s+specification|computational\s+method|proprietary\s+logic|software\s+patent)\b` - Corroborative keywords: proprietary algorithm designs, proprietary, algorithm, designs, intellectual, property, trade, secrets, intellectual property, trade secret, patent, copyright, trademark, confidential, invention, prototype, formula, source code, design document, research and development (+36 more) - Example matches: `proprietary algorithm`, `trade secret`, `confidential design` - Known false positives: Common words and phrases related to proprietary algorithm designs appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Proprietary training datasets Identifies documents containing references to proprietary training datasets in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-214-proprietary-training-datasets` - URL: https://testpattern.dev/patterns/au-top500-214-proprietary-training-datasets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:proprietary\s+training\s+datasets|training\s+data|machine\s+learning\s+dataset|model\s+training|labelled\s+data|annotation\s+data|intellectual\s+property|proprietary\s+dataset|confidential\s+data|ground\s+truth\s+data)\b` - Corroborative keywords: proprietary training datasets, proprietary, training, datasets, intellectual, property, trade, secrets, intellectual property, trade secret, patent, copyright, trademark, confidential, invention, prototype, algorithm, formula, source code, design document (+25 more) - Example matches: `proprietary training datasets`, `training data`, `machine learning dataset` - Known false positives: Common words and phrases related to proprietary training datasets appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Proprietary training datasets Identifies documents containing references to proprietary training datasets in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-214-proprietary-training-datasets` - URL: https://testpattern.dev/patterns/global-top500-214-proprietary-training-datasets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:proprietary\s+training\s+datasets|training\s+data|machine\s+learning\s+dataset|intellectual\s+property|trade\s+secrets|proprietary\s+data|model\s+training|labeled\s+data|confidential\s+dataset|data\s+pipeline)\b` - Corroborative keywords: proprietary training datasets, proprietary, training, datasets, intellectual, property, trade, secrets, intellectual property, trade secret, patent, copyright, trademark, confidential, invention, prototype, algorithm, formula, source code, design document (+37 more) - Example matches: `proprietary training datasets`, `training data`, `machine learning dataset` - Known false positives: Common words and phrases related to proprietary training datasets appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Protective order application records Identifies documents containing references to protective order application records in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-419-protective-order-application-records` - URL: https://testpattern.dev/patterns/au-top500-419-protective-order-application-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:protective\s+order\s+application\s+records|apprehended\s+violence\s+order|AVO\s+application|restraining\s+order|intervention\s+order|domestic\s+violence\s+order|protection\s+order|family\s+violence\s+order|personal\s+safety\s+order|court\s+protection|respondent\s+details|applicant\s+details)\b` - Corroborative keywords: protective order application records, protective, order, application, records, law, enforcement, justice, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant (+32 more) - Example matches: `protective order application records`, `apprehended violence order`, `AVO application` - Known false positives: Common words and phrases related to protective order application records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Protective order application records Identifies documents containing references to protective order application records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-419-protective-order-application-records` - URL: https://testpattern.dev/patterns/global-top500-419-protective-order-application-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:protective\s+order|restraining\s+order|protection\s+order|no[\s-]+contact\s+order|domestic\s+violence\s+order|order\s+of\s+protection|temporary\s+protective\s+order|emergency\s+protective\s+order|protection\s+application|stay[\s-]+away\s+order|harassment\s+order|protective\s+injunction)\b` - Corroborative keywords: protective order application records - Example matches: `protective order`, `restraining order`, `protection order` - Known false positives: Common words and phrases related to protective order application records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Prototype engineering designs Identifies documents containing references to prototype engineering designs in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-204-prototype-engineering-designs` - URL: https://testpattern.dev/patterns/au-top500-204-prototype-engineering-designs - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:prototype\s+design|engineering\s+design|prototype\s+engineering|CAD\s+drawing|technical\s+drawing|design\s+specification|bill\s+of\s+materials|proof\s+of\s+concept|industrial\s+design|trade\s+secret)\b` - Corroborative keywords: prototype engineering designs, prototype, engineering, designs, intellectual, property, trade, secrets - Example matches: `prototype design`, `engineering design`, `prototype engineering` - Known false positives: Common words and phrases related to prototype engineering designs appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Prototype engineering designs Identifies documents containing references to prototype engineering designs in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-204-prototype-engineering-designs` - URL: https://testpattern.dev/patterns/global-top500-204-prototype-engineering-designs - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:prototype\s+design|engineering\s+drawing|CAD\s+model|design\s+specification|bill\s+of\s+materials|proof\s+of\s+concept|technical\s+drawing|schematic\s+diagram|product\s+prototype|design\s+revision)\b` - Corroborative keywords: prototype engineering designs, prototype, engineering, designs, intellectual, property, trade, secrets - Example matches: `prototype design`, `engineering drawing`, `CAD model` - Known false positives: Common words and phrases related to prototype engineering designs appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Provider identifier records Identifies provider identifier records references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `au-top500-337-provider-identifier-records` - URL: https://testpattern.dev/patterns/au-top500-337-provider-identifier-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:provider\s+identifier\s+records)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: provider identifier records, provider, identifier, records, health, biomedical, information, patient, clinical, medical, hospital, practitioner, diagnosis, treatment, prescription, physician, nurse, therapy, examination, consultation (+29 more) - Example matches: `Provider identifier records`, `provider identifier records`, `Provider identifier records` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### Provider identifier records Identifies provider identifier records references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `global-top500-337-provider-identifier-records` - URL: https://testpattern.dev/patterns/global-top500-337-provider-identifier-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:provider\s+identifier\s+records)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: provider identifier records, provider, identifier, records, health, biomedical, information, patient, clinical, medical, hospital, practitioner, diagnosis, treatment, prescription, physician, nurse, therapy, examination, consultation (+29 more) - Example matches: `Provider identifier records`, `provider identifier records`, `Provider identifier records` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### PSPF Security Classification Detects Protective Security Policy Framework (PSPF) security classification markers in Australian Government documents. - Slug: `au-pspf-security-classification` - URL: https://testpattern.dev/patterns/au-pspf-security-classification - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: 2006 MOU National Security, Criminal Code Act 1995 (Cth) - Data categories: government, security-classification - Scope: narrow - Risk rating: 10 - Example matches: `OFFICIAL: Sensitive - Protective Security Policy Framework`, `Security classification: PROTECTED per PSPF guidelines`, `Document marked SECRET with NATIONAL CABINET handling caveat` - Known false positives: Generic use of official or protected in non-classification contexts. ### Psychometric assessment results Identifies documents containing references to psychometric assessment results in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-073-psychometric-assessment-results` - URL: https://testpattern.dev/patterns/au-top500-073-psychometric-assessment-results - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:psychometric\s+assessment|psychometric\s+test|personality\s+profile|cognitive\s+assessment|aptitude\s+test|behavioural\s+assessment|psychological\s+assessment|test\s+results|candidate\s+profile|assessment\s+score|psychometric\s+report|personality\s+assessment)\b` - Corroborative keywords: psychometric assessment results, psychometric, assessment, results, employment, workforce, records - Example matches: `psychometric assessment`, `psychometric test`, `personality profile` - Known false positives: Common words and phrases related to psychometric assessment results appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Psychometric assessment results Identifies documents containing references to psychometric assessment results in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-073-psychometric-assessment-results` - URL: https://testpattern.dev/patterns/global-top500-073-psychometric-assessment-results - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:psychometric\s+assessment|personality\s+test|aptitude\s+test|cognitive\s+assessment|psychometric\s+score|behavioral\s+assessment|test\s+results|psychological\s+profile|assessment\s+battery|psychometric\s+report|ability\s+test)\b` - Corroborative keywords: psychometric assessment results, psychometric, assessment, results, employment, workforce, records - Example matches: `psychometric assessment`, `personality test`, `aptitude test` - Known false positives: Common words and phrases related to psychometric assessment results appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Public housing assistance files Identifies documents containing references to public housing assistance files in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-384-public-housing-assistance-files` - URL: https://testpattern.dev/patterns/au-top500-384-public-housing-assistance-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:public\s+housing\s+assistance\s+files|public\s+housing|housing\s+assistance|social\s+housing|rent\s+assistance|community\s+housing|housing\s+commission)\b` - Corroborative keywords: public housing assistance files, public, housing, assistance, files, government, citizen, services, student, transcript, grade, GPA, enrollment, FERPA, FAFSA, financial aid, tuition, degree, field, column (+27 more) - Example matches: `public housing assistance files`, `public housing`, `housing assistance` - Known false positives: Common words and phrases related to public housing assistance files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Public housing assistance files Identifies documents containing references to public housing assistance files in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-384-public-housing-assistance-files` - URL: https://testpattern.dev/patterns/global-top500-384-public-housing-assistance-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:public\s+housing\s+assistance\s+files|housing\s+application|rental\s+assistance|housing\s+voucher|tenant\s+eligibility|housing\s+subsidy|social\s+housing|housing\s+waitlist|accommodation\s+support|housing\s+authority|rent\s+supplement|housing\s+allocation)\b` - Corroborative keywords: public housing assistance files, student, transcript, grade, GPA, enrollment, FERPA, FAFSA, financial aid, tuition, degree, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `public housing assistance files`, `housing application`, `rental assistance` - Known false positives: Common words and phrases related to public housing assistance files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Purchase history Identifies documents containing references to purchase history in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-363-purchase-history` - URL: https://testpattern.dev/patterns/au-top500-363-purchase-history - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:purchase\s+history|transaction\s+history|order\s+history|shopping\s+cart|order\s+number|payment\s+record|buying\s+pattern|transaction\s+log|sales\s+record)\b` - Corroborative keywords: purchase history, purchase, history, customer, commercial, data - Example matches: `purchase history`, `transaction history`, `order history` - Known false positives: Common words and phrases related to purchase history appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Purchase history Identifies documents containing references to purchase history in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-363-purchase-history` - URL: https://testpattern.dev/patterns/global-top500-363-purchase-history - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:purchase\s+history|order\s+history|transaction\s+log|buying\s+pattern|shopping\s+cart|order\s+record|purchase\s+date|transaction\s+history|invoice\s+detail|payment\s+record|customer\s+order|receipt\s+data)\b` - Corroborative keywords: purchase history, purchase, history, customer, commercial, data - Example matches: `purchase history`, `order history`, `transaction log` - Known false positives: Common words and phrases related to purchase history appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Purchase order records Identifies documents containing references to purchase order records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-143-purchase-order-records` - URL: https://testpattern.dev/patterns/au-top500-143-purchase-order-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:purchase\s+order|PO\s+number|procurement\s+order|order\s+confirmation|delivery\s+schedule|goods\s+receipt|purchase\s+requisition|supplier\s+order|order\s+value)\b` - Corroborative keywords: purchase order records, purchase, order, records, procurement, supplier, management - Example matches: `purchase order`, `po number`, `procurement order` - Known false positives: Common words and phrases related to purchase order records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Purchase order records Identifies documents containing references to purchase order records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-143-purchase-order-records` - URL: https://testpattern.dev/patterns/global-top500-143-purchase-order-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:purchase\s+order|PO\s+number|procurement\s+order|order\s+confirmation|purchase\s+requisition|delivery\s+schedule|goods\s+receipt|order\s+value|line\s+item|purchase\s+commitment|blanket\s+order)\b` - Corroborative keywords: purchase order records, purchase, order, records, procurement, supplier, management - Example matches: `purchase order`, `po number`, `procurement order` - Known false positives: Common words and phrases related to purchase order records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Purple team exercise plans Identifies purple team exercise plans patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-294-purple-team-exercise-plans` - URL: https://testpattern.dev/patterns/au-top500-294-purple-team-exercise-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:purple\s+team|tabletop|adversary\s+emulation|exercise\s+plan)\b` - Corroborative keywords: purple team exercise plans, purple, team, exercise, plans, security, operations, threat, data - Example matches: `Purple team exercise plans`, `purple team exercise plans`, `Purple team exercise plans` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Purple team exercise plans Identifies purple team exercise plans patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-294-purple-team-exercise-plans` - URL: https://testpattern.dev/patterns/global-top500-294-purple-team-exercise-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:purple\s+team|tabletop|adversary\s+emulation|exercise\s+plan)\b` - Corroborative keywords: purple team exercise plans, purple, team, exercise, plans, security, operations, threat, data - Example matches: `Purple team exercise plans`, `purple team exercise plans`, `Purple team exercise plans` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### QLD Blue Card Application Detects QLD Blue Card working with children check applications and screening documents. - Slug: `au-qld-blue-card-application` - URL: https://testpattern.dev/patterns/au-qld-blue-card-application - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii, government, children - Scope: narrow - Risk rating: 8 - Example matches: `Blue Card application for child-related work with police check`, `Working with children check: Blue Card Services suitability notice`, `Volunteer Blue Card number and child safety screening results` - Known false positives: Blue card references in non-child-safety contexts. ### QLD Bond Loan Application Detects QLD Bond Loan applications for rental assistance and financial hardship support. - Slug: `au-qld-bond-loan-application` - URL: https://testpattern.dev/patterns/au-qld-bond-loan-application - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: pii, financial, government - Scope: narrow - Risk rating: 7 - Example matches: `Bond loan application for rental bond assistance due to financial hardship`, `QLD RTA bond loan with rental grant and tenancy support`, `Bond assistance application for rental arrears and housing assistance` - Known false positives: Government bonds or entertainment references. ### QLD Building Approval Detects QLD building approval documents including QBCC permits and development applications. - Slug: `au-qld-building-approval` - URL: https://testpattern.dev/patterns/au-qld-building-approval - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: IPA 2009 (Qld), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: government, infrastructure - Scope: narrow - Risk rating: 5 - Example matches: `QBCC building approval: development application and building permit`, `Building certifier compliance certificate and occupancy certificate`, `QLD building approval for building work per building code requirements` - Known false positives: Generic approval or building in non-construction contexts. ### QLD Driver Licence Form Detects QLD Transport and Main Roads driver licence application and renewal forms. - Slug: `au-qld-driver-licence-form` - URL: https://testpattern.dev/patterns/au-qld-driver-licence-form - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: pii, government - Scope: narrow - Risk rating: 7 - Example matches: `TMR driver licence application: learner licence identity verification`, `Queensland driver licence renewal form with photo ID and licence class`, `Transport and Main Roads provisional licence application` - Known false positives: Software or entertainment licence references. ### QLD Government Tender Document Detects QLD Government tender documents including procurement evaluations, pricing schedules, and evaluation criteria. - Slug: `au-qld-government-tender` - URL: https://testpattern.dev/patterns/au-qld-government-tender - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: government, financial - Scope: narrow - Risk rating: 8 - Example matches: `QLD Government request for tender: evaluation criteria and value for money`, `QTender procurement tender submission with selection criteria`, `Tender evaluation report and standing offer arrangement details` - Known false positives: Metaphorical or currency use of tender. ### QLD Health Clinical Handover Detects QLD Health clinical handover documents containing patient status, medications, and treatment plans. - Slug: `au-qld-health-clinical-handover` - URL: https://testpattern.dev/patterns/au-qld-health-clinical-handover - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: phi, health, government - Scope: narrow - Risk rating: 9 - Example matches: `Clinical handover ISBAR: patient status and current medications`, `Nursing handover sheet with treatment plan and clinical notes`, `QLD Health bedside handover with shift observations and patient handover` - Known false positives: Generic handover in non-clinical contexts. ### QLD Health Medical Record Detects QLD Health medical record references including MRN/URN identifiers and clinical documentation. - Slug: `au-qld-health-medical-record` - URL: https://testpattern.dev/patterns/au-qld-health-medical-record - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: phi, health, government - Scope: narrow - Risk rating: 9 - Example matches: `Medical record number (MRN): 12345678 clinical documentation`, `QLD Health patient record with URN and discharge summary`, `Health record patient chart and medical history review` - Known false positives: Generic record references in non-medical contexts. ### QLD Health Patient Consent Detects QLD Health patient consent forms including advance directives and enduring power of attorney documents. - Slug: `au-qld-health-patient-consent` - URL: https://testpattern.dev/patterns/au-qld-health-patient-consent - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: phi, health, legal, government - Scope: narrow - Risk rating: 9 - Example matches: `Patient consent form: informed consent for surgical procedure`, `Advance health directive and enduring power of attorney (EPOA) registered`, `QLD Health treatment consent with substitute decision maker details` - Known false positives: Digital consent in non-health contexts. ### QLD Heavy Vehicle Permit Detects QLD heavy vehicle permits and transport operator access permissions. - Slug: `au-qld-heavy-vehicle-permit` - URL: https://testpattern.dev/patterns/au-qld-heavy-vehicle-permit - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: IPA 2009 (Qld), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: government, transport - Scope: narrow - Risk rating: 5 - Example matches: `Heavy vehicle permit: NHVR access permit for B-double route assessment`, `QLD oversize over-dimensional transport permit application`, `National Heavy Vehicle Regulator road train mass limit permit` - Known false positives: Generic vehicle or heavy references. ### QLD Home Education Registration Detects QLD home education registration documents for homeschooled children. - Slug: `au-qld-home-education-registration` - URL: https://testpattern.dev/patterns/au-qld-home-education-registration - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii, children, education, government - Scope: narrow - Risk rating: 6 - Example matches: `Home education registration: HEU learning plan for compulsory school age`, `QLD Home Education Unit provisional registration and education program`, `Home schooling education plan submitted to Home Education Unit` - Known false positives: Generic education or home references. ### QLD Housing Application Detects QLD social housing applications and housing assistance eligibility documents. - Slug: `au-qld-housing-application` - URL: https://testpattern.dev/patterns/au-qld-housing-application - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: pii, financial, government - Scope: narrow - Risk rating: 7 - Example matches: `Social housing application: housing register and housing needs assessment`, `QLD Department of Housing rental assistance and housing eligibility`, `Public housing wait list and community housing supported accommodation` - Known false positives: Generic housing market references. ### QLD Marine Registration Detects QLD marine vessel registration documents and operator licence details. - Slug: `au-qld-marine-registration` - URL: https://testpattern.dev/patterns/au-qld-marine-registration - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: IPA 2009 (Qld), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: government, transport - Scope: narrow - Risk rating: 5 - Example matches: `QLD marine registration: vessel registration with Maritime Safety Queensland`, `Boat licence and recreational vessel registration number`, `MSQ commercial vessel survey and hull identification registration` - Known false positives: Generic marine references in non-registration contexts. ### QLD Mental Health Assessment Detects QLD mental health assessment documents including psychiatric evaluations and involuntary treatment orders. - Slug: `au-qld-mental-health-assessment` - URL: https://testpattern.dev/patterns/au-qld-mental-health-assessment - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: phi, health, government - Scope: narrow - Risk rating: 10 - Example matches: `Mental health assessment: involuntary treatment authority under Mental Health Act`, `Psychiatric assessment for mental health tribunal forensic order review`, `QLD mental health review with examination authority and treatment plan` - Known false positives: Mental health awareness content in non-clinical contexts. ### QLD Notifiable Condition Report Detects QLD notifiable condition reports for public health surveillance and disease notifications. - Slug: `au-qld-notifiable-condition-report` - URL: https://testpattern.dev/patterns/au-qld-notifiable-condition-report - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: phi, health, government - Scope: narrow - Risk rating: 9 - Example matches: `Notifiable condition report: communicable disease notification to public health unit`, `QLD Health notification with contact tracing and surveillance data`, `Public health notification for outbreak notification and case notification` - Known false positives: Generic notification or disease in non-surveillance contexts. ### QLD School Incident Report Detects QLD school incident reports containing student behavioural and disciplinary details. - Slug: `au-qld-school-incident-report` - URL: https://testpattern.dev/patterns/au-qld-school-incident-report - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii, children, education, government - Scope: narrow - Risk rating: 7 - Example matches: `School incident report: student behaviour and disciplinary suspension`, `OneSchool behavioural incident record with student welfare assessment`, `QLD school discipline exclusion report and duty of care documentation` - Known false positives: Generic incident reports in non-school contexts. ### QLD Special Needs Education Plan Detects QLD special needs education plans containing children's disability and learning support details. - Slug: `au-qld-special-needs-education-plan` - URL: https://testpattern.dev/patterns/au-qld-special-needs-education-plan - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: pii, children, health, education, government - Scope: narrow - Risk rating: 8 - Example matches: `Individual education plan (IEP) with verified disability and learning support`, `QLD Education Adjustment Program: special needs reasonable adjustment`, `Special education support plan for student with learning difficulty` - Known false positives: Generic special needs or education references. ### QLD Student Enrolment Form Detects QLD student enrolment forms containing children's personal information and family details. - Slug: `au-qld-student-enrolment-form` - URL: https://testpattern.dev/patterns/au-qld-student-enrolment-form - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii, children, education, government - Scope: narrow - Risk rating: 7 - Example matches: `Student enrolment form: parent details and emergency contact information`, `QLD school enrolment application with immunisation and medical conditions`, `Prep enrolment student details and guardian details form` - Known false positives: Generic enrolment in non-school contexts. ### QLD Treasury Pre-Release Budget Allocation Detects unreleased Queensland state budget allocation figures, forward estimates, and expenditure projections. These are market-moving documents that enable insider trading on government-linked securities if disclosed prematurely. - Slug: `qld-treasury-pre-release-budget-allocation` - URL: https://testpattern.dev/patterns/qld-treasury-pre-release-budget-allocation - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Corporations Act 2001 (Cth), Criminal Code 1899 (Qld), RTI Act 2009 (Qld) - Data categories: financial, government - Scope: wide - Risk rating: 10 - Pattern: `\$[\d,.]+\s*[MBKmb]?` - Corroborative keywords: budget, forward estimates, appropriation, Treasury, Queensland Treasury, QTC, CBRC, allocation, expenditure, capital program, pre-release, draft, not for distribution, PROTECTED, financial, fiscal, monetary, accounting, treasury, audit (+22 more) - Example matches: `PROTECTED - Queensland Treasury - CBRC Budget Submission Draft FY26-27. Total new appropriation request: $2,450M across capital program and recurrent expenditure. Forward estimates show growth of 3.2% over the forward estimates period. NOT FOR DISTRIBUTION.`, `Draft budget allocation — Queensland Treasury Corporation. Capital program allocation $890M for transport infrastructure. This document is pre-release and must not be distributed outside authorised Treasury personnel.`, `PROTECTED. Forward Estimates Update - QLD Treasury. Revised appropriation: Health $18.2B, Education $14.7B, Transport $6.3B. Draft — not for publication until Treasurer's budget speech.` - Known false positives: Published budget papers and budget-related media releases that reference Treasury and dollar amounts; Budget submission templates with placeholder amounts ### QLD Vehicle Registration Form Detects QLD vehicle registration forms containing ownership details and vehicle identifiers. - Slug: `au-qld-vehicle-registration-form` - URL: https://testpattern.dev/patterns/au-qld-vehicle-registration-form - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii, government, transport - Scope: narrow - Risk rating: 6 - Example matches: `TMR vehicle registration form: registration renewal and CTP insurance`, `QLD Transport and Main Roads vehicle transfer and registration certificate`, `Vehicle inspection roadworthy certificate for registration renewal` - Known false positives: Generic registration in non-vehicle contexts. ### QPS Incident Report Detects Queensland Police Service (QPS) incident reports containing operational details about reported offences, informant information, and occurrence records. These are non-covert operational documents that are sensitive due to informant and victim details but do not involve covert methodology or life-safety risks. - Slug: `qps-incident-report` - URL: https://testpattern.dev/patterns/qps-incident-report - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: PPRA 2000 (Qld), Police Service Admin Act 1990 (Qld) - Data categories: law-enforcement, government - Scope: narrow - Risk rating: 7 - Pattern: `(?i)\b(QPS\s+incident\s+report|occurrence\s+(?:number|report)|reporting\s+officer|offence\s+code|QPRIME\s+(?:entry|reference|record)|QP-\d{4}-\d{5,7}|OCC-\d{5,7})\b` - Corroborative keywords: SENSITIVE, Law-Enforcement, QPS, Queensland Police Service, incident report, occurrence number, reporting officer, QPRIME, offence code, informant, complainant, person of interest, attending officer, patrol group, investigation, enforcement, prosecution, arrest, evidence, forensic (+50 more) - Example matches: `SENSITIVE Law-Enforcement. QPS Incident Report. Occurrence Number: OCC-0458723. Reporting Officer: Sgt M. Thompson, Badge 14892, Fortitude Valley Patrol Group. Date of Occurrence: 14 February 2026. Offence Code: 0711 — Assault Occasioning Bodily Harm. Informant: Ms J. Williams attended Fortitude Valley station at 2245hrs. QPRIME entry created.`, `Queensland Police Service — QPRIME Record. Reference: QP-2026-0034521. Incident Classification: Break and Enter — Dwelling. Location: 42 Boundary Street, West End QLD 4101. Attending Officers: Const. A. Chen (Badge 22104), Const. R. Patel (Badge 22356). Complainant provided statutory declaration. Forensic examination requested. Offence code 0521 recorded.`, `QPS Occurrence Report — OCC-0612984. Traffic incident involving pedestrian at intersection of George and Elizabeth Streets, Brisbane CBD. Reporting officer Senior Constable D. Murray, South Brisbane District. Informant transported to RBWH. Witness statements obtained from three bystanders. Person of interest identified via CCTV. QPRIME updated.` - Known false positives: Published QPS annual statistical reviews and crime reports; QPS media releases about charged persons and completed investigations; Crime fiction and television scripts referencing police terminology ### Quality management review notes Identifies documents containing references to quality management review notes in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-237-quality-management-review-notes` - URL: https://testpattern.dev/patterns/au-top500-237-quality-management-review-notes - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:quality\s+management|management\s+review|quality\s+review|ISO\s+9001|audit\s+findings|quality\s+objectives|continual\s+improvement|quality\s+metrics|nonconformance\s+report)\b` - Corroborative keywords: quality management review notes, quality, management, review, notes, product, safety - Example matches: `quality management`, `management review`, `quality review` - Known false positives: Common words and phrases related to quality management review notes appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Quality management review notes Identifies documents containing references to quality management review notes in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-237-quality-management-review-notes` - URL: https://testpattern.dev/patterns/global-top500-237-quality-management-review-notes - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:quality\s+management|management\s+review|quality\s+review|quality\s+system|audit\s+findings|quality\s+objectives|continuous\s+improvement|quality\s+metrics|ISO\s+9001)\b` - Corroborative keywords: quality management review notes, quality, management, review, notes, product, safety - Example matches: `quality management`, `management review`, `quality review` - Known false positives: Common words and phrases related to quality management review notes appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Quality nonconformance reports Identifies documents containing references to quality nonconformance reports in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-227-quality-nonconformance-reports` - URL: https://testpattern.dev/patterns/au-top500-227-quality-nonconformance-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:quality\s+nonconformance\s+reports|nonconformance\s+report|quality\s+deviation|corrective\s+action|preventive\s+action|quality\s+audit|quality\s+deficiency)\b` - Corroborative keywords: quality nonconformance reports, quality, nonconformance, reports, product, safety - Example matches: `quality nonconformance reports`, `nonconformance report`, `quality deviation` - Known false positives: Common words and phrases related to quality nonconformance reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Quality nonconformance reports Identifies documents containing references to quality nonconformance reports in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-227-quality-nonconformance-reports` - URL: https://testpattern.dev/patterns/global-top500-227-quality-nonconformance-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:quality\s+nonconformance\s+reports|nonconformance\s+report|quality\s+deviation|product\s+quality|safety\s+finding|corrective\s+action|quality\s+incident|disposition\s+report|quality\s+audit)\b` - Corroborative keywords: quality nonconformance reports, quality, nonconformance, reports, product, safety - Example matches: `quality nonconformance reports`, `nonconformance report`, `quality deviation` - Known false positives: Common words and phrases related to quality nonconformance reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Rail signaling configurations Identifies documents containing references to rail signaling configurations in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-450-rail-signaling-configurations` - URL: https://testpattern.dev/patterns/au-top500-450-rail-signaling-configurations - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:rail\s+signaling\s+configurations|track\s+circuit|axle\s+counter|block\s+section|route\s+setting|wayside\s+equipment|signal\s+aspect|critical\s+infrastructure)\b` - Corroborative keywords: rail signaling configurations, rail, signaling, configurations, critical, infrastructure, systems - Example matches: `rail signaling configurations`, `track circuit`, `axle counter` - Known false positives: Common words and phrases related to rail signaling configurations appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Rail signaling configurations Identifies documents containing references to rail signaling configurations in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-450-rail-signaling-configurations` - URL: https://testpattern.dev/patterns/global-top500-450-rail-signaling-configurations - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:rail\s+signaling|signal\s+configuration|block\s+section|train\s+control|track\s+circuit|points\s+machine|route\s+setting|aspect\s+sequence|positive\s+train\s+control|wayside\s+signal)\b` - Corroborative keywords: rail signaling configurations, rail, signaling, configurations, critical, infrastructure, systems - Example matches: `rail signaling`, `signal configuration`, `block section` - Known false positives: Common words and phrases related to rail signaling configurations appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Real-time geolocation Identifies documents containing references to real-time geolocation in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-047-real-time-geolocation` - URL: https://testpattern.dev/patterns/au-top500-047-real-time-geolocation - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:real[\s-]+time\s+geolocation|GPS\s+coordinates|live\s+tracking|location\s+data|current\s+location|position\s+tracking|location\s+services|real[\s-]+time\s+location)\b` - Corroborative keywords: real-time geolocation, real, time, geolocation, contact, location, data, GPS data, GPS coordinates, location data, location tracking, cell tower, triangulation, latitude, longitude, geo-fence, geofence, location history, field, column (+27 more) - Example matches: `real-time geolocation`, `gps coordinates`, `live tracking` - Known false positives: Common words and phrases related to real-time geolocation appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Real-time geolocation Identifies documents containing references to real-time geolocation in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-047-real-time-geolocation` - URL: https://testpattern.dev/patterns/global-top500-047-real-time-geolocation - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:real[\s-]+time\s+geolocation|GPS\s+coordinates|live\s+location|current\s+location|location\s+tracking|latitude\s+longitude|real[\s-]+time\s+tracking|geo\s+tracking|position\s+data|location\s+services|GPS\s+tracking)\b` - Corroborative keywords: real-time geolocation, real, time, geolocation, contact, location, data, GPS data, GPS coordinates, location data, location tracking, cell tower, triangulation, latitude, longitude, geo-fence, geofence, location history, field, column (+27 more) - Example matches: `real-time geolocation`, `gps coordinates`, `live location` - Known false positives: Common words and phrases related to real-time geolocation appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Rebate agreement terms Identifies documents containing references to rebate agreement terms in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-156-rebate-agreement-terms` - URL: https://testpattern.dev/patterns/au-top500-156-rebate-agreement-terms - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:rebate\s+agreement|volume\s+rebate|rebate\s+terms|retrospective\s+discount|rebate\s+calculation|rebate\s+threshold|supplier\s+rebate|incentive\s+payment|trade\s+promotion)\b` - Corroborative keywords: rebate agreement terms, rebate, agreement, terms, procurement, supplier, management - Example matches: `rebate agreement`, `volume rebate`, `rebate terms` - Known false positives: Common words and phrases related to rebate agreement terms appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Rebate agreement terms Identifies documents containing references to rebate agreement terms in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-156-rebate-agreement-terms` - URL: https://testpattern.dev/patterns/global-top500-156-rebate-agreement-terms - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:rebate\s+agreement|volume\s+rebate|rebate\s+calculation|rebate\s+threshold|rebate\s+payout|retrospective\s+discount|incentive\s+rebate|rebate\s+accrual|rebate\s+claim|tiered\s+rebate|annual\s+rebate|rebate\s+settlement)\b` - Corroborative keywords: rebate agreement terms, rebate, agreement, terms, procurement, supplier, management - Example matches: `rebate agreement`, `volume rebate`, `rebate calculation` - Known false positives: Common words and phrases related to rebate agreement terms appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Recommendation letters Identifies documents containing references to recommendation letters in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-351-recommendation-letters` - URL: https://testpattern.dev/patterns/au-top500-351-recommendation-letters - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:recommendation\s+letters|reference\s+letter|character\s+reference|academic\s+reference|letter\s+of\s+support|scholarship\s+reference|supervisor\s+recommendation)\b` - Corroborative keywords: recommendation letters, recommendation, letters, education, research, administration - Example matches: `recommendation letters`, `reference letter`, `character reference` - Known false positives: Common words and phrases related to recommendation letters appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Recommendation letters Identifies documents containing references to recommendation letters in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-351-recommendation-letters` - URL: https://testpattern.dev/patterns/global-top500-351-recommendation-letters - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: False positive - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:recommendation\s+letter|letter\s+of\s+reference|referee\s+report|academic\s+reference|character\s+reference|professional\s+reference|endorsement\s+letter|reference\s+check|faculty\s+recommendation|supervisor\s+reference|personal\s+statement)\b` - Corroborative keywords: recommendation letters, recommendation, letters, education, research, administration - Example matches: `recommendation letter`, `letter of reference`, `referee report` - Known false positives: Common words and phrases related to recommendation letters appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Recommendation model logic Identifies documents containing references to recommendation model logic in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-216-recommendation-model-logic` - URL: https://testpattern.dev/patterns/au-top500-216-recommendation-model-logic - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:recommendation\s+model\s+logic|recommendation\s+engine|recommendation\s+algorithm|collaborative\s+filtering|content[\s-]+based\s+filtering|model\s+weights|feature\s+engineering|proprietary\s+model|trade\s+secret|scoring\s+algorithm)\b` - Corroborative keywords: recommendation model logic, recommendation, model, logic, intellectual, property, trade, secrets - Example matches: `recommendation model logic`, `recommendation engine`, `recommendation algorithm` - Known false positives: Common words and phrases related to recommendation model logic appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Recommendation model logic Identifies documents containing references to recommendation model logic in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-216-recommendation-model-logic` - URL: https://testpattern.dev/patterns/global-top500-216-recommendation-model-logic - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:recommendation\s+model\s+logic|recommendation\s+algorithm|recommendation\s+engine|intellectual\s+property|trade\s+secrets|collaborative\s+filtering|content[\s-]+based\s+filtering|model\s+weights|ranking\s+algorithm|personalization\s+logic)\b` - Corroborative keywords: recommendation model logic, recommendation, model, logic, intellectual, property, trade, secrets - Example matches: `recommendation model logic`, `recommendation algorithm`, `recommendation engine` - Known false positives: Common words and phrases related to recommendation model logic appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Records of processing activities Identifies documents containing references to records of processing activities in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-462-records-of-processing-activities` - URL: https://testpattern.dev/patterns/au-top500-462-records-of-processing-activities - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:records\s+of\s+processing\s+activities|processing\s+activities|data\s+processing|lawful\s+basis|purpose\s+limitation|data\s+controller|data\s+processor|personal\s+information|APP\s+entity)\b` - Corroborative keywords: records of processing activities, records, processing, activities, privacy, compliance, risk - Example matches: `records of processing activities`, `processing activities`, `data processing` - Known false positives: Common words and phrases related to records of processing activities appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Records of processing activities Identifies documents containing references to records of processing activities in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-462-records-of-processing-activities` - URL: https://testpattern.dev/patterns/global-top500-462-records-of-processing-activities - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:records\s+of\s+processing\s+activities|processing\s+activity|data\s+controller|data\s+processor|lawful\s+basis|processing\s+purpose|data\s+subject\s+category|recipient\s+category|transfer\s+safeguard|privacy\s+compliance|Article\s+30)\b` - Corroborative keywords: records of processing activities, records, processing, activities, privacy, compliance, risk - Example matches: `records of processing activities`, `processing activity`, `data controller` - Known false positives: Common words and phrases related to records of processing activities appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Red Team Assessment Detects red team assessment reports revealing proven attack paths and security blind spots. - Slug: `au-red-team-assessment` - URL: https://testpattern.dev/patterns/au-red-team-assessment - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: Criminal Code Act 1995 (Cth), SOCI Act 2018 (Cth) - Data categories: security - Scope: narrow - Risk rating: 10 - Example matches: `Red team assessment: attack path via initial access and lateral movement`, `Adversary simulation using MITRE ATT&CK kill chain and privilege escalation`, `Red team report with purple team and blue team coordination findings` - Known false positives: Sports or team references. ### Red team findings Identifies red team findings patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-253-red-team-findings` - URL: https://testpattern.dev/patterns/au-top500-253-red-team-findings - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: Criminal Code Act 1995 (Cth), SOCI Act 2018 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:red\s+team|red\s+team\s+findings|adversary\s+simulation|attack\s+simulation|penetration\s+test|offensive\s+security|exploitation\s+report|security\s+assessment|red\s+team\s+engagement|attack\s+scenario)\b` - Corroborative keywords: red team findings, red, team, findings, software, engineering, architecture, field, column, row, entry, record, value, form, register, database, extract, export, spreadsheet, table (+4 more) - Example matches: `red team`, `red team findings`, `adversary simulation` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Red team findings Identifies red team findings patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-253-red-team-findings` - URL: https://testpattern.dev/patterns/global-top500-253-red-team-findings - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:red\s+team|adversary\s+simulation|attack\s+simulation|red\s+team\s+exercise|security\s+assessment|offensive\s+security|blue\s+team|purple\s+team|threat\s+emulation|red\s+team\s+engagement)\b` - Corroborative keywords: red team findings, red, team, findings, software, engineering, architecture - Example matches: `red team`, `adversary simulation`, `attack simulation` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Redis Detects Redis patterns. - Slug: `global-redis-connection-string` - URL: https://testpattern.dev/patterns/global-redis-connection-string - Type: regex - Engine: universal - Confidence: low - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Pattern: `redis://[^:]*:[^@]+@[^:]+:\d+` - Corroborative keywords: api key, api_key, apikey, access key, secret key, private key, auth token, authorization, access token, bearer, conn str, connection string, connectionstring, cookie, credential, database, host, JWT, oauth, passphrase (+37 more) - Example matches: `redis://:password@redis.example.com:6379`, `redis://:s3cret@127.0.0.1:6379`, `redis://:pass123@cache.internal:6380` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Reduction-in-force planning lists Identifies documents containing references to reduction-in-force planning lists in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-076-reduction-in-force-planning-lists` - URL: https://testpattern.dev/patterns/au-top500-076-reduction-in-force-planning-lists - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:reduction\s+in\s+force|workforce\s+reduction|position\s+elimination|redundancy\s+list|involuntary\s+separation|RIF\s+list|affected\s+employees|redundancy\s+package)\b` - Corroborative keywords: reduction-in-force planning lists, reduction, force, planning, lists, employment, workforce, records - Example matches: `reduction in force`, `workforce reduction`, `position elimination` - Known false positives: Common words and phrases related to reduction-in-force planning lists appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Reduction-in-force planning lists Identifies documents containing references to reduction-in-force planning lists in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-076-reduction-in-force-planning-lists` - URL: https://testpattern.dev/patterns/global-top500-076-reduction-in-force-planning-lists - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:reduction\s+in\s+force|redundancy\s+list|layoff\s+plan|workforce\s+reduction|severance\s+package|position\s+elimination|redundancy\s+selection|affected\s+employees)\b` - Corroborative keywords: reduction-in-force planning lists, reduction, force, planning, lists, employment, workforce, records - Example matches: `reduction in force`, `redundancy list`, `layoff plan` - Known false positives: Common words and phrases related to reduction-in-force planning lists appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Refinery process control setpoints Identifies documents containing references to refinery process control setpoints in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-449-refinery-process-control-setpoints` - URL: https://testpattern.dev/patterns/au-top500-449-refinery-process-control-setpoints - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:process\s+control|control\s+loop|refinery\s+operations|critical\s+infrastructure|process\s+controller|PID\s+controller|crude\s+processing|process\s+safety|alarm\s+setpoint)\b` - Corroborative keywords: refinery process control setpoints, refinery, process, control, setpoints, critical, infrastructure, systems - Example matches: `process control`, `control loop`, `refinery operations` - Known false positives: Common words and phrases related to refinery process control setpoints appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Refinery process control setpoints Identifies documents containing references to refinery process control setpoints in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-449-refinery-process-control-setpoints` - URL: https://testpattern.dev/patterns/global-top500-449-refinery-process-control-setpoints - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:process\s+control|control\s+loop|PID\s+controller|crude\s+unit|reactor\s+temperature|process\s+variable|control\s+valve|operating\s+parameter|safety\s+limit)\b` - Corroborative keywords: refinery process control setpoints, refinery, process, control, setpoints, critical, infrastructure, systems - Example matches: `process control`, `control loop`, `PID controller` - Known false positives: Common words and phrases related to refinery process control setpoints appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Refugee or asylum case number Identifies documents containing references to refugee or asylum case number in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-034-refugee-or-asylum-case-number` - URL: https://testpattern.dev/patterns/au-top500-034-refugee-or-asylum-case-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:refugee\s+or\s+asylum\s+case\s+number)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: refugee or asylum case number, refugee, asylum, case, number, government, ids, civil, status, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant (+31 more) - Example matches: `Refugee or asylum case number`, `refugee or asylum case number`, `Refugee or asylum case number` - Known false positives: Common words and phrases related to refugee or asylum case number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Refugee or asylum case number Identifies documents containing references to refugee or asylum case number in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-034-refugee-or-asylum-case-number` - URL: https://testpattern.dev/patterns/global-top500-034-refugee-or-asylum-case-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:refugee\s+or\s+asylum\s+case\s+number)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: refugee or asylum case number, ID, identifier, number, reference, code, index, serial, account, file number, case number, record number, ref, field, column, row, entry, record, value, form (+10 more) - Example matches: `structured record with identifier and contextual anchors` - Known false positives: Common words and phrases related to refugee or asylum case number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Refund and chargeback history Identifies documents containing references to refund and chargeback history in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-376-refund-and-chargeback-history` - URL: https://testpattern.dev/patterns/au-top500-376-refund-and-chargeback-history - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:refund\s+and\s+chargeback\s+history|credit\s+note)\b` - Corroborative keywords: refund and chargeback history, refund, chargeback, history, customer, commercial, data - Example matches: `refund and chargeback history`, `credit note` - Known false positives: Common words and phrases related to refund and chargeback history appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Refund and chargeback history Identifies documents containing references to refund and chargeback history in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-376-refund-and-chargeback-history` - URL: https://testpattern.dev/patterns/global-top500-376-refund-and-chargeback-history - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:refund\s+and\s+chargeback\s+history|chargeback\s+dispute|refund\s+request|dispute\s+resolution|reversal\s+transaction|credit\s+memo|chargeback\s+reason\s+code|refund\s+processing|payment\s+reversal|dispute\s+case|merchant\s+chargeback|refund\s+authorization)\b` - Corroborative keywords: refund and chargeback history, refund, chargeback, history, customer, commercial, data - Example matches: `refund and chargeback history`, `chargeback dispute`, `refund request` - Known false positives: Common words and phrases related to refund and chargeback history appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Registro Geral Detects Registro Geral patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `br-national-id-rg` - URL: https://testpattern.dev/patterns/br-national-id-rg - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: br - Regulations: LGPD - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{2}\.?\d{3}\.?\d{3}-?\d\b` - Corroborative keywords: RG, registro geral, identidade, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `12.345.678-9`, `123456789`, `98.765.432-1` - Known false positives: Nine-digit numeric sequences with optional separators may match financial or administrative reference numbers.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### REGON Detects REGON patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `pl-regon` - URL: https://testpattern.dev/patterns/pl-regon - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, pl - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{9}(\d{5})?\b` - Corroborative keywords: REGON, statistical number, register of national economy, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `123456789`, `12345678901234`, `987654321` - Known false positives: Nine-digit or fourteen-digit numeric sequences may match phone numbers or other administrative references.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Regulatory examination responses Identifies documents containing references to regulatory examination responses in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-168-regulatory-examination-responses` - URL: https://testpattern.dev/patterns/au-top500-168-regulatory-examination-responses - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:regulatory\s+examination\s+responses|regulatory\s+examination|regulator\s+response|APRA\s+examination|ASIC\s+review|prudential\s+review|compliance\s+examination|regulatory\s+inquiry|supervisory\s+review|remediation\s+plan|regulatory\s+finding|examination\s+report)\b` - Corroborative keywords: regulatory examination responses, regulatory, examination, responses, corporate, legal, governance - Example matches: `regulatory examination responses`, `regulatory examination`, `regulator response` - Known false positives: Common words and phrases related to regulatory examination responses appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Regulatory examination responses Identifies documents containing references to regulatory examination responses in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-168-regulatory-examination-responses` - URL: https://testpattern.dev/patterns/global-top500-168-regulatory-examination-responses - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:regulatory\s+examination\s+responses|regulatory\s+examination|examination\s+response|regulator\s+inquiry|supervisory\s+review|prudential\s+review|compliance\s+examination|regulatory\s+finding|remediation\s+plan|enforcement\s+action|regulatory\s+correspondence|matter\s+requiring\s+attention)\b` - Corroborative keywords: regulatory examination responses, regulatory, examination, responses, corporate, legal, governance - Example matches: `regulatory examination responses`, `regulatory examination`, `examination response` - Known false positives: Common words and phrases related to regulatory examination responses appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Regulatory Investigation Defence Strategy Detects legal defence strategy prepared in response to regulatory investigations by bodies such as ACCC, ASIC, APRA, OAIC, and Queensland regulators (CCC, OIA). Disclosure reveals the target's assessment of its own regulatory exposure and defence approach. - Slug: `regulatory-investigation-defence-strategy` - URL: https://testpattern.dev/patterns/regulatory-investigation-defence-strategy - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: global - Regulations: QGISCF - Data categories: legal - Scope: wide - Risk rating: 8 - Pattern: `(?i)\b(?:regulatory\s+investigation|investigation\s+response|show\s+cause|enforcement\s+action|regulatory\s+inquiry)\b` - Corroborative keywords: defence strategy, legal strategy, legal advice, privilege, PROTECTED, response strategy, ACCC, ASIC, APRA, OAIC, CCC, OIA, exposure, cooperation, enforceable undertaking, legal, counsel, litigation, proceedings, court (+15 more) - Example matches: `PROTECTED — LEGAL PROFESSIONAL PRIVILEGE Regulatory Investigation Defence Strategy Investigation: ASIC Investigation No. ASC-2025-0456 Subject: Alleged continuous disclosure failures — GOC subsidiary Defence strategy: The legal advice recommends full cooperation with ASIC while asserting privilege over internal board deliberations.`, `This privileged legal strategy addresses our response to the ACCC investigation into alleged anti-competitive conduct. The regulatory investigation defence recommends seeking an enforceable undertaking to avoid prosecution.`, `CONFIDENTIAL Show Cause Response Strategy Regulator: Crime and Corruption Commission (CCC) Subject: Show cause notice — alleged misconduct Legal advice: The defence strategy recommends challenging the scope of the investigation and asserting privilege over certain communications. Exposure assessment: moderate risk of adverse finding.` - Known false positives: Published regulatory enforcement announcements; Academic analysis of regulatory defence strategies; Published regulatory annual reports ### Regulatory Prosecution Brief Detects prosecution briefs prepared by Queensland regulatory bodies (Workplace Health and Safety, Environmental Protection Authority, Office of Fair Trading) for enforcement action. Disclosure compromises prosecution integrity and alerts enforcement targets. - Slug: `regulatory-prosecution-brief` - URL: https://testpattern.dev/patterns/regulatory-prosecution-brief - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Criminal Code 1899 (Qld), Environmental Protection Act 1994 (Qld), WHS Act 2011 (Qld) - Data categories: legal, government - Scope: wide - Risk rating: 9 - Pattern: `(?i)\b(?:prosecution\s+brief|brief\s+of\s+evidence|enforcement\s+brief|prosecution\s+recommendation)\b` - Corroborative keywords: WHS, Work Health and Safety, Environmental Protection, Fair Trading, regulatory, regulator, PROTECTED, privilege, enforcement action, penalty, charges, defendant, offence, legal, counsel, litigation, proceedings, court, jurisdiction, attorney (+27 more) - Example matches: `PROTECTED — NOT FOR DISCLOSURE Prosecution Brief Regulator: Office of Industrial Relations — Work Health and Safety Ref: WHS-PROS-2025-0234 Recommendation: Prosecute under s.32 Work Health and Safety Act 2011 for Category 1 offence. Brief of evidence attached.`, `This enforcement brief recommends prosecution of the operator under the Environmental Protection Act 1994. The prosecution recommendation is based on evidence of unlawful discharge of contaminants at the Gladstone facility. PROTECTED — privilege.`, `CONFIDENTIAL — LEGAL PROFESSIONAL PRIVILEGE Prosecution Recommendation Regulatory body: Department of Justice — Office of Fair Trading Subject: Misleading conduct — property developer Evidence summary: 47 consumer complaints, 12 witness statements` - Known false positives: News articles about completed regulatory prosecutions; Academic materials on regulatory prosecution processes; Published annual reports with prosecution statistics ### Regulatory reporting draft responses Identifies documents containing references to regulatory reporting draft responses in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-474-regulatory-reporting-draft-responses` - URL: https://testpattern.dev/patterns/au-top500-474-regulatory-reporting-draft-responses - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:regulatory\s+reporting\s+draft\s+responses|regulatory\s+reporting|draft\s+response|regulator\s+inquiry|compliance\s+reporting|statutory\s+obligation|regulatory\s+submission)\b` - Corroborative keywords: regulatory reporting draft responses, regulatory, reporting, draft, responses, privacy, compliance, risk - Example matches: `regulatory reporting draft responses`, `regulatory reporting`, `draft response` - Known false positives: Common words and phrases related to regulatory reporting draft responses appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Regulatory reporting draft responses Identifies documents containing references to regulatory reporting draft responses in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-474-regulatory-reporting-draft-responses` - URL: https://testpattern.dev/patterns/global-top500-474-regulatory-reporting-draft-responses - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:regulatory\s+reporting|draft\s+response|regulatory\s+inquiry|supervisory\s+authority|compliance\s+report|reporting\s+obligation|enforcement\s+action|regulatory\s+submission|privacy\s+compliance|mandatory\s+disclosure|regulator\s+correspondence|statutory\s+report)\b` - Corroborative keywords: regulatory reporting draft responses, regulatory, reporting, draft, responses, privacy, compliance, risk - Example matches: `regulatory reporting`, `draft response`, `regulatory inquiry` - Known false positives: Common words and phrases related to regulatory reporting draft responses appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Reinsurance contract terms Detects references to reinsurance contract terms in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-138-reinsurance-contract-terms` - URL: https://testpattern.dev/patterns/au-top500-138-reinsurance-contract-terms - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:reinsurance\s+contract|reinsurance\s+treaty|ceding\s+company|treaty\s+terms|excess\s+of\s+loss|proportional\s+treaty|insurance\s+premium)\b` - Corroborative keywords: reinsurance contract terms, reinsurance, contract, terms, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+2 more) - Example matches: `reinsurance contract`, `reinsurance treaty`, `ceding company` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Reinsurance contract terms Detects references to reinsurance contract terms in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-138-reinsurance-contract-terms` - URL: https://testpattern.dev/patterns/global-top500-138-reinsurance-contract-terms - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:reinsurance\s+contract|reinsurance\s+treaty|ceding\s+commission|excess\s+of\s+loss|quota\s+share|treaty\s+reinsurance|facultative\s+reinsurance|loss\s+ratio|reinsurance\s+premium|catastrophe\s+bond|aggregate\s+limit)\b` - Corroborative keywords: reinsurance contract terms, reinsurance, contract, terms, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+31 more) - Example matches: `reinsurance contract`, `reinsurance treaty`, `ceding commission` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Release approval records Identifies documents containing references to release approval records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-240-release-approval-records` - URL: https://testpattern.dev/patterns/au-top500-240-release-approval-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:release\s+approval|approval\s+record|product\s+release|batch\s+release|release\s+authorization|quality\s+approval|release\s+decision|approval\s+signature|release\s+certificate)\b` - Corroborative keywords: release approval records, release, approval, records, product, quality, safety - Example matches: `release approval`, `approval record`, `product release` - Known false positives: Common words and phrases related to release approval records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Release approval records Identifies documents containing references to release approval records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-240-release-approval-records` - URL: https://testpattern.dev/patterns/global-top500-240-release-approval-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:release\s+approval|approval\s+record|product\s+release|release\s+decision|batch\s+release|lot\s+release|quality\s+approval|release\s+authorization|release\s+certificate)\b` - Corroborative keywords: release approval records, release, approval, records, product, quality, safety - Example matches: `release approval`, `approval record`, `product release` - Known false positives: Common words and phrases related to release approval records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Reliability and failure analysis Identifies documents containing references to reliability and failure analysis in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-225-reliability-and-failure-analysis` - URL: https://testpattern.dev/patterns/au-top500-225-reliability-and-failure-analysis - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:reliability\s+analysis|failure\s+analysis|failure\s+mode|root\s+cause\s+analysis|mean\s+time\s+between\s+failures|reliability\s+testing|fault\s+tree\s+analysis|product\s+failure|corrective\s+action)\b` - Corroborative keywords: reliability and failure analysis, reliability, failure, analysis, product, quality, safety, field, column, row, entry, record, value, form, register, database, extract, export, spreadsheet, table (+16 more) - Example matches: `reliability analysis`, `failure analysis`, `failure mode` - Known false positives: Common words and phrases related to reliability and failure analysis appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Reliability and failure analysis Identifies documents containing references to reliability and failure analysis in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-225-reliability-and-failure-analysis` - URL: https://testpattern.dev/patterns/global-top500-225-reliability-and-failure-analysis - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:reliability\s+and\s+failure\s+analysis|failure\s+analysis|reliability\s+testing|root\s+cause\s+analysis|product\s+quality|safety\s+analysis|mean\s+time\s+between\s+failures|failure\s+mode|reliability\s+report|defect\s+analysis)\b` - Corroborative keywords: reliability and failure analysis, reliability, failure, analysis, product, quality, safety - Example matches: `reliability and failure analysis`, `failure analysis`, `reliability testing` - Known false positives: Common words and phrases related to reliability and failure analysis appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Religious or philosophical beliefs Identifies documents containing references to religious or philosophical beliefs in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-016-religious-or-philosophical-beliefs` - URL: https://testpattern.dev/patterns/au-top500-016-religious-or-philosophical-beliefs - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:religious\s+belief|philosophical\s+belief|spiritual\s+belief|religious\s+affiliation|church\s+membership|sensitive\s+information)\b` - Corroborative keywords: religious or philosophical beliefs, religious, philosophical, beliefs, personal, identity, demographics, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender (+45 more) - Example matches: `religious belief`, `philosophical belief`, `spiritual belief` - Known false positives: Common words and phrases related to religious or philosophical beliefs appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Religious or philosophical beliefs Identifies documents containing references to religious or philosophical beliefs in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-016-religious-or-philosophical-beliefs` - URL: https://testpattern.dev/patterns/global-top500-016-religious-or-philosophical-beliefs - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:religious\s+beliefs|philosophical\s+beliefs|religious\s+affiliation|belief\s+system|spiritual\s+practice|religious\s+observance|protected\s+characteristic)\b` - Corroborative keywords: religious or philosophical beliefs, religious, philosophical, beliefs, personal, identity, demographics, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender (+45 more) - Example matches: `religious beliefs`, `philosophical beliefs`, `religious affiliation` - Known false positives: Common words and phrases related to religious or philosophical beliefs appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Remittance instructions Detects references to remittance instructions in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-114-remittance-instructions` - URL: https://testpattern.dev/patterns/au-top500-114-remittance-instructions - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:remittance\s+advice|payment\s+instruction|funds\s+transfer|international\s+transfer|correspondent\s+bank|wire\s+instruction|payment\s+reference)\b` - Corroborative keywords: remittance instructions, remittance, instructions, financial, accounts, payments, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet, profit and loss, cash flow - Example matches: `remittance advice`, `payment instruction`, `funds transfer` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Remittance instructions Detects references to remittance instructions in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-114-remittance-instructions` - URL: https://testpattern.dev/patterns/global-top500-114-remittance-instructions - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR, PCI-DSS - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:payment\s+instruction|bank\s+transfer|wire\s+transfer|correspondent\s+bank|intermediary\s+bank|payment\s+reference|remit\s+to|funds\s+transfer)\b` - Corroborative keywords: remittance instructions, remittance, instructions, financial, accounts, payments, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet, profit and loss, cash flow (+29 more) - Example matches: `payment instruction`, `bank transfer`, `wire transfer` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Remote administration tool settings Identifies remote administration tool settings patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-311-remote-administration-tool-settings` - URL: https://testpattern.dev/patterns/au-top500-311-remote-administration-tool-settings - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:remote\s+administration|remote\s+access|remote\s+desktop|jump\s+server|bastion\s+host|remote\s+management|session\s+recording|privileged\s+session)\b` - Corroborative keywords: remote administration tool settings, remote, administration, tool, settings, operations, resilience - Example matches: `remote administration`, `remote access`, `remote desktop` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Remote administration tool settings Identifies remote administration tool settings patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-311-remote-administration-tool-settings` - URL: https://testpattern.dev/patterns/global-top500-311-remote-administration-tool-settings - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:remote\s+administration|remote\s+access|RDP\s+configuration|VNC\s+settings|SSH\s+access|jump\s+server|bastion\s+host|remote\s+desktop|privileged\s+remote\s+access|session\s+recording)\b` - Corroborative keywords: remote administration tool settings, remote, administration, tool, settings, operations, resilience - Example matches: `remote administration`, `remote access`, `RDP configuration` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Research lab notebooks Identifies documents containing references to research lab notebooks in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-209-research-lab-notebooks` - URL: https://testpattern.dev/patterns/au-top500-209-research-lab-notebooks - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:research\s+lab\s+notebooks|lab\s+notebook|research\s+notebook|experiment\s+log|laboratory\s+records|intellectual\s+property|confidential\s+research|proprietary\s+data|research\s+findings|unpublished\s+results)\b` - Corroborative keywords: research lab notebooks, research, lab, notebooks, intellectual, property, trade, secrets - Example matches: `research lab notebooks`, `lab notebook`, `research notebook` - Known false positives: Common words and phrases related to research lab notebooks appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Research lab notebooks Identifies documents containing references to research lab notebooks in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-209-research-lab-notebooks` - URL: https://testpattern.dev/patterns/global-top500-209-research-lab-notebooks - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:research\s+lab\s+notebooks|laboratory\s+notebook|lab\s+notebook|research\s+notes|intellectual\s+property|trade\s+secrets|experiment\s+log|research\s+data|confidential\s+research|proprietary\s+research)\b` - Corroborative keywords: research lab notebooks, research, lab, notebooks, intellectual, property, trade, secrets - Example matches: `research lab notebooks`, `laboratory notebook`, `lab notebook` - Known false positives: Common words and phrases related to research lab notebooks appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Research participant consent files Identifies documents containing references to research participant consent files in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-355-research-participant-consent-files` - URL: https://testpattern.dev/patterns/au-top500-355-research-participant-consent-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:research\s+participant\s+consent\s+files|research\s+participant|consent\s+form|informed\s+consent|participant\s+information\s+sheet|ethics\s+approval|voluntary\s+participation|withdrawal\s+of\s+consent|research\s+ethics|human\s+subjects|clinical\s+trial\s+consent)\b` - Corroborative keywords: research participant consent files, research, participant, consent, files, education, administration, field, column, row, entry, record, value, form, register, database, extract, export, spreadsheet, table (+16 more) - Example matches: `research participant consent files`, `research participant`, `consent form` - Known false positives: Common words and phrases related to research participant consent files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Research participant consent files Identifies documents containing references to research participant consent files in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-355-research-participant-consent-files` - URL: https://testpattern.dev/patterns/global-top500-355-research-participant-consent-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:research\s+participant|informed\s+consent|consent\s+form|participant\s+consent|research\s+ethics|voluntary\s+participation|study\s+participant|clinical\s+trial\s+consent|data\s+subject\s+consent|withdrawal\s+of\s+consent|participant\s+information\s+sheet|ethics\s+approval)\b` - Corroborative keywords: research participant consent files, research, participant, consent, files, education, administration - Example matches: `research participant`, `informed consent`, `consent form` - Known false positives: Common words and phrases related to research participant consent files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Residence permit number Identifies documents containing references to residence permit number in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-033-residence-permit-number` - URL: https://testpattern.dev/patterns/au-top500-033-residence-permit-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:residence\s+permit\s+number|residence\s+permit|permit\s+number|permanent\s+residency|temporary\s+residence|visa\s+grant\s+number|residency\s+status|Department\s+of\s+Home\s+Affairs|resident\s+visa|bridging\s+visa)\b` - Corroborative keywords: residence permit number, residence, permit, number, government, ids, civil, status, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+30 more) - Example matches: `residence permit number`, `residence permit`, `permit number` - Known false positives: Common words and phrases related to residence permit number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Residence permit number Identifies documents containing references to residence permit number in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-033-residence-permit-number` - URL: https://testpattern.dev/patterns/global-top500-033-residence-permit-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:residence\s+permit\s+number|residence\s+permit|permit\s+number|residency\s+permit|residency\s+card|permanent\s+residence|temporary\s+residence|residence\s+card|resident\s+permit|settlement\s+permit|stay\s+permit|residence\s+authorization)\b` - Corroborative keywords: residence permit number - Example matches: `residence permit number`, `residence permit`, `permit number` - Known false positives: Common words and phrases related to residence permit number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Resident Id Detects Resident Id patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `cn-resident-id` - URL: https://testpattern.dev/patterns/cn-resident-id - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: cn - Regulations: PIPL - Data categories: pii, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b[1-9]\d{5}(19|20)\d{2}(?:0[1-9]|1[0-2])(?:0[1-9]|[12]\d|3[01])\d{3}[\dXx]\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `110101199001011234`, `44030619900101123X`, `310101200001011234` - Known false positives: Common words and phrases related to resident id appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Chinese, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Residential Tenancy Agreement Detects residential tenancy agreements containing tenant PII, rental terms, and bond details. - Slug: `au-residential-tenancy-agreement` - URL: https://testpattern.dev/patterns/au-residential-tenancy-agreement - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: legal, pii, financial - Scope: narrow - Risk rating: 7 - Example matches: `Residential tenancy agreement: tenant bond lodgement with RTA`, `Tenancy agreement rental amount $450/week with condition report`, `Residential Tenancies Authority breach notice and entry notice` - Known false positives: Historical or metaphorical use of tenancy. ### Restructuring plans Identifies documents containing references to restructuring plans in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-188-restructuring-plans` - URL: https://testpattern.dev/patterns/au-top500-188-restructuring-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:restructuring\s+plan|restructuring\s+plans|organizational\s+restructure|workforce\s+reduction|redundancy\s+plan|cost\s+restructuring|corporate\s+restructure|turnaround\s+plan|voluntary\s+administration|debt\s+restructuring|operational\s+restructuring)\b` - Corroborative keywords: restructuring plans, restructuring, plans, mergers, acquisitions, strategy - Example matches: `restructuring plan`, `restructuring plans`, `organizational restructure` - Known false positives: Common words and phrases related to restructuring plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Restructuring plans Identifies documents containing references to restructuring plans in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-188-restructuring-plans` - URL: https://testpattern.dev/patterns/global-top500-188-restructuring-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:restructuring\s+plan|organizational\s+restructuring|workforce\s+reduction|cost\s+reduction|turnaround\s+plan|voluntary\s+administration|creditor\s+arrangement|debt\s+restructuring|operational\s+restructuring|business\s+transformation)\b` - Corroborative keywords: restructuring plans, restructuring, plans, mergers, acquisitions, strategy - Example matches: `restructuring plan`, `organizational restructuring`, `workforce reduction` - Known false positives: Common words and phrases related to restructuring plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Retirement contribution records Detects references to retirement contribution records in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-088-retirement-contribution-records` - URL: https://testpattern.dev/patterns/au-top500-088-retirement-contribution-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:retirement\s+contribution\s+records|super\s+guarantee|employer\s+contribution|concessional\s+contribution|salary\s+sacrifice\s+super|APRA\s+fund|super\s+fund|retirement\s+savings|member\s+contribution|SG\s+rate)\b` - Corroborative keywords: retirement contribution records, retirement, contribution, records, payroll, tax, operations, bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC, employee, benefits, termination, hire date (+66 more) - Example matches: `retirement contribution records`, `super guarantee`, `employer contribution` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Retirement contribution records Detects references to retirement contribution records in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-088-retirement-contribution-records` - URL: https://testpattern.dev/patterns/global-top500-088-retirement-contribution-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:retirement\s+contribution\s+records|retirement\s+contribution|pension\s+contribution|employer\s+match|salary\s+sacrifice|defined\s+contribution|defined\s+benefit|retirement\s+fund|vesting\s+schedule)\b` - Corroborative keywords: retirement contribution records, retirement, contribution, records, payroll, tax, operations, bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC, employee, benefits, termination, hire date (+95 more) - Example matches: `retirement contribution records`, `retirement contribution`, `pension contribution` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### RFC Detects RFC patterns. - Slug: `mx-rfc` - URL: https://testpattern.dev/patterns/mx-rfc - Type: regex - Engine: universal - Confidence: low - Detection quality: Verified - Jurisdictions: mx - Regulations: LFPDPPP (MX) - Data categories: pii, government-id - Scope: wide - Pattern: `\b[A-Z]{4}\d{6}[A-Z0-9]{3}\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate, transaction, transfer, payment, deposit, withdrawal, debit, credit, field, column, row (+23 more) - Example matches: `GARS920101ABC`, `AAAA000101XY1`, `ABCD123456Z01` - Known false positives: Common words and phrases related to rfc appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Spanish (Mexico), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Right-to-work verification documents Identifies documents containing references to right-to-work verification documents in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-067-right-to-work-verification-documents` - URL: https://testpattern.dev/patterns/au-top500-067-right-to-work-verification-documents - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:right\s+to\s+work|work\s+entitlement|visa\s+verification|VEVO\s+check|work\s+rights|immigration\s+status|visa\s+status|work\s+permit|employment\s+eligibility|visa\s+conditions|right\s+to\s+work\s+check|visa\s+holder)\b` - Corroborative keywords: right-to-work verification documents, right, work, verification, documents, employment, workforce, records - Example matches: `right to work`, `work entitlement`, `visa verification` - Known false positives: Common words and phrases related to right-to-work verification documents appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Right-to-work verification documents Identifies documents containing references to right-to-work verification documents in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-067-right-to-work-verification-documents` - URL: https://testpattern.dev/patterns/global-top500-067-right-to-work-verification-documents - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:right\s+to\s+work|work\s+authorization|work\s+permit|visa\s+verification|employment\s+eligibility|work\s+entitlement|immigration\s+status|visa\s+status|work\s+rights|identity\s+verification|eligibility\s+to\s+work)\b` - Corroborative keywords: right-to-work verification documents, right, work, verification, documents, employment, workforce, records - Example matches: `right to work`, `work authorization`, `work permit` - Known false positives: Common words and phrases related to right-to-work verification documents appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Rijksregisternummer Detects Rijksregisternummer patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `be-national-register` - URL: https://testpattern.dev/patterns/be-national-register - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, be - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: wide - Risk rating: 5 - Pattern: `\b\d{11}\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+16 more) - Example matches: `85010100145`, `90123100234`, `00010100456` - Known false positives: Long numeric sequences in unrelated contexts (tracking numbers, serial codes) matching the Rijksregisternummer format ### Risk Register Detects risk registers containing assessed vulnerabilities, likelihood ratings, and risk treatment plans. - Slug: `au-risk-register` - URL: https://testpattern.dev/patterns/au-risk-register - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: IPA 2009 (Qld), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: governance, security - Scope: narrow - Risk rating: 8 - Example matches: `Risk register: risk assessment with likelihood and consequence ratings`, `Risk treatment plan for residual risk within risk appetite and tolerance`, `Risk owner review: inherent risk rating and risk matrix update` - Known false positives: Generic risk in non-register contexts. ### Rodné číslo Detects Rodné číslo patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `cz-personal-identity-number` - URL: https://testpattern.dev/patterns/cz-personal-identity-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, cz - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{6}/?\d{3,4}\b` - Corroborative keywords: rodné číslo, birth number, personal identity, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `750101/1234`, `880512/234`, `9203031234` - Known false positives: Numeric sequences with optional slash separators may match date-based reference numbers or administrative codes.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Rodné číslo Detects Rodné číslo patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `sk-personal-number` - URL: https://testpattern.dev/patterns/sk-personal-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, sk - Regulations: gdpr - Data categories: pii, government-id - Scope: narrow - Risk rating: 5 - Pattern: `\b\d{6}/?\d{3,4}\b` - Corroborative keywords: rodné číslo, birth number, personal number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `750101/1234`, `880512/234`, `9203031234` - Known false positives: Numeric sequences with optional slash separators may match date-based reference numbers or administrative codes.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Romania Driver's License Number Detects Romania driver's license number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `ro-drivers-license` - URL: https://testpattern.dev/patterns/ro-drivers-license - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: ro, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\b\d{9,10}\b` - Corroborative keywords: driver, licence, license, driving, DL, ID number, identification, ID card, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `123456789`, `1234567890`, `12345678` - Known false positives: Generic numeric sequences matching the driver's license format appearing in unrelated contexts. ### Romania Passport Number Detects Romania passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `ro-passport-number` - URL: https://testpattern.dev/patterns/ro-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: ro, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b\d{8,9}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `12345678`, `987654321`, `45678901` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Romania Physical Addresses Detects Romania Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `ro-physical-addresses` - URL: https://testpattern.dev/patterns/ro-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: ro, eu - Regulations: GDPR - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 strada name, unit 4`, `located at 45 bulevardul example`, `deliver to 78 aleea test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### Root-cause corrective action plans Identifies documents containing references to root-cause corrective action plans in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-235-root-cause-corrective-action-plans` - URL: https://testpattern.dev/patterns/au-top500-235-root-cause-corrective-action-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:root\s+cause|corrective\s+action|preventive\s+action|root\s+cause\s+analysis|containment\s+action|effectiveness\s+check|quality\s+improvement|deviation\s+investigation)\b` - Corroborative keywords: root-cause corrective action plans, root, cause, corrective, action, plans, product, quality, safety, SCADA, PLC, DCS, HMI, Modbus, Modbus TCP, Modbus RTU, DNP3, OPC-UA, OPC Classic, IEC 61850 (+40 more) - Example matches: `root cause`, `corrective action`, `preventive action` - Known false positives: Common words and phrases related to root-cause corrective action plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Root-cause corrective action plans Identifies documents containing references to root-cause corrective action plans in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-235-root-cause-corrective-action-plans` - URL: https://testpattern.dev/patterns/global-top500-235-root-cause-corrective-action-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:root\s+cause|corrective\s+action|preventive\s+action|root\s+cause\s+analysis|containment\s+action|effectiveness\s+check|quality\s+improvement)\b` - Corroborative keywords: root-cause corrective action plans, root, cause, corrective, action, plans, product, quality, safety, SCADA, PLC, DCS, HMI, Modbus, Modbus TCP, Modbus RTU, DNP3, OPC-UA, OPC Classic, IEC 61850 (+40 more) - Example matches: `root cause`, `corrective action`, `preventive action` - Known false positives: Common words and phrases related to root-cause corrective action plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Royal Commission Draft Submission Detects draft submissions to Royal Commissions before formal tabling. Pre-tabling drafts reveal the State's narrative strategy, admissions under consideration, and positions not yet finalised. Disclosure prejudices the State's participation in proceedings of national significance. - Slug: `royal-commission-draft-submission` - URL: https://testpattern.dev/patterns/royal-commission-draft-submission - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Commissions of Inquiry Act 1950 (Qld) - Data categories: legal, government - Scope: wide - Risk rating: 8 - Pattern: `(?i)\bRoyal\s+Commission\b` - Corroborative keywords: draft submission, draft response, proposed submission, submission for approval, DRAFT, PROTECTED, CONFIDENTIAL, NOT FOR PUBLICATION, privileged, not for distribution, legal, counsel, privilege, litigation, proceedings, court, jurisdiction, attorney, solicitor, barrister (+26 more) - Example matches: `DRAFT — NOT FOR PUBLICATION PROTECTED Proposed Submission to the Royal Commission into Institutional Responses to Child Sexual Abuse Prepared by: Department of Child Safety Status: Draft for approval — Director-General review required`, `This draft response to the Royal Commission has been prepared for the Attorney-General's approval. The submission for approval contains proposed admissions regarding systemic failures in the foster care system that have not been finalised.`, `CONFIDENTIAL — DRAFT Royal Commission into Veterans' Suicide Draft Submission — State of Queensland Version 3.2 — For internal review only This proposed submission addresses Terms of Reference 4(a) through 4(f).` - Known false positives: Published Royal Commission final reports and findings; Tabled government submissions that are now public; News articles and media coverage of Royal Commission proceedings ### RRN Detects RRN patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `kr-resident-registration-number` - URL: https://testpattern.dev/patterns/kr-resident-registration-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: kr - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{6}-?[1-8]\d{6}\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+16 more) - Example matches: `900101-1234567`, `9001011234567`, `850315-2345678` - Known false positives: Common words and phrases related to rrn appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Korean, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### RSA Private Key Header Detects RSA private key PEM headers in source code, configuration files, and documents. Private keys should never appear in plaintext. - Slug: `global-rsa-private` - URL: https://testpattern.dev/patterns/global-rsa-private - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Pattern: `-----BEGIN RSA PRIVATE KEY-----` - Corroborative keywords: private key, secret key, key file, PEM, certificate, RSA, cryptographic, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie, credential (+42 more) - Example matches: `-----BEGIN RSA PRIVATE KEY-----`, `-----BEGIN RSA PRIVATE KEY----- MIIE...`, `-----BEGIN RSA PRIVATE KEY----- Proc-Type:` - Known false positives: PEM-encoded certificates or public keys that use similar header formats ### Russia Physical Addresses Detects Russia Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `ru-physical-addresses` - URL: https://testpattern.dev/patterns/ru-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: ru - Regulations: Federal Law 152-FZ (Russia) - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 улица name, unit 4`, `located at 45 проспект example`, `deliver to 78 переулок test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### Russian Passport Number (Domestic) Detects Russian domestic passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `ru-passport-number-domestic` - URL: https://testpattern.dev/patterns/ru-passport-number-domestic - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: ru - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b\d{2}\s?\d{2}\s?\d{6}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `45 06 123456`, `4506123456`, `12 34 567890` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Russian Passport Number (International) Detects Russian international passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `ru-passport-number-international` - URL: https://testpattern.dev/patterns/ru-passport-number-international - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: ru - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b\d{2}\s?\d{7}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `51 1234567`, `511234567`, `72 9876543` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Russian Taxpayer Identification Number Detects Russian Taxpayer Identification Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Due to the numeric format, corroborative evidence keywords are essential for reliable detection. - Slug: `ru-tax-id` - URL: https://testpattern.dev/patterns/ru-tax-id - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: ru - Regulations: Federal Law 152-FZ (Russia) - Data categories: pii, financial, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b\d{10}(\d{2})?\b` - Corroborative keywords: ИНН, идентификационный номер налогоплательщика, tax identification, TIN, налоговый, tax identification number, tax number, tax return, IRD, NIF, tax ID, inland revenue, taxpayer identification, αριθμός φορολογικού μητρώου, ΑΦΜ, φορολογικός, Abgabenkontonummer, adóazonosító, adószám, belastingnummer (+20 more) - Example matches: `1234567890`, `123456789012`, `9876543210` - Known false positives: Generic numeric sequences in non-tax contexts such as reference numbers or account identifiers; Numbers from other identification schemes with similar digit patterns ### RUT Detects RUT patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `cl-rut` - URL: https://testpattern.dev/patterns/cl-rut - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: cl - Regulations: PDPL (CL) - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{7,8}[0-9Kk]\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `12345678K`, `1234567k`, `12345670` - Known false positives: Common words and phrases related to rut appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Spanish (Chile), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Safety certification evidence Identifies documents containing references to safety certification evidence in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-226-safety-certification-evidence` - URL: https://testpattern.dev/patterns/au-top500-226-safety-certification-evidence - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:safety\s+certification\s+evidence|safety\s+certification|compliance\s+evidence|safety\s+assessment|certification\s+audit|regulatory\s+approval|safety\s+standard|test\s+evidence|conformity\s+assessment|hazard\s+analysis)\b` - Corroborative keywords: safety certification evidence, safety, certification, evidence, product, quality - Example matches: `safety certification evidence`, `safety certification`, `compliance evidence` - Known false positives: Common words and phrases related to safety certification evidence appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Safety certification evidence Identifies documents containing references to safety certification evidence in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-226-safety-certification-evidence` - URL: https://testpattern.dev/patterns/global-top500-226-safety-certification-evidence - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:safety\s+certification\s+evidence|safety\s+certification|certification\s+evidence|compliance\s+certificate|product\s+quality|safety\s+standard|regulatory\s+approval|test\s+certificate|conformity\s+assessment|safety\s+audit)\b` - Corroborative keywords: safety certification evidence, safety, certification, evidence, product, quality - Example matches: `safety certification evidence`, `safety certification`, `certification evidence` - Known false positives: Common words and phrases related to safety certification evidence appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Sanctions Compliance Legal Assessment Detects internal legal assessments evaluating compliance with sanctions regimes (DFAT, OFAC, EU). Disclosure reveals identified compliance gaps, risk exposures, and remediation strategies before implementation, exposing the organisation to criminal prosecution under the Autonomous Sanctions Act 2011. - Slug: `sanctions-compliance-legal-assessment` - URL: https://testpattern.dev/patterns/sanctions-compliance-legal-assessment - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: global - Regulations: Autonomous Sanctions Act 2011 (Cth) - Data categories: legal - Scope: wide - Risk rating: 7 - Pattern: `(?i)\b(?:sanctions?|DFAT|OFAC|sanctioned\s+(?:entity|person|list))\b` - Corroborative keywords: legal assessment, compliance assessment, legal opinion, risk assessment, privilege, PROTECTED, compliance gap, remediation, designated person, consolidated list, screening, exposure, legal, counsel, litigation, proceedings, court, jurisdiction, attorney, solicitor (+12 more) - Example matches: `PROTECTED — LEGAL PROFESSIONAL PRIVILEGE Sanctions Compliance Legal Assessment Prepared for: Chief Financial Officer Subject: DFAT Consolidated List Screening Gaps This privileged legal assessment identifies three compliance gaps in the current sanctions screening process. Payments to Entity X may constitute a breach of the Autonomous Sanctions Act 2011.`, `This confidential legal opinion addresses the organisation's exposure under OFAC secondary sanctions. The risk assessment identifies 12 counterparties requiring enhanced due diligence. Compliance gaps in the current screening process require immediate remediation.`, `CONFIDENTIAL — PRIVILEGED Sanctions Risk Assessment The legal assessment of our sanctions compliance framework identifies material deficiencies in screening of sanctioned entities on the DFAT consolidated list. Remediation strategy attached.` - Known false positives: Public sanctions lists and DFAT consolidated list; Academic analysis of sanctions regimes; Published enforcement actions for sanctions breaches ### Sanctions policy drafts Identifies documents containing references to sanctions policy drafts in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-488-sanctions-policy-drafts` - URL: https://testpattern.dev/patterns/au-top500-488-sanctions-policy-drafts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:sanctions\s+policy|policy\s+draft|DFAT\s+sanctions|autonomous\s+sanctions|consolidated\s+list|sanctions\s+regime|designated\s+person|sanctions\s+enforcement|travel\s+ban|asset\s+freeze|sanctions\s+compliance|foreign\s+affairs)\b` - Corroborative keywords: sanctions policy drafts, sanctions, policy, drafts, elections, diplomacy, statecraft, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+31 more) - Example matches: `sanctions policy`, `policy draft`, `DFAT sanctions` - Known false positives: Common words and phrases related to sanctions policy drafts appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Sanctions policy drafts Identifies documents containing references to sanctions policy drafts in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-488-sanctions-policy-drafts` - URL: https://testpattern.dev/patterns/global-top500-488-sanctions-policy-drafts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:sanctions\s+policy\s+drafts|sanctions\s+policy|economic\s+sanctions|trade\s+restrictions|designated\s+persons|sanctions\s+list|asset\s+freeze|travel\s+ban|sanctions\s+regime|sanctions\s+compliance|restricted\s+parties)\b` - Corroborative keywords: sanctions policy drafts - Example matches: `sanctions policy drafts`, `sanctions policy`, `economic sanctions` - Known false positives: Common words and phrases related to sanctions policy drafts appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Sanctions screening matches Detects references to sanctions screening matches in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-134-sanctions-screening-matches` - URL: https://testpattern.dev/patterns/au-top500-134-sanctions-screening-matches - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:sanctions\s+screening|DFAT\s+consolidated\s+list|sanctions\s+match|designated\s+person|prohibited\s+entity|screening\s+result|sanctions\s+compliance|politically\s+exposed\s+person)\b` - Corroborative keywords: sanctions screening matches, sanctions, screening, matches, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+2 more) - Example matches: `sanctions screening`, `dfat consolidated list`, `sanctions match` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Sanctions screening matches Detects references to sanctions screening matches in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-134-sanctions-screening-matches` - URL: https://testpattern.dev/patterns/global-top500-134-sanctions-screening-matches - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:sanctions\s+screening|SDN\s+list|designated\s+persons|sanctions\s+match|prohibited\s+party|denied\s+persons\s+list|sanctions\s+compliance|watchlist\s+screening|politically\s+exposed\s+person|DFAT\s+sanctions)\b` - Corroborative keywords: sanctions screening matches, sanctions, screening, matches, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+31 more) - Example matches: `sanctions screening`, `sdn list`, `designated persons` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Sandbox detonation reports Identifies sandbox detonation reports patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-292-sandbox-detonation-reports` - URL: https://testpattern.dev/patterns/au-top500-292-sandbox-detonation-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:sandbox\s+detonation\s+reports|sandbox\s+detonation|behavioral\s+analysis|dynamic\s+analysis|malware\s+sandbox|cuckoo\s+sandbox|joe\s+sandbox|execution\s+trace|process\s+behavior|network\s+callback)\b` - Corroborative keywords: sandbox detonation reports, sandbox, detonation, reports, security, operations, threat, data - Example matches: `sandbox detonation reports`, `sandbox detonation`, `behavioral analysis` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Sandbox detonation reports Identifies sandbox detonation reports patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-292-sandbox-detonation-reports` - URL: https://testpattern.dev/patterns/global-top500-292-sandbox-detonation-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:sandbox\s+detonation|sandbox\s+report|behavioral\s+analysis|malware\s+analysis|detonation\s+chamber|indicators\s+of\s+compromise|threat\s+intelligence|dynamic\s+analysis|static\s+analysis|payload\s+execution|command\s+and\s+control|network\s+traffic)\b` - Corroborative keywords: sandbox detonation reports, sandbox, detonation, reports, security, operations, threat, data - Example matches: `sandbox detonation`, `sandbox report`, `behavioral analysis` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Satellite tasking and collection plans Identifies documents containing references to satellite tasking and collection plans in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-428-satellite-tasking-and-collection-plans` - URL: https://testpattern.dev/patterns/au-top500-428-satellite-tasking-and-collection-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:satellite\s+tasking|collection\s+plan|orbital\s+tasking|reconnaissance\s+satellite|imagery\s+collection|defense\s+satellite|intelligence\s+collection|tasking\s+order|satellite\s+schedule|national\s+security|overhead\s+collection)\b` - Corroborative keywords: satellite tasking and collection plans, satellite, tasking, collection, plans, defense, intelligence, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+2 more) - Example matches: `satellite tasking`, `collection plan`, `orbital tasking` - Known false positives: Common words and phrases related to satellite tasking and collection plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Satellite tasking and collection plans Identifies documents containing references to satellite tasking and collection plans in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-428-satellite-tasking-and-collection-plans` - URL: https://testpattern.dev/patterns/global-top500-428-satellite-tasking-and-collection-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:satellite\s+tasking|collection\s+plan|orbital\s+pass|reconnaissance\s+satellite|imagery\s+collection|overhead\s+collection|satellite\s+schedule|revisit\s+rate|collection\s+requirement|tasking\s+order|national\s+technical\s+means|space[\s-]+based\s+surveillance)\b` - Corroborative keywords: satellite tasking and collection plans - Example matches: `satellite tasking`, `collection plan`, `orbital pass` - Known false positives: Common words and phrases related to satellite tasking and collection plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### SCADA network diagrams Identifies documents containing references to scada network diagrams in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-441-scada-network-diagrams` - URL: https://testpattern.dev/patterns/au-top500-441-scada-network-diagrams - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:network\s+diagram|supervisory\s+control|data\s+acquisition|remote\s+terminal\s+unit|industrial\s+control|OT\s+network|critical\s+infrastructure|control\s+system|network\s+topology)\b` - Corroborative keywords: scada network diagrams, scada, network, diagrams, critical, infrastructure, systems, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender (+38 more) - Example matches: `network diagram`, `supervisory control`, `data acquisition` - Known false positives: Common words and phrases related to scada network diagrams appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### SCADA network diagrams Identifies documents containing references to scada network diagrams in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-441-scada-network-diagrams` - URL: https://testpattern.dev/patterns/global-top500-441-scada-network-diagrams - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:network\s+diagram|supervisory\s+control|remote\s+terminal\s+unit|human\s+machine\s+interface|control\s+network|OT\s+network|industrial\s+control|network\s+topology|process\s+network)\b` - Corroborative keywords: scada network diagrams, scada, network, diagrams, critical, infrastructure, systems, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender (+67 more) - Example matches: `network diagram`, `supervisory control`, `remote terminal unit` - Known false positives: Common words and phrases related to scada network diagrams appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### SCADA/ICS System Documentation Detects SCADA and industrial control system documentation including PLC programming, HMI configurations, and OT protocols. - Slug: `au-scada-ics-documentation` - URL: https://testpattern.dev/patterns/au-scada-ics-documentation - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: Criminal Code Act 1995 (Cth), SOCI Act 2018 (Cth) - Data categories: infrastructure, technology - Scope: narrow - Risk rating: 10 - Example matches: `SCADA system documentation: PLC programming for Modbus RTU`, `ICS configuration manual with HMI and DCS setup for DNP3 protocol`, `Industrial control system architecture: RTU and OPC UA integration` - Known false positives: Generic control system or protocol references in IT contexts. ### Scenario planning models Identifies documents containing references to scenario planning models in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-200-scenario-planning-models` - URL: https://testpattern.dev/patterns/au-top500-200-scenario-planning-models - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:scenario\s+planning|scenario\s+model|scenario\s+analysis|base\s+case|downside\s+case|upside\s+case|stress\s+test|sensitivity\s+analysis|what[\s-]+if\s+analysis|contingency\s+planning|risk\s+scenario|Monte\s+Carlo)\b` - Corroborative keywords: scenario planning models, scenario, planning, models, mergers, acquisitions, strategy - Example matches: `scenario planning`, `scenario model`, `scenario analysis` - Known false positives: Common words and phrases related to scenario planning models appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Scenario planning models Identifies documents containing references to scenario planning models in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-200-scenario-planning-models` - URL: https://testpattern.dev/patterns/global-top500-200-scenario-planning-models - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:scenario\s+planning|scenario\s+analysis|sensitivity\s+analysis|stress\s+test|base\s+case|downside\s+case|upside\s+case|Monte\s+Carlo|risk\s+scenario|contingency\s+plan|what[\s-]+if\s+analysis)\b` - Corroborative keywords: scenario planning models, scenario, planning, models, mergers, acquisitions, strategy - Example matches: `scenario planning`, `scenario analysis`, `sensitivity analysis` - Known false positives: Common words and phrases related to scenario planning models appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Scheduled maintenance plans Identifies scheduled maintenance plans patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-318-scheduled-maintenance-plans` - URL: https://testpattern.dev/patterns/au-top500-318-scheduled-maintenance-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:scheduled\s+maintenance|maintenance\s+window|planned\s+outage|maintenance\s+plan|patching\s+schedule|downtime\s+notification|service\s+interruption|maintenance\s+calendar|system\s+update|firmware\s+update|maintenance\s+notification|change\s+window)\b` - Corroborative keywords: scheduled maintenance plans, scheduled, maintenance, plans, operations, resilience - Example matches: `scheduled maintenance`, `maintenance window`, `planned outage` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Scheduled maintenance plans Identifies scheduled maintenance plans patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-318-scheduled-maintenance-plans` - URL: https://testpattern.dev/patterns/global-top500-318-scheduled-maintenance-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:scheduled\s+maintenance|maintenance\s+window|maintenance\s+plan|planned\s+outage|downtime\s+schedule|change\s+management|service\s+interruption|disaster\s+recovery|business\s+continuity)\b` - Corroborative keywords: scheduled maintenance plans, scheduled, maintenance, plans, operations, resilience - Example matches: `scheduled maintenance`, `maintenance window`, `maintenance plan` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Scholarship evaluation files Identifies documents containing references to scholarship evaluation files in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-348-scholarship-evaluation-files` - URL: https://testpattern.dev/patterns/au-top500-348-scholarship-evaluation-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:scholarship\s+evaluation|scholarship\s+application|merit\s+assessment|scholarship\s+recipient|award\s+evaluation|selection\s+criteria|scholarship\s+panel|academic\s+merit|financial\s+need\s+assessment|scholarship\s+review)\b` - Corroborative keywords: scholarship evaluation files, scholarship, evaluation, files, education, research, administration, proprietary, intellectual property, trade secret, patent, copyright, trademark, confidential, invention, prototype, algorithm, formula, source code, design document (+37 more) - Example matches: `scholarship evaluation`, `scholarship application`, `merit assessment` - Known false positives: Common words and phrases related to scholarship evaluation files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Scholarship evaluation files Identifies documents containing references to scholarship evaluation files in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-348-scholarship-evaluation-files` - URL: https://testpattern.dev/patterns/global-top500-348-scholarship-evaluation-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:scholarship\s+evaluation|scholarship\s+review|merit\s+assessment|award\s+criteria|selection\s+committee|applicant\s+ranking|scholarship\s+recipient|academic\s+achievement|financial\s+need|evaluation\s+rubric|scholarship\s+panel|award\s+decision)\b` - Corroborative keywords: scholarship evaluation files, scholarship, evaluation, files, education, research, administration, proprietary, intellectual property, trade secret, patent, copyright, trademark, confidential, invention, prototype, algorithm, formula, source code, design document (+37 more) - Example matches: `scholarship evaluation`, `scholarship review`, `merit assessment` - Known false positives: Common words and phrases related to scholarship evaluation files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Sealed court filing records Identifies documents containing references to sealed court filing records in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-416-sealed-court-filing-records` - URL: https://testpattern.dev/patterns/au-top500-416-sealed-court-filing-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: IPA 2009 (Qld), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:sealed\s+court\s+filing\s+records|sealed\s+filing|suppression\s+order|non[\s-]+publication\s+order|restricted\s+court\s+record|closed\s+court|confidential\s+filing|court\s+seal|redacted\s+filing|judicial\s+order|protected\s+record|in\s+camera\s+hearing)\b` - Corroborative keywords: sealed court filing records, sealed, court, filing, records, law, enforcement, justice, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant (+32 more) - Example matches: `sealed court filing records`, `sealed filing`, `suppression order` - Known false positives: Common words and phrases related to sealed court filing records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Sealed court filing records Identifies documents containing references to sealed court filing records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-416-sealed-court-filing-records` - URL: https://testpattern.dev/patterns/global-top500-416-sealed-court-filing-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Partial - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:sealed\s+record|sealed\s+filing|court\s+seal|sealed\s+indictment|sealed\s+order|under\s+seal|sealed\s+docket|confidential\s+filing|sealed\s+proceeding|restricted\s+access|sealed\s+court\s+order|expunged\s+record)\b` - Corroborative keywords: sealed court filing records - Example matches: `sealed record`, `sealed filing`, `court seal` - Known false positives: Common words and phrases related to sealed court filing records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Secrets vault exports Identifies documents containing references to secrets vault exports in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-276-secrets-vault-exports` - URL: https://testpattern.dev/patterns/au-top500-276-secrets-vault-exports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:secrets\s+vault\s+exports|vault\s+export|hashicorp\s+vault|azure\s+key\s+vault|aws\s+secrets\s+manager|secret\s+rotation|credential\s+vault|key\s+vault|secret\s+store|vault\s+backup|sealed\s+secrets)\b` - Corroborative keywords: secrets vault exports, OFFICIAL, OFFICIAL:Sensitive, PROTECTED, SECRET, TOP SECRET, CABINET-IN-CONFIDENCE, NOFORN, REL TO, ORCON, National Cabinet, AUSTEO, AGAO, Sensitive: Legal, Sensitive: Personal Privacy, Sensitive: Legislative Secrecy, X-Protective-Marking, field, column, row (+14 more) - Example matches: `secrets vault exports`, `vault export`, `hashicorp vault` - Known false positives: Common words and phrases related to secrets vault exports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Secrets vault exports Identifies documents containing references to secrets vault exports in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-276-secrets-vault-exports` - URL: https://testpattern.dev/patterns/global-top500-276-secrets-vault-exports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:secrets\s+vault|vault\s+export|hashicorp\s+vault|azure\s+key\s+vault|aws\s+secrets\s+manager|secret\s+engine|vault\s+token|sealed\s+secrets|secret\s+rotation|vault\s+backup|credential\s+store)\b` - Corroborative keywords: secrets vault exports, OFFICIAL, OFFICIAL:Sensitive, PROTECTED, SECRET, TOP SECRET, CABINET-IN-CONFIDENCE, NOFORN, REL TO, ORCON, National Cabinet, AUSTEO, AGAO, Sensitive: Legal, Sensitive: Personal Privacy, Sensitive: Legislative Secrecy, X-Protective-Marking, field, column, row (+26 more) - Example matches: `secrets vault`, `vault export`, `hashicorp vault` - Known false positives: Common words and phrases related to secrets vault exports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Security Audit Report Detects security audit reports including SOC 2, ISO 27001, and IRAP findings. - Slug: `au-security-audit-report` - URL: https://testpattern.dev/patterns/au-security-audit-report - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), Privacy Act 1988 (Cth) - Data categories: security, audit - Scope: narrow - Risk rating: 9 - Example matches: `Security audit report: SOC 2 Type II with ISO 27001 control assessment`, `IRAP security assessment: security control findings and audit results`, `Security certification audit: compliance audit and control objective review` - Known false positives: Physical security or home security references. ### Security clearance adjudication files Identifies documents containing references to security clearance adjudication files in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-433-security-clearance-adjudication-files` - URL: https://testpattern.dev/patterns/au-top500-433-security-clearance-adjudication-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:security\s+clearance|clearance\s+level|top\s+secret|negative\s+vetting|positive\s+vetting|personnel\s+security|background\s+check|national\s+security|defense\s+clearance)\b` - Corroborative keywords: security clearance adjudication files, security, clearance, adjudication, files, defense, intelligence, NV1, NV2, PV, Baseline, Negative Vetting, Positive Vetting, AGSVA, security clearance, security vetting, personnel security, clearance holder, national security information - Example matches: `security clearance`, `clearance level`, `top secret` - Known false positives: Common words and phrases related to security clearance adjudication files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Security clearance adjudication files Identifies documents containing references to security clearance adjudication files in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-433-security-clearance-adjudication-files` - URL: https://testpattern.dev/patterns/global-top500-433-security-clearance-adjudication-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:security\s+clearance|background\s+investigation|personnel\s+security|clearance\s+level|top\s+secret|sensitive\s+compartmented|eligibility\s+determination|security\s+screening|need\s+to\s+know)\b` - Corroborative keywords: security clearance adjudication files, NV1, NV2, PV, Baseline, Negative Vetting, Positive Vetting, AGSVA, security clearance, security vetting, personnel security, clearance holder, national security information, field, column, row, entry, record, value, form (+22 more) - Example matches: `security clearance`, `background investigation`, `personnel security` - Known false positives: Common words and phrases related to security clearance adjudication files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Security Clearance Reference Detects references to Australian Government security clearances and personnel vetting status. - Slug: `au-security-clearance-reference` - URL: https://testpattern.dev/patterns/au-security-clearance-reference - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: 2006 MOU National Security, Criminal Code Act 1995 (Cth) - Data categories: government, security, sensitive-data - Scope: narrow - Risk rating: 10 - Example matches: `Security clearance: Negative Vetting 1 granted`, `AGSVA clearance level Positive Vetting required`, `Personnel security vetting: Baseline clearance active` - Known false positives: Generic security terms in non-vetting contexts. ### Security Incident Report Detects security incident reports containing forensic findings, root causes, and response gaps. - Slug: `au-security-incident-report` - URL: https://testpattern.dev/patterns/au-security-incident-report - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: security - Scope: narrow - Risk rating: 9 - Example matches: `Security incident report: forensic analysis and root cause analysis findings`, `Indicators of compromise (IOC) identified: malware analysis and threat actor attribution`, `Breach investigation: attack vector, compromise assessment, and incident forensics` - Known false positives: Physical security or traffic incidents. ### Sensitive network topology diagrams Identifies sensitive network topology diagrams patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-285-sensitive-network-topology-diagrams` - URL: https://testpattern.dev/patterns/au-top500-285-sensitive-network-topology-diagrams - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:sensitive\s+network\s+topology|network\s+diagram|network\s+architecture|ip\s+addressing|network\s+segmentation|infrastructure\s+diagram|data\s+center\s+layout)\b` - Corroborative keywords: sensitive network topology diagrams, sensitive, network, topology, diagrams, security, operations, threat, data, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name (+18 more) - Example matches: `sensitive network topology`, `network diagram`, `network architecture` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Sensitive network topology diagrams Identifies sensitive network topology diagrams patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-285-sensitive-network-topology-diagrams` - URL: https://testpattern.dev/patterns/global-top500-285-sensitive-network-topology-diagrams - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:network\s+topology|network\s+diagram|network\s+architecture|ip\s+addressing|routing\s+table|network\s+segment|infrastructure\s+diagram|network\s+map|data\s+center\s+layout)\b` - Corroborative keywords: sensitive network topology diagrams, sensitive, network, topology, diagrams, security, operations, threat, data, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name (+47 more) - Example matches: `network topology`, `network diagram`, `network architecture` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Serial number traceability records Identifies documents containing references to serial number traceability records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-230-serial-number-traceability-records` - URL: https://testpattern.dev/patterns/au-top500-230-serial-number-traceability-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:serial\s+number\s+traceability|serial\s+number|traceability\s+record|batch\s+number|lot\s+number|product\s+tracking|manufacturing\s+traceability|component\s+traceability|part\s+number|chain\s+of\s+custody)\b` - Corroborative keywords: serial number traceability records, serial, number, traceability, records, product, quality, safety, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name (+44 more) - Example matches: `serial number traceability`, `serial number`, `traceability record` - Known false positives: Common words and phrases related to serial number traceability records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Serial number traceability records Identifies documents containing references to serial number traceability records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-230-serial-number-traceability-records` - URL: https://testpattern.dev/patterns/global-top500-230-serial-number-traceability-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:serial\s+number\s+traceability\s+records|serial\s+number|traceability\s+record|lot\s+number|product\s+quality|safety\s+traceability|batch\s+tracking|component\s+traceability|manufacturing\s+record|production\s+lot)\b` - Corroborative keywords: serial number traceability records, serial, number, traceability, records, product, quality, safety, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name (+44 more) - Example matches: `serial number traceability records`, `serial number`, `traceability record` - Known false positives: Common words and phrases related to serial number traceability records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Service dependency maps Identifies service dependency maps patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-320-service-dependency-maps` - URL: https://testpattern.dev/patterns/au-top500-320-service-dependency-maps - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:service\s+dependency|dependency\s+map|infrastructure\s+map|disaster\s+recovery|business\s+continuity|service\s+catalog|capacity\s+planning|endpoint\s+management|network\s+topology)\b` - Corroborative keywords: service dependency maps, service, dependency, maps, operations, resilience - Example matches: `service dependency`, `dependency map`, `infrastructure map` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Service dependency maps Identifies service dependency maps patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-320-service-dependency-maps` - URL: https://testpattern.dev/patterns/global-top500-320-service-dependency-maps - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:service\s+dependency|dependency\s+map|dependency\s+mapping|service\s+topology|infrastructure\s+map|service\s+catalog|upstream\s+dependency|downstream\s+dependency|architecture\s+diagram)\b` - Corroborative keywords: service dependency maps, service, dependency, maps, operations, resilience - Example matches: `service dependency`, `dependency map`, `dependency mapping` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Service-level penalty records Identifies documents containing references to service-level penalty records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-155-service-level-penalty-records` - URL: https://testpattern.dev/patterns/au-top500-155-service-level-penalty-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:service\s+level\s+penalty|SLA\s+breach|penalty\s+clause|service\s+credit|performance\s+penalty|KPI\s+failure|liquidated\s+damages|service\s+level\s+agreement|contractual\s+penalty|remediation\s+plan)\b` - Corroborative keywords: service-level penalty records, service, level, penalty, records, procurement, supplier, management - Example matches: `service level penalty`, `sla breach`, `penalty clause` - Known false positives: Common words and phrases related to service-level penalty records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Service-level penalty records Identifies documents containing references to service-level penalty records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-155-service-level-penalty-records` - URL: https://testpattern.dev/patterns/global-top500-155-service-level-penalty-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:service\s+level\s+penalty|SLA\s+breach|penalty\s+clause|service\s+credit|performance\s+penalty|liquidated\s+damages|service\s+level\s+agreement|uptime\s+guarantee|response\s+time\s+SLA|penalty\s+calculation|KPI\s+shortfall|remediation\s+plan)\b` - Corroborative keywords: service-level penalty records, service, level, penalty, records, procurement, supplier, management - Example matches: `service level penalty`, `sla breach`, `penalty clause` - Known false positives: Common words and phrases related to service-level penalty records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Session cookies Identifies session cookies patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-269-session-cookies` - URL: https://testpattern.dev/patterns/au-top500-269-session-cookies - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth), NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:session\s+cookies|session\s+token|session\s+id|secure\s+cookie|authentication\s+cookie)\b` - Corroborative keywords: session cookies, session, cookies, credentials, keys, secrets - Example matches: `session cookies`, `session token`, `session id` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Session cookies Identifies session cookies patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-269-session-cookies` - URL: https://testpattern.dev/patterns/global-top500-269-session-cookies - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:session\s+cookie|session\s+id|secure\s+cookie|authentication\s+cookie|session\s+token|cookie\s+header|session\s+hijack|cookie\s+theft)\b` - Corroborative keywords: session cookies, session, cookies, credentials, keys, secrets - Example matches: `session cookie`, `session id`, `secure cookie` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Settlement agreement drafts Identifies documents containing references to settlement agreement drafts in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-166-settlement-agreement-drafts` - URL: https://testpattern.dev/patterns/au-top500-166-settlement-agreement-drafts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:settlement\s+agreement\s+drafts|settlement\s+agreement|deed\s+of\s+settlement|settlement\s+terms|without\s+prejudice|compromise\s+agreement|release\s+and\s+discharge|confidential\s+settlement|settlement\s+sum|mediation\s+outcome|dispute\s+resolution|consent\s+orders)\b` - Corroborative keywords: settlement agreement drafts, settlement, agreement, drafts, corporate, legal, governance - Example matches: `settlement agreement drafts`, `settlement agreement`, `deed of settlement` - Known false positives: Common words and phrases related to settlement agreement drafts appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Settlement agreement drafts Identifies documents containing references to settlement agreement drafts in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-166-settlement-agreement-drafts` - URL: https://testpattern.dev/patterns/global-top500-166-settlement-agreement-drafts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:settlement\s+agreement\s+drafts|settlement\s+agreement|deed\s+of\s+settlement|settlement\s+terms|release\s+and\s+discharge|confidential\s+settlement|without\s+admission|compromise\s+agreement|settlement\s+sum|mutual\s+release|dispute\s+resolution|mediation\s+outcome)\b` - Corroborative keywords: settlement agreement drafts, settlement, agreement, drafts, corporate, legal, governance - Example matches: `settlement agreement drafts`, `settlement agreement`, `deed of settlement` - Known false positives: Common words and phrases related to settlement agreement drafts appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Settlement Authority and Negotiation Mandate Detects documents authorising settlement ranges, negotiation floors/ceilings, and approved concession parameters. Disclosure reveals the State's maximum position, destroying negotiation leverage and potentially costing tens of millions in lost bargaining position. - Slug: `settlement-authority-and-negotiation-mandate` - URL: https://testpattern.dev/patterns/settlement-authority-and-negotiation-mandate - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Evidence Act 1977 (Qld), RTI Act 2009 (Qld) - Data categories: legal, government - Scope: wide - Risk rating: 8 - Pattern: `(?i)\b(?:settlement\s+(?:authority|mandate|range)|negotiation\s+(?:authority|mandate)|authority\s+to\s+settle)\b` - Corroborative keywords: approved, authorised, authority, delegate, ceiling, floor, range, maximum, minimum, concession, privileged, PROTECTED, without prejudice, LPP, legal, counsel, privilege, litigation, proceedings, court (+30 more) - Example matches: `PROTECTED — LEGAL PROFESSIONAL PRIVILEGE Settlement Authority Matter: Williams v State of Queensland Court: Supreme Court of Queensland The Director-General has authorised a settlement range of $2,500,000 to $4,200,000 inclusive of costs. The negotiation ceiling is $4,200,000.`, `I seek authority to settle the above matter within the range of $850,000 to $1.2M. The negotiation mandate should authorise the instructing solicitor to offer up to the ceiling without further reference.`, `CONFIDENTIAL — WITHOUT PREJUDICE Negotiation Authority Approved by: Under Treasurer (Financial Delegate) Matter: Native title compensation — Cape York Region Approved settlement range: $15M - $22.5M over 10 years` - Known false positives: Published settlement outcomes in court records or consent orders; Policy documents describing settlement authority processes; Media reports of settlements achieved ### Sexual Assault Counselling Record Detects sexual assault counselling session records containing victim identifiers, forensic medical examination details, and trauma counselling notes. These records are subject to absolute privilege in Queensland and carry the highest privacy protections — disclosure can re-traumatise survivors, compromise criminal proceedings, and endanger safety. - Slug: `sexual-assault-counselling-record` - URL: https://testpattern.dev/patterns/sexual-assault-counselling-record - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Criminal Code 1899 (Qld), Evidence Act 1977 (Qld), IPA 2009 (Qld) - Data categories: health, law-enforcement, government - Scope: wide - Risk rating: 10 - Pattern: `(?i)\b(sexual\s+assault\s+counselling|forensic\s+medical\s+examination|trauma\s+counselling\s+(?:session|record|notes)|victim[\s/]survivor\s+support|SARAS\s+(?:referral|service|case)|sexual\s+violence\s+counselling)\b` - Corroborative keywords: PROTECTED, Privacy, sexual assault counselling, SARAS, forensic medical examination, trauma counselling, victim, survivor, counsellor, incident date, police report number, crisis support, safety plan, court proceeding, confidential communication, Queensland Health, sexual assault service, referral, patient, clinical (+55 more) - Example matches: `PROTECTED Privacy. Sexual Assault Counselling Record — Queensland Health SARAS Service. Client: Rebecca Louise MARTIN, DOB 23/05/1994. Case Reference: SARAS-2026-04518. Session 4 of trauma counselling conducted 01/03/2026 by accredited counsellor Sarah Thompson. Client reports continued hypervigilance and sleep disturbance following the sexual assault of 12/01/2026. Forensic medical examination was completed at Royal Brisbane Women's Hospital on 13/01/2026. Safety plan reviewed and updated. QPS report number: QP-2026-187423.`, `Queensland Sexual Assault Response and Support — Confidential Communication. Victim/survivor support referral for client Ms Jennifer WONG. Referral from QPS Sexual Crimes Investigation Unit following reported sexual assault. Forensic medical examination completed — forensic kit retained under chain of custody. Initial trauma counselling session scheduled 08/03/2026. Court proceeding anticipated. Counsellor: Dr Amanda Patel, SARAS Cairns.`, `Confidential — Sexual Assault Service. Trauma counselling notes for ongoing client. Client presented in acute distress following contact from offender's legal representative. Crisis support provided. Safety plan activated — emergency accommodation arranged through DV Connect. Counsellor assessment: client requires increased session frequency. Incident date: 14/11/2025. Police report number: QP-2025-342891. Next session: 10/03/2026.` - Known false positives: Public awareness campaigns about sexual assault support services; Published annual reports and statistics on sexual assault service utilisation; Training materials for sexual assault counsellors using fictional scenarios ### Sexual orientation Identifies documents containing references to sexual orientation in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-015-sexual-orientation` - URL: https://testpattern.dev/patterns/au-top500-015-sexual-orientation - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:sexual\s+orientation|personal\s+details|sensitive\s+information|diversity\s+data|equal\s+opportunity)\b` - Corroborative keywords: sexual orientation, sexual, orientation, personal, identity, demographics, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender, given name (+44 more) - Example matches: `sexual orientation`, `personal details`, `sensitive information` - Known false positives: Common words and phrases related to sexual orientation appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Sexual orientation Identifies documents containing references to sexual orientation in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-015-sexual-orientation` - URL: https://testpattern.dev/patterns/global-top500-015-sexual-orientation - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:sexual\s+orientation|sexual\s+preference|gender\s+preference|personal\s+relationship|intimate\s+partner|domestic\s+partnership|personal\s+demographics|diversity\s+data|equality\s+monitoring|protected\s+characteristic)\b` - Corroborative keywords: sexual orientation, sexual, orientation, personal, identity, demographics, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender, given name (+44 more) - Example matches: `sexual orientation`, `sexual preference`, `gender preference` - Known false positives: Common words and phrases related to sexual orientation appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Shipping manifest details Identifies documents containing references to shipping manifest details in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-152-shipping-manifest-details` - URL: https://testpattern.dev/patterns/au-top500-152-shipping-manifest-details - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:shipping\s+manifest|cargo\s+manifest|container\s+manifest|vessel\s+manifest|freight\s+details|consignment\s+note|cargo\s+reporting|shipping\s+schedule|bill\s+of\s+lading|transport\s+document)\b` - Corroborative keywords: shipping manifest details, shipping, manifest, details, procurement, supplier, management - Example matches: `shipping manifest`, `cargo manifest`, `container manifest` - Known false positives: Common words and phrases related to shipping manifest details appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Shipping manifest details Identifies documents containing references to shipping manifest details in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-152-shipping-manifest-details` - URL: https://testpattern.dev/patterns/global-top500-152-shipping-manifest-details - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:shipping\s+manifest|cargo\s+manifest|freight\s+manifest|shipment\s+details|packing\s+list|weight\s+manifest|dangerous\s+goods\s+declaration|cargo\s+description|gross\s+weight|net\s+weight|container\s+manifest|voyage\s+number)\b` - Corroborative keywords: shipping manifest details, shipping, manifest, details, procurement, supplier, management - Example matches: `shipping manifest`, `cargo manifest`, `freight manifest` - Known false positives: Common words and phrases related to shipping manifest details appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### SIEM event data Identifies siem event data patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-281-siem-event-data` - URL: https://testpattern.dev/patterns/au-top500-281-siem-event-data - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:siem\s+event\s+data|security\s+event|log\s+correlation|alert\s+rule|event\s+log|security\s+operations)\b` - Corroborative keywords: siem event data, siem, event, data, security, operations, threat - Example matches: `siem event data`, `security event`, `log correlation` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### SIEM event data Identifies siem event data patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-281-siem-event-data` - URL: https://testpattern.dev/patterns/global-top500-281-siem-event-data - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:elastic\s+security|security\s+event|log\s+correlation|alert\s+rule|event\s+log|security\s+operations|incident\s+detection)\b` - Corroborative keywords: siem event data, siem, event, data, security, operations, threat - Example matches: `elastic security`, `security event`, `log correlation` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Signals intelligence reports Identifies documents containing references to signals intelligence reports in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-425-signals-intelligence-reports` - URL: https://testpattern.dev/patterns/au-top500-425-signals-intelligence-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:signals\s+intelligence|intelligence\s+report|classified\s+report|defense\s+intelligence|signal\s+intercept|electronic\s+intelligence|communications\s+intelligence|national\s+security|top\s+secret)\b` - Corroborative keywords: signals intelligence reports, signals, intelligence, reports, defense, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program, public benefit, constituency - Example matches: `signals intelligence`, `intelligence report`, `classified report` - Known false positives: Common words and phrases related to signals intelligence reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Signals intelligence reports Identifies documents containing references to signals intelligence reports in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-425-signals-intelligence-reports` - URL: https://testpattern.dev/patterns/global-top500-425-signals-intelligence-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:signals\s+intelligence|intercept\s+report|signal\s+intercept|electronic\s+surveillance|communications\s+intelligence|technical\s+collection|frequency\s+analysis|traffic\s+analysis)\b` - Corroborative keywords: signals intelligence reports - Example matches: `signals intelligence`, `intercept report`, `signal intercept` - Known false positives: Common words and phrases related to signals intelligence reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### SIM card identifiers Identifies documents containing references to sim card identifiers in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-052-sim-card-identifiers` - URL: https://testpattern.dev/patterns/au-top500-052-sim-card-identifiers - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:sim\s+card\s+identifiers)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: sim card identifiers, sim, card, identifiers, contact, location, data, ID, identifier, number, reference, code, index, serial, account, file number, case number, record number, ref, field (+16 more) - Example matches: `SIM card identifiers`, `sim card identifiers`, `SIM card identifiers` - Known false positives: Common words and phrases related to sim card identifiers appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### SIM card identifiers Identifies documents containing references to sim card identifiers in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-052-sim-card-identifiers` - URL: https://testpattern.dev/patterns/global-top500-052-sim-card-identifiers - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:sim\s+card\s+identifiers)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: sim card identifiers, sim, card, identifiers, contact, location, data, ID, identifier, number, reference, code, index, serial, account, file number, case number, record number, ref, field (+16 more) - Example matches: `SIM card identifiers`, `sim card identifiers`, `SIM card identifiers` - Known false positives: Common words and phrases related to sim card identifiers appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### SIN Detects SIN patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `ca-social-insurance-number` - URL: https://testpattern.dev/patterns/ca-social-insurance-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: ca - Regulations: Law 25 (QC), PIPEDA - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b[1-79]\d{2}[- ]?\d{3}[- ]?\d{3}\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `123-456-789`, `123 456 789`, `123456789` - Known false positives: Common words and phrases related to sin appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English and French (Canada), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Singapore Driving License Number Detects Singapore driving license number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `sg-drivers-license` - URL: https://testpattern.dev/patterns/sg-drivers-license - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: sg - Regulations: PDPA (SG) - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\bS\d{7}[A-Z]\b` - Corroborative keywords: driver, licence, license, driving, DL, ID number, identification, ID card, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `S1234567A`, `S9876543Z`, `S0012345B` - Known false positives: Generic alphanumeric sequences matching the driving license format appearing in unrelated contexts, particularly Singapore NRIC numbers which share a similar format. ### Singapore Passport Number Detects Singapore passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `sg-passport-number` - URL: https://testpattern.dev/patterns/sg-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: sg - Regulations: PDPA (SG) - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b[A-Z]\d{7}[A-Z]\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `E1234567A`, `K9876543B`, `S2345678Z` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Singapore Physical Addresses Detects Singapore Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `sg-physical-addresses` - URL: https://testpattern.dev/patterns/sg-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: sg - Regulations: PDPA (SG) - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 street name, unit 4`, `located at 45 road example`, `deliver to 78 avenue test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### SLA breach analysis reports Identifies sla breach analysis reports patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-314-sla-breach-analysis-reports` - URL: https://testpattern.dev/patterns/au-top500-314-sla-breach-analysis-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:SLA\s+breach|service\s+level\s+agreement|SLA\s+violation|uptime\s+target|response\s+time|resolution\s+time|penalty\s+clause|service\s+credit|SLA\s+report|availability\s+target|performance\s+metric|breach\s+analysis)\b` - Corroborative keywords: sla breach analysis reports, sla, breach, analysis, reports, operations, resilience - Example matches: `SLA breach`, `service level agreement`, `SLA violation` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### SLA breach analysis reports Identifies sla breach analysis reports patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-314-sla-breach-analysis-reports` - URL: https://testpattern.dev/patterns/global-top500-314-sla-breach-analysis-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:SLA\s+breach|service\s+level\s+agreement|SLA\s+violation|uptime\s+target|performance\s+metric|penalty\s+clause|service\s+credit|response\s+time|resolution\s+time|availability\s+target|breach\s+analysis|SLA\s+report)\b` - Corroborative keywords: sla breach analysis reports, sla, breach, analysis, reports, operations, resilience - Example matches: `SLA breach`, `service level agreement`, `SLA violation` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Slack Token Detects Slack Token patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `global-slack-token` - URL: https://testpattern.dev/patterns/global-slack-token - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Risk rating: 10 - Pattern: `\bxox[baprs]-[0-9]{10,13}-[0-9]{10,13}-[a-zA-Z0-9]{24}\b` - Corroborative keywords: api key, api_key, apikey, access key, secret key, private key, auth token, authorization, access token, bearer, conn str, connection string, connectionstring, cookie, credential, database, host, JWT, oauth, passphrase (+37 more) - Example matches: `xoxb-1234567890-1234567890-ABCDEFGHIJKLMNOPabcdefgh`, `xoxp-1234567890-1234567890-ABCDEFGHIJKLMNOPabcdefgh`, `xoxa-1234567890-1234567890-ABCDEFGHIJKLMNOPabcdefgh` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Slovakia Driver's License Number Detects Slovakia driver's license number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `sk-drivers-license` - URL: https://testpattern.dev/patterns/sk-drivers-license - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: sk, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\b[A-Z]{2}\d{6}\b` - Corroborative keywords: driver, licence, license, driving, DL, ID number, identification, ID card, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `AB123456`, `XY987654`, `SK000123` - Known false positives: Generic numeric sequences matching the driver's license format appearing in unrelated contexts. ### Slovakia Passport Number Detects Slovakia passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `sk-passport-number` - URL: https://testpattern.dev/patterns/sk-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: sk, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b[A-Z]{2}\d{7}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `SK1234567`, `AB9876543`, `PQ2345678` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Slovakia Physical Addresses Detects Slovakia Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `sk-physical-addresses` - URL: https://testpattern.dev/patterns/sk-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: sk, eu - Regulations: GDPR - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 ulica name, unit 4`, `located at 45 námestie example`, `deliver to 78 cesta test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### Slovenia Driver's License Number Detects Slovenia driver's license number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `si-drivers-license` - URL: https://testpattern.dev/patterns/si-drivers-license - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: si, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\b\d{8}\b` - Corroborative keywords: driver, licence, license, driving, DL, ID number, identification, ID card, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `12345678`, `98765432`, `01234567` - Known false positives: Generic numeric sequences matching the driver's license format appearing in unrelated contexts. ### Slovenia Passport Number Detects Slovenia passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `si-passport-number` - URL: https://testpattern.dev/patterns/si-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: si, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b[A-Z]{2}\d{7}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `PB1234567`, `KV9876543`, `MN2345678` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Slovenia Physical Addresses Detects Slovenia Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `si-physical-addresses` - URL: https://testpattern.dev/patterns/si-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: si, eu - Regulations: GDPR - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 ulica name, unit 4`, `located at 45 cesta example`, `deliver to 78 trg test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### Slovenia Tax Identification Number Detects Slovenia Tax Identification Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Due to the numeric format, corroborative evidence keywords are essential for reliable detection. - Slug: `si-tax-id` - URL: https://testpattern.dev/patterns/si-tax-id - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: si, eu - Regulations: gdpr - Data categories: pii, financial, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b\d{8}\b` - Corroborative keywords: davčna številka, tax identification, TIN, FURS, davčni, tax identification number, tax number, tax return, IRD, NIF, tax ID, inland revenue, taxpayer identification, αριθμός φορολογικού μητρώου, ΑΦΜ, φορολογικός, Abgabenkontonummer, adóazonosító, adószám, belastingnummer (+45 more) - Example matches: `12345678`, `98765432`, `11223344` - Known false positives: Generic numeric sequences in non-tax contexts such as reference numbers or account identifiers; Numbers from other identification schemes with similar digit patterns ### SOC analyst case notes Identifies soc analyst case notes patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-295-soc-analyst-case-notes` - URL: https://testpattern.dev/patterns/au-top500-295-soc-analyst-case-notes - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:soc\s+case|analyst\s+notes|case\s+id|triage)\b` - Corroborative keywords: soc analyst case notes, soc, analyst, case, notes, security, operations, threat, data - Example matches: `SOC analyst case notes`, `soc analyst case notes`, `SOC analyst case notes` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### SOC analyst case notes Identifies soc analyst case notes patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-295-soc-analyst-case-notes` - URL: https://testpattern.dev/patterns/global-top500-295-soc-analyst-case-notes - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Partial - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:soc\s+case|analyst\s+notes|case\s+id|triage)\b` - Corroborative keywords: soc analyst case notes, soc, analyst, case, notes, security, operations, threat, data - Example matches: `SOC analyst case notes`, `soc analyst case notes`, `SOC analyst case notes` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### SOCI Act Compliance Document Detects Security of Critical Infrastructure (SOCI) Act compliance documents and resilience assessments. - Slug: `au-soci-act-compliance` - URL: https://testpattern.dev/patterns/au-soci-act-compliance - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: Criminal Code 1899 (Qld), SOCI Act 2018 (Cth) - Data categories: security, government, infrastructure - Scope: narrow - Risk rating: 9 - Example matches: `SOCI Act compliance assessment and resilience review per ACSC guidelines`, `Security of Critical Infrastructure Act risk assessment with Essential Eight maturity`, `AESCSF compliance report for Australian Energy Sector Cyber Security framework` - Known false positives: Abbreviation SOCI confused with social in non-infrastructure contexts. ### Social benefits claimant number Identifies documents containing references to social benefits claimant number in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-040-social-benefits-claimant-number` - URL: https://testpattern.dev/patterns/au-top500-040-social-benefits-claimant-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:social\s+benefits\s+claimant\s+number|claimant\s+number|customer\s+reference\s+number|Services\s+Australia|welfare\s+payment|social\s+security|benefit\s+recipient|income\s+support|pension\s+number)\b` - Corroborative keywords: social benefits claimant number, social, benefits, claimant, number, government, ids, civil, status, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant (+31 more) - Example matches: `social benefits claimant number`, `claimant number`, `customer reference number` - Known false positives: Common words and phrases related to social benefits claimant number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Social benefits claimant number Identifies documents containing references to social benefits claimant number in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-040-social-benefits-claimant-number` - URL: https://testpattern.dev/patterns/global-top500-040-social-benefits-claimant-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:social\s+benefits\s+claimant\s+number|claimant\s+number|benefits\s+number|social\s+benefits|welfare\s+number|benefit\s+reference|claimant\s+reference|social\s+security|welfare\s+claim|benefits\s+claim|entitlement\s+number|social\s+assistance)\b` - Corroborative keywords: social benefits claimant number - Example matches: `social benefits claimant number`, `claimant number`, `benefits number` - Known false positives: Common words and phrases related to social benefits claimant number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Social security number Identifies documents containing references to social security number in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-024-social-security-number` - URL: https://testpattern.dev/patterns/au-top500-024-social-security-number - Type: regex - Engine: boost_regex - Confidence: low - Detection quality: Verified - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `\bsocial\s+security\s+number\b` - Corroborative keywords: social security number, social, security, number, government, ids, civil, status, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `Social security number`, `social security number`, `Social security number` - Known false positives: Common words and phrases related to social security number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Sole-source justification memos Identifies documents containing references to sole-source justification memos in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-159-sole-source-justification-memos` - URL: https://testpattern.dev/patterns/au-top500-159-sole-source-justification-memos - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:sole[\s-]+source\s+justification\s+memos|sole\s+source|single\s+supplier|limited\s+tender|direct\s+sourcing|non[\s-]+competitive\s+procurement|justification\s+memo|procurement\s+exemption|value\s+for\s+money|market\s+analysis|supplier\s+capability)\b` - Corroborative keywords: sole-source justification memos, sole, source, justification, memos, procurement, supplier, management - Example matches: `sole-source justification memos`, `sole source`, `single supplier` - Known false positives: Common words and phrases related to sole-source justification memos appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Sole-source justification memos Identifies documents containing references to sole-source justification memos in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-159-sole-source-justification-memos` - URL: https://testpattern.dev/patterns/global-top500-159-sole-source-justification-memos - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:sole[\s-]+source\s+justification\s+memos|sole\s+source|sole\s+supplier|single\s+source|limited\s+tender|direct\s+procurement|justification\s+memo|procurement\s+exemption|market\s+analysis|vendor\s+selection|proprietary\s+supplier)\b` - Corroborative keywords: sole-source justification memos, sole, source, justification, memos, procurement, supplier, management - Example matches: `sole-source justification memos`, `sole source`, `sole supplier` - Known false positives: Common words and phrases related to sole-source justification memos appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Solicitor-General Legal Advice Detects privileged legal advice from the Solicitor-General on constitutional and high-stakes matters. The Solicitor-General provides independent legal advice on constitutional validity, High Court matters, and state sovereignty issues. Disclosure could compromise the State's position in constitutional litigation. - Slug: `solicitor-general-legal-advice` - URL: https://testpattern.dev/patterns/solicitor-general-legal-advice - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Evidence Act 1977 (Qld), RTI Act 2009 (Qld) - Data categories: legal, government - Scope: wide - Risk rating: 8 - Pattern: `(?i)\bSolicitor[- ]General\b` - Corroborative keywords: opinion, advice, constitutional, privileged, LPP, PROTECTED, High Court, constitutional validity, state sovereignty, legal professional privilege, legal, counsel, privilege, litigation, proceedings, court, jurisdiction, attorney, solicitor, barrister (+26 more) - Example matches: `PROTECTED — Legal-Privilege Solicitor-General's Opinion Re: Constitutional validity of the Resources Royalty Amendment Bill 2025 I have been asked to advise on the constitutional validity of the proposed amendments to the Mineral Resources Act 1989.`, `The Solicitor-General has provided privileged advice confirming that the proposed legislation may be vulnerable to challenge under s.92 of the Commonwealth Constitution. This advice is subject to legal professional privilege and must not be disclosed.`, `CONFIDENTIAL — LEGAL PROFESSIONAL PRIVILEGE Advice of the Solicitor General of Queensland To: The Attorney-General Subject: High Court special leave application — State of Queensland v Commonwealth` - Known false positives: Published High Court proceedings mentioning Solicitor-General as advocate; Academic or educational discussion of the Solicitor-General role; News articles about Solicitor-General appointments or public appearances ### Source process know-how manuals Identifies documents containing references to source process know-how manuals in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-218-source-process-know-how-manuals` - URL: https://testpattern.dev/patterns/au-top500-218-source-process-know-how-manuals - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:source\s+process\s+know[\s-]+how|process\s+manual|know[\s-]+how\s+documentation|manufacturing\s+process|standard\s+operating\s+procedure|proprietary\s+process|trade\s+secret|process\s+parameters|process\s+flow|confidential\s+methodology)\b` - Corroborative keywords: source process know-how manuals, source, process, know, how, manuals, intellectual, property, trade, secrets - Example matches: `source process know-how`, `process manual`, `know-how documentation` - Known false positives: Common words and phrases related to source process know-how manuals appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Source process know-how manuals Identifies documents containing references to source process know-how manuals in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-218-source-process-know-how-manuals` - URL: https://testpattern.dev/patterns/global-top500-218-source-process-know-how-manuals - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:source\s+process\s+know[\s-]+how\s+manuals|process\s+know[\s-]+how|manufacturing\s+process|intellectual\s+property|trade\s+secrets|proprietary\s+process|standard\s+operating\s+procedure|process\s+manual|confidential\s+know[\s-]+how|production\s+method)\b` - Corroborative keywords: source process know-how manuals, source, process, know, how, manuals, intellectual, property, trade, secrets - Example matches: `source process know-how manuals`, `process know-how`, `manufacturing process` - Known false positives: Common words and phrases related to source process know-how manuals appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### South Africa Physical Addresses Detects South Africa Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `za-physical-addresses` - URL: https://testpattern.dev/patterns/za-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: za - Regulations: POPIA - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 street name, unit 4`, `located at 45 road example`, `deliver to 78 avenue test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### South Korea Driver's License Number Detects South Korea driver's license number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `kr-drivers-license` - URL: https://testpattern.dev/patterns/kr-drivers-license - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: kr - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\b\d{2}-\d{2}-\d{6}-\d{2}\b` - Corroborative keywords: driver, licence, license, driving, DL, ID number, identification, ID card, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `12-34-567890-12`, `98-76-543210-98`, `01-02-034567-08` - Known false positives: Generic numeric sequences matching the driver's license format appearing in unrelated contexts. ### South Korea Passport Number Detects South Korea passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `kr-passport-number` - URL: https://testpattern.dev/patterns/kr-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: kr - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b[A-Z]\d{8}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `M12345678`, `R98765432`, `S23456789` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Sovereign debt issuance plans Identifies documents containing references to sovereign debt issuance plans in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-498-sovereign-debt-issuance-plans` - URL: https://testpattern.dev/patterns/au-top500-498-sovereign-debt-issuance-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:sovereign\s+debt|debt\s+issuance|Treasury\s+bonds|bond\s+tender|government\s+securities|debt\s+management|issuance\s+program|bond\s+auction|yield\s+curve|debt\s+strategy|Commonwealth\s+bonds)\b` - Corroborative keywords: sovereign debt issuance plans, sovereign, debt, issuance, plans, elections, diplomacy, statecraft, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant (+32 more) - Example matches: `sovereign debt`, `debt issuance`, `Treasury bonds` - Known false positives: Common words and phrases related to sovereign debt issuance plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Sovereign debt issuance plans Identifies documents containing references to sovereign debt issuance plans in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-498-sovereign-debt-issuance-plans` - URL: https://testpattern.dev/patterns/global-top500-498-sovereign-debt-issuance-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:sovereign\s+debt\s+issuance\s+plans|sovereign\s+debt|bond\s+issuance|government\s+securities|treasury\s+bonds|debt\s+management|yield\s+curve|auction\s+schedule|debt\s+ceiling|fiscal\s+deficit|gilt\s+issuance|primary\s+dealer)\b` - Corroborative keywords: sovereign debt issuance plans - Example matches: `sovereign debt issuance plans`, `sovereign debt`, `bond issuance` - Known false positives: Common words and phrases related to sovereign debt issuance plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### SOX control deficiency records Identifies documents containing references to sox control deficiency records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-173-sox-control-deficiency-records` - URL: https://testpattern.dev/patterns/au-top500-173-sox-control-deficiency-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:sox\s+control\s+deficiency\s+records|SOX\s+compliance|control\s+deficiency|material\s+weakness|significant\s+deficiency|internal\s+control|financial\s+reporting\s+control|remediation\s+plan|control\s+gap|management\s+assessment|section\s+404)\b` - Corroborative keywords: sox control deficiency records, sox, control, deficiency, records, corporate, legal, governance - Example matches: `sox control deficiency records`, `sox compliance`, `control deficiency` - Known false positives: Common words and phrases related to sox control deficiency records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### SOX control deficiency records Identifies documents containing references to sox control deficiency records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-173-sox-control-deficiency-records` - URL: https://testpattern.dev/patterns/global-top500-173-sox-control-deficiency-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:sox\s+control\s+deficiency\s+records|control\s+deficiency|material\s+weakness|significant\s+deficiency|internal\s+control\s+over\s+financial\s+reporting|sox\s+compliance|section\s+404|management\s+assessment|remediation\s+plan|control\s+environment|financial\s+reporting\s+controls)\b` - Corroborative keywords: sox control deficiency records, sox, control, deficiency, records, corporate, legal, governance - Example matches: `sox control deficiency records`, `control deficiency`, `material weakness` - Known false positives: Common words and phrases related to sox control deficiency records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### SOX/COSO Compliance Document Detects Sarbanes-Oxley (SOX) and COSO internal control framework compliance documents. - Slug: `au-sox-coso-compliance` - URL: https://testpattern.dev/patterns/au-sox-coso-compliance - Type: keyword_list - Confidence: medium - Jurisdictions: us - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial, audit, governance - Scope: narrow - Risk rating: 8 - Example matches: `SOX compliance assessment: COSO framework internal controls over financial reporting`, `Sarbanes-Oxley section 404 ICFR testing and control environment review`, `COSO internal control framework entity-level controls assessment` - Known false positives: SOX as sports team abbreviation. ### Sozialversicherungsnummer Detects Sozialversicherungsnummer patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `at-social-security-number` - URL: https://testpattern.dev/patterns/at-social-security-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, at - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{10}\b` - Corroborative keywords: sozialversicherungsnummer, social security, SSN, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `1234567890`, `9876543210`, `4567891234` - Known false positives: Ten-digit numeric sequences appear in phone numbers, account numbers, and other non-identity contexts.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Spain Driver's License Number Detects Spain driver's license number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `es-drivers-license` - URL: https://testpattern.dev/patterns/es-drivers-license - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: es, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\b\d{8}[A-Z]\b` - Corroborative keywords: driver, licence, license, driving, DL, permiso de conducir, ID number, identification, ID card, permit, registration, certificate, field, column, row, entry, record, value, form, register (+21 more) - Example matches: `12345678A`, `98765432Z`, `00123456X` - Known false positives: Spanish DNI (national identity document) numbers share the same format of 8 digits followed by a letter, making it impossible to distinguish between DNI and driver's license numbers by format alone. ### Spain Passport Number Detects Spain passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `es-passport-number` - URL: https://testpattern.dev/patterns/es-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: es, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b[A-Z]{3}\d{6}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `PAB123456`, `XYZ987654`, `ABC234567` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Spain Physical Addresses Detects Spain Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `es-physical-addresses` - URL: https://testpattern.dev/patterns/es-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: es, eu - Regulations: GDPR - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 calle name, unit 4`, `located at 45 avenida example`, `deliver to 78 paseo test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### Spain Tax Identification Number Detects Spain Tax Identification Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Due to the numeric format, corroborative evidence keywords are essential for reliable detection. - Slug: `es-tax-id` - URL: https://testpattern.dev/patterns/es-tax-id - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: es, eu - Regulations: GDPR - Data categories: pii, financial, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b\d{8}[A-Z]\b` - Corroborative keywords: NIF, número de identificación fiscal, DNI, CIF, Hacienda, tax identification, TIN, tax identification number, tax number, tax return, IRD, tax ID, inland revenue, taxpayer identification, αριθμός φορολογικού μητρώου, ΑΦΜ, φορολογικός, Abgabenkontonummer, adóazonosító, adószám (+20 more) - Example matches: `12345678A`, `98765432Z`, `11223344M` - Known false positives: Generic numeric sequences in non-tax contexts such as reference numbers or account identifiers; Numbers from other identification schemes with similar digit patterns ### Special education plans Identifies documents containing references to special education plans in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-345-special-education-plans` - URL: https://testpattern.dev/patterns/au-top500-345-special-education-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:special\s+education|individual\s+education\s+plan|learning\s+support|disability\s+accommodation|special\s+needs|learning\s+adjustment|educational\s+support|inclusion\s+plan|student\s+support\s+plan)\b` - Corroborative keywords: special education plans, special, education, plans, research, administration, student, transcript, grade, GPA, enrollment, FERPA, FAFSA, financial aid, tuition, degree, field, column, row, entry (+25 more) - Example matches: `special education`, `individual education plan`, `learning support` - Known false positives: Common words and phrases related to special education plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Special education plans Identifies documents containing references to special education plans in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-345-special-education-plans` - URL: https://testpattern.dev/patterns/global-top500-345-special-education-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:special\s+education|education\s+plan|individualized\s+education|learning\s+support|disability\s+accommodation|learning\s+disability|special\s+needs|adjustment\s+plan|inclusion\s+support)\b` - Corroborative keywords: special education plans, special, education, plans, research, administration, student, transcript, grade, GPA, enrollment, FERPA, FAFSA, financial aid, tuition, degree, field, column, row, entry (+25 more) - Example matches: `special education`, `education plan`, `individualized education` - Known false positives: Common words and phrases related to special education plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### SQL Server Detects SQL Server patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `global-sql-server-connection-string` - URL: https://testpattern.dev/patterns/global-sql-server-connection-string - Type: regex - Engine: universal - Confidence: high - Detection quality: Partial - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Risk rating: 10 - Pattern: `Server=[^;]+;Database=[^;]+;(?:User Id|Uid)=[^;]+;(?:Password|Pwd)=[^;]+` - Corroborative keywords: api key, api_key, apikey, access key, secret key, private key, auth token, authorization, access token, bearer, conn str, connection string, connectionstring, cookie, credential, database, host, JWT, oauth, passphrase (+37 more) - Example matches: `Server=myserver;Database=mydb;User Id=admin;Password=pass123`, `Server=localhost;Database=test;Uid=sa;Pwd=secret`, `Server=db.example.com;Database=prod;User Id=app;Password=s3cure!` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Standard contractual clause addenda Identifies documents containing references to standard contractual clause addenda in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-467-standard-contractual-clause-addenda` - URL: https://testpattern.dev/patterns/au-top500-467-standard-contractual-clause-addenda - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:standard\s+contractual\s+clause\s+addenda|contractual\s+clause|data\s+processing\s+agreement|data\s+exporter|data\s+importer)\b` - Corroborative keywords: standard contractual clause addenda, standard, contractual, clause, addenda, privacy, compliance, risk - Example matches: `standard contractual clause addenda`, `contractual clause`, `data processing agreement` - Known false positives: Common words and phrases related to standard contractual clause addenda appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Standard contractual clause addenda Identifies documents containing references to standard contractual clause addenda in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-467-standard-contractual-clause-addenda` - URL: https://testpattern.dev/patterns/global-top500-467-standard-contractual-clause-addenda - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:standard\s+contractual\s+clauses|SCC\s+addendum|contractual\s+clause|data\s+processing\s+agreement|transfer\s+safeguard|data\s+exporter|data\s+importer|supplementary\s+measures|privacy\s+compliance|cross[\s-]+border\s+transfer|binding\s+obligations)\b` - Corroborative keywords: standard contractual clause addenda, standard, contractual, clause, addenda, privacy, compliance, risk - Example matches: `standard contractual clauses`, `scc addendum`, `contractual clause` - Known false positives: Common words and phrases related to standard contractual clause addenda appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### State Borrowing and Debt Issuance Strategy Detects QTC (Queensland Treasury Corporation) borrowing strategies, debt issuance timelines, yield curve management plans, and refinancing schedules. Premature disclosure enables bond market front-running. - Slug: `state-borrowing-and-debt-issuance-strategy` - URL: https://testpattern.dev/patterns/state-borrowing-and-debt-issuance-strategy - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Corporations Act 2001 (Cth), Criminal Code 1899 (Qld) - Data categories: financial, government - Scope: wide - Risk rating: 10 - Pattern: `\b\d{1,3}\s*(?:basis\s*points|bps)\b` - Corroborative keywords: QTC, Queensland Treasury Corporation, Treasury Corporation, borrowing, debt issuance, bond program, strategy, schedule, timeline, issuance plan, refinancing, yield, basis points, tenor, maturity, market sensitive, PROTECTED, confidential, financial, fiscal (+28 more) - Example matches: `PROTECTED — MARKET SENSITIVE. Queensland Treasury Corporation — Borrowing Strategy FY26-27. Planned issuance: $12.5B across 5Y, 10Y, and 15Y tenors. Target yield spread: 45-55 basis points over CGS. Issuance timeline: Q1 $4B, Q2 $3.5B, Q3 $3B, Q4 $2B. Refinancing schedule for maturing bonds attached.`, `Confidential — Not for distribution. QTC Debt Issuance Strategy. Bond program update: planned new issuance of $8B in FY26-27 to fund capital program. Maturity profile management: extend weighted average maturity from 4.2Y to 5.1Y. Yield curve positioning strategy attached.` - Known false positives: Published QTC annual reports and investor presentations; Post-issuance market announcements and pricing results ### State Legal Liability Assessment Detects internal legal assessments quantifying the State's liability exposure on specific matters (tort, contract, statutory). Disclosure reveals the State's own estimate of its likely loss, undermining defence and settlement positions across multiple related matters. Note: trainable classifier recommended for production using liability document structural features. - Slug: `state-legal-liability-assessment` - URL: https://testpattern.dev/patterns/state-legal-liability-assessment - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: Evidence Act 1977 (Qld), RTI Act 2009 (Qld) - Data categories: legal, government - Scope: wide - Risk rating: 8 - Pattern: `(?i)\b(?:liability\s+(?:assessment|exposure)|legal\s+liability|risk\s+of\s+liability|quantum\s+assessment|damages\s+assessment)\b` - Corroborative keywords: State, Crown, Queensland, government, privilege, PROTECTED, quantum, damages, probability, provision, best case, worst case, expected loss, financial exposure, legal, counsel, litigation, proceedings, court, jurisdiction (+28 more) - Example matches: `PROTECTED — LEGAL PROFESSIONAL PRIVILEGE State Legal Liability Assessment Matter: Claims arising from Caboolture Hospital — 2020-2024 Prepared for: Under Treasurer (Financial Provisioning) Liability exposure: - Best case: $12M (successful defence on causation) - Expected: $48M (partial liability, capped damages) - Worst case: $180M (full liability, uncapped)`, `This privileged legal liability assessment quantifies the State of Queensland's exposure for the class of claims arising from contaminated land at Pinkenba. The quantum assessment recommends a provision of $65M based on probability-weighted analysis.`, `CONFIDENTIAL — PRIVILEGED Damages Assessment Crown Law Queensland Matter: Institutional abuse claims — State liability Risk of liability: High (70% probability of adverse finding) Quantum assessment: $2,500-$350,000 per claimant (2,400 estimated claimants) Total exposure: $85M-$840M` - Known false positives: Published court judgments assessing damages against the State; Academic analysis of government liability; Published government financial provisions under AASB 137 ### Static analysis findings Identifies static analysis findings patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-249-static-analysis-findings` - URL: https://testpattern.dev/patterns/au-top500-249-static-analysis-findings - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:static\s+analysis|SAST\s+findings|code\s+analysis|security\s+findings|code\s+vulnerability|static\s+scan|code\s+quality|security\s+defect|code\s+review\s+findings|analysis\s+report)\b` - Corroborative keywords: static analysis findings, static, analysis, findings, software, engineering, architecture - Example matches: `static analysis`, `sast findings`, `code analysis` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Static analysis findings Identifies static analysis findings patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-249-static-analysis-findings` - URL: https://testpattern.dev/patterns/global-top500-249-static-analysis-findings - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:static\s+analysis|SAST\s+findings|code\s+scan|security\s+finding|code\s+vulnerability|static\s+scan|source\s+code\s+analysis|code\s+quality|security\s+defect|code\s+review\s+finding)\b` - Corroborative keywords: static analysis findings, static, analysis, findings, software, engineering, architecture - Example matches: `static analysis`, `sast findings`, `code scan` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Steuer Id Detects Steuer Id patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `de-tax-id` - URL: https://testpattern.dev/patterns/de-tax-id - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, de - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: wide - Risk rating: 7 - Pattern: `\b\d{11}\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+16 more) - Example matches: `12345678901`, `65929970489`, `00000000001` - Known false positives: Long numeric sequences in unrelated contexts (tracking numbers, serial codes) matching the Steuer Id format ### Strategic communications plans Identifies documents containing references to strategic communications plans in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-494-strategic-communications-plans` - URL: https://testpattern.dev/patterns/au-top500-494-strategic-communications-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:strategic\s+communications|communications\s+plan|media\s+strategy|government\s+communications|public\s+affairs|messaging\s+framework|stakeholder\s+engagement|media\s+briefing|communications\s+strategy|public\s+information|key\s+messages|talking\s+points)\b` - Corroborative keywords: strategic communications plans, strategic, communications, plans, elections, diplomacy, statecraft, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+31 more) - Example matches: `strategic communications`, `communications plan`, `media strategy` - Known false positives: Common words and phrases related to strategic communications plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Strategic communications plans Identifies documents containing references to strategic communications plans in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-494-strategic-communications-plans` - URL: https://testpattern.dev/patterns/global-top500-494-strategic-communications-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:strategic\s+communications\s+plans|strategic\s+communications|communications\s+strategy|media\s+strategy|public\s+affairs|messaging\s+framework|stakeholder\s+engagement|narrative\s+control|key\s+messages|communications\s+plan|public\s+relations|media\s+handling)\b` - Corroborative keywords: strategic communications plans - Example matches: `strategic communications plans`, `strategic communications`, `communications strategy` - Known false positives: Common words and phrases related to strategic communications plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Strategic Plan/Roadmap Detects strategic plans, product roadmaps, and long-term business planning documents. - Slug: `au-strategic-plan-roadmap` - URL: https://testpattern.dev/patterns/au-strategic-plan-roadmap - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), Privacy Act 1988 (Cth) - Data categories: intellectual-property, business - Scope: narrow - Risk rating: 8 - Example matches: `Strategic plan 2026-2029: go-to-market strategy and roadmap`, `Product roadmap with strategic initiative priorities for implementation plan`, `Business case and project charter for five-year plan` - Known false positives: Generic use of strategic or plan in non-business contexts. ### Strategic roadmap documents Identifies documents containing references to strategic roadmap documents in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-189-strategic-roadmap-documents` - URL: https://testpattern.dev/patterns/au-top500-189-strategic-roadmap-documents - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:strategic\s+roadmap|strategy\s+roadmap|strategic\s+plan|multi[\s-]+year\s+plan|long[\s-]+range\s+plan|corporate\s+strategy|growth\s+strategy|strategic\s+priorities|board\s+strategy|strategic\s+initiative|business\s+transformation|competitive\s+positioning)\b` - Corroborative keywords: strategic roadmap documents, strategic, roadmap, documents, mergers, acquisitions, strategy - Example matches: `strategic roadmap`, `strategy roadmap`, `strategic plan` - Known false positives: Common words and phrases related to strategic roadmap documents appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Strategic roadmap documents Identifies documents containing references to strategic roadmap documents in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-189-strategic-roadmap-documents` - URL: https://testpattern.dev/patterns/global-top500-189-strategic-roadmap-documents - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:strategic\s+roadmap|strategic\s+plan|corporate\s+strategy|long[\s-]+range\s+plan|five[\s-]+year\s+plan|growth\s+strategy|strategic\s+initiative|board\s+strategy|strategic\s+priority|competitive\s+positioning|market\s+expansion)\b` - Corroborative keywords: strategic roadmap documents, strategic, roadmap, documents, mergers, acquisitions, strategy - Example matches: `strategic roadmap`, `strategic plan`, `corporate strategy` - Known false positives: Common words and phrases related to strategic roadmap documents appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Stripe Key Detects Stripe Key patterns. - Slug: `global-stripe-key` - URL: https://testpattern.dev/patterns/global-stripe-key - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Pattern: `\b(sk|pk)_(?:live|test)_[0-9a-zA-Z]{24,}\b` - Corroborative keywords: api key, api_key, apikey, access key, secret key, private key, auth token, authorization, access token, bearer, conn str, connection string, connectionstring, cookie, credential, database, host, JWT, oauth, passphrase (+37 more) - Example matches: `sk_live_ABCDEFGHIJKLMNOPQRSTUVWXyz`, `pk_test_ABCDEFGHIJKLMNOPQRSTUVWXyz`, `sk_test_1234567890abcdefghijklmn` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Student counseling records Identifies documents containing references to student counseling records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-346-student-counseling-records` - URL: https://testpattern.dev/patterns/au-top500-346-student-counseling-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:student\s+counseling|counseling\s+record|student\s+welfare|pastoral\s+care|student\s+wellbeing|counselor\s+notes|psychological\s+support|mental\s+health\s+support|student\s+support|welfare\s+officer)\b` - Corroborative keywords: student counseling records, student, counseling, records, education, research, administration, transcript, grade, GPA, enrollment, FERPA, FAFSA, financial aid, tuition, degree, field, column, row, entry (+25 more) - Example matches: `student counseling`, `counseling record`, `student welfare` - Known false positives: Common words and phrases related to student counseling records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Student counseling records Identifies documents containing references to student counseling records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-346-student-counseling-records` - URL: https://testpattern.dev/patterns/global-top500-346-student-counseling-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:student\s+counseling|counseling\s+record|student\s+wellbeing|pastoral\s+care|mental\s+health|counselor\s+notes|psychological\s+support|student\s+welfare|guidance\s+counselor|referral\s+record)\b` - Corroborative keywords: student counseling records, student, counseling, records, education, research, administration, transcript, grade, GPA, enrollment, FERPA, FAFSA, financial aid, tuition, degree, field, column, row, entry (+25 more) - Example matches: `student counseling`, `counseling record`, `student wellbeing` - Known false positives: Common words and phrases related to student counseling records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Student disciplinary records Identifies documents containing references to student disciplinary records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-344-student-disciplinary-records` - URL: https://testpattern.dev/patterns/au-top500-344-student-disciplinary-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:student\s+disciplinary|disciplinary\s+record|academic\s+misconduct|plagiarism\s+case|suspension\s+record|student\s+conduct|disciplinary\s+hearing|code\s+of\s+conduct|misconduct\s+report)\b` - Corroborative keywords: student disciplinary records, student, disciplinary, records, education, research, administration, employee, payroll, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check (+95 more) - Example matches: `student disciplinary`, `disciplinary record`, `academic misconduct` - Known false positives: Common words and phrases related to student disciplinary records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Student disciplinary records Identifies documents containing references to student disciplinary records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-344-student-disciplinary-records` - URL: https://testpattern.dev/patterns/global-top500-344-student-disciplinary-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:student\s+disciplinary|disciplinary\s+record|academic\s+integrity|plagiarism\s+case|code\s+of\s+conduct|disciplinary\s+hearing|student\s+conduct)\b` - Corroborative keywords: student disciplinary records, student, disciplinary, records, education, research, administration, employee, payroll, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check (+95 more) - Example matches: `student disciplinary`, `disciplinary record`, `academic integrity` - Known false positives: Common words and phrases related to student disciplinary records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Student enrollment records Identifies documents containing references to student enrollment records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-341-student-enrollment-records` - URL: https://testpattern.dev/patterns/au-top500-341-student-enrollment-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:student\s+enrollment|enrolment\s+record|student\s+registration|course\s+enrollment|student\s+number|student\s+ID|admission\s+record|enrollment\s+date|student\s+intake)\b` - Corroborative keywords: student enrollment records, student, enrollment, records, education, research, administration, training data, training set, training dataset, model weights, fine-tuning data, fine-tuning, prompt data, prompt engineering, embeddings, vector database, AI training, machine learning data, LLM training (+38 more) - Example matches: `student enrollment`, `enrolment record`, `student registration` - Known false positives: Common words and phrases related to student enrollment records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Student enrollment records Identifies documents containing references to student enrollment records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-341-student-enrollment-records` - URL: https://testpattern.dev/patterns/global-top500-341-student-enrollment-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:student\s+enrollment|enrollment\s+record|student\s+registration|admission\s+record|student\s+ID|academic\s+year|enrollment\s+status|course\s+registration|student\s+intake)\b` - Corroborative keywords: student enrollment records, student, enrollment, records, education, research, administration, training data, training set, training dataset, model weights, fine-tuning data, fine-tuning, prompt data, prompt engineering, embeddings, vector database, AI training, machine learning data, LLM training (+38 more) - Example matches: `student enrollment`, `enrollment record`, `student registration` - Known false positives: Common words and phrases related to student enrollment records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Subscription Agreement Detects subscription agreements, recurring billing terms, and SaaS licence documentation. - Slug: `au-subscription-agreement` - URL: https://testpattern.dev/patterns/au-subscription-agreement - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial, legal - Scope: narrow - Risk rating: 6 - Example matches: `Subscription agreement: auto-renew annually at subscription fee of $1,200`, `SaaS licence agreement with cloud service terms of service`, `Cancel subscription notice with recurring billing reference` - Known false positives: Newsletter or media subscription references. ### Substance use treatment records Identifies substance use treatment records references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `au-top500-330-substance-use-treatment-records` - URL: https://testpattern.dev/patterns/au-top500-330-substance-use-treatment-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:substance\s+use|substance\s+abuse|drug\s+treatment|alcohol\s+treatment|treatment\s+records|substance\s+dependence|recovery\s+program|opioid\s+treatment)\b` - Corroborative keywords: substance use treatment records, substance, use, treatment, records, health, biomedical, information, patient, clinical, medical, hospital, practitioner, diagnosis, prescription, physician, nurse, therapy, examination, consultation (+1 more) - Example matches: `substance use`, `substance abuse`, `drug treatment` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### Substance use treatment records Identifies substance use treatment records references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `global-top500-330-substance-use-treatment-records` - URL: https://testpattern.dev/patterns/global-top500-330-substance-use-treatment-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:substance\s+use|substance\s+abuse|addiction\s+treatment|opioid\s+treatment|drug\s+dependence|recovery\s+program|relapse\s+prevention)\b` - Corroborative keywords: substance use treatment records, substance, use, treatment, records, health, biomedical, information, patient, clinical, medical, hospital, practitioner, diagnosis, prescription, physician, nurse, therapy, examination, consultation (+30 more) - Example matches: `substance use`, `substance abuse`, `addiction treatment` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### Substation protection relay settings Identifies documents containing references to substation protection relay settings in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-444-substation-protection-relay-settings` - URL: https://testpattern.dev/patterns/au-top500-444-substation-protection-relay-settings - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:protection\s+relay|relay\s+setting|distance\s+relay|pickup\s+setting|trip\s+setting|critical\s+infrastructure|power\s+grid|electrical\s+protection|fault\s+current|impedance\s+relay)\b` - Corroborative keywords: substation protection relay settings, substation, protection, relay, settings, critical, infrastructure, systems - Example matches: `protection relay`, `relay setting`, `distance relay` - Known false positives: Common words and phrases related to substation protection relay settings appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Substation protection relay settings Identifies documents containing references to substation protection relay settings in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-444-substation-protection-relay-settings` - URL: https://testpattern.dev/patterns/global-top500-444-substation-protection-relay-settings - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:protection\s+relay|distance\s+relay|pickup\s+setting|trip\s+setting|fault\s+current|relay\s+coordination|impedance\s+zone|circuit\s+breaker|differential\s+protection|IED\s+settings)\b` - Corroborative keywords: substation protection relay settings, substation, protection, relay, settings, critical, infrastructure, systems - Example matches: `protection relay`, `distance relay`, `pickup setting` - Known false positives: Common words and phrases related to substation protection relay settings appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Succession planning files Identifies documents containing references to succession planning files in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-075-succession-planning-files` - URL: https://testpattern.dev/patterns/au-top500-075-succession-planning-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:succession\s+plan|succession\s+planning|talent\s+pipeline|successor\s+candidate|key\s+person\s+risk|leadership\s+pipeline|readiness\s+assessment|high\s+potential|successor\s+identified|bench\s+strength|talent\s+review|development\s+pipeline)\b` - Corroborative keywords: succession planning files, succession, planning, files, employment, workforce, records - Example matches: `succession plan`, `succession planning`, `talent pipeline` - Known false positives: Common words and phrases related to succession planning files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Succession planning files Identifies documents containing references to succession planning files in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-075-succession-planning-files` - URL: https://testpattern.dev/patterns/global-top500-075-succession-planning-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:succession\s+planning|succession\s+candidate|talent\s+pipeline|leadership\s+pipeline|key\s+person\s+risk|successor\s+identified|high\s+potential|talent\s+review|bench\s+strength|readiness\s+assessment|critical\s+role)\b` - Corroborative keywords: succession planning files, succession, planning, files, employment, workforce, records - Example matches: `succession planning`, `succession candidate`, `talent pipeline` - Known false positives: Common words and phrases related to succession planning files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Superannuation Fund Member Statement - Bulk Detects bulk superannuation member data including individual balances, employer contributions, TFN-linked records, and beneficiary nominations from government super schemes such as QSuper. - Slug: `superannuation-fund-member-statement-bulk` - URL: https://testpattern.dev/patterns/superannuation-fund-member-statement-bulk - Type: regex - Engine: universal - Confidence: high - Detection quality: Error - Jurisdictions: au - Regulations: Privacy Act 1988 (Cth), SIS Act 1993 (Cth), Tax Admin Act 1953 (Cth) - Data categories: financial, government - Scope: wide - Risk rating: 9 - Pattern: `\b\d{8,9}\b` - Corroborative keywords: superannuation, QSuper, super fund, member statement, defined benefit, balance, contribution, accumulation, pension, beneficiary, member number, member extract, bulk, data file, PROTECTED, financial, fiscal, monetary, accounting, treasury (+25 more) - Example matches: `PROTECTED — QSuper Member Data Extract. Bulk member statement file for actuarial review. Member: 10045678, TFN: 123456789, Defined Benefit balance: $345,210.45, Accumulation: $89,340.12, Beneficiary: Jane Smith. Member: 10045679, TFN: 234567890, Balance: $567,890.23.`, `Superannuation fund member extract — State Public Sector Superannuation Scheme. Contains 14,200 member records with TFN, contribution history, and accumulated balances. File generated for scheme actuary. PROTECTED — not for distribution.` - Known false positives: Individual superannuation member statements sent to single members; Published super fund annual reports with aggregate statistics ### Superannuation identifiers Detects references to superannuation identifiers in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-096-superannuation-identifiers` - URL: https://testpattern.dev/patterns/au-top500-096-superannuation-identifiers - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:superannuation\s+identifiers)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: superannuation identifiers, superannuation, identifiers, payroll, tax, operations, bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC, employee, benefits, termination, hire date, salary (+93 more) - Example matches: `Superannuation identifiers`, `superannuation identifiers`, `Superannuation identifiers` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Superannuation identifiers Detects references to superannuation identifiers in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-096-superannuation-identifiers` - URL: https://testpattern.dev/patterns/global-top500-096-superannuation-identifiers - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:superannuation\s+identifiers)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: superannuation identifiers, superannuation, identifiers, payroll, tax, operations, bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC, employee, benefits, termination, hire date, salary (+93 more) - Example matches: `Superannuation identifiers`, `superannuation identifiers`, `Superannuation identifiers` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Supplier bank change requests Identifies documents containing references to supplier bank change requests in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-142-supplier-bank-change-requests` - URL: https://testpattern.dev/patterns/au-top500-142-supplier-bank-change-requests - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:supplier\s+bank\s+change|bank\s+detail\s+change|payment\s+redirect|account\s+update\s+request|BSB\s+change|bank\s+account\s+update|vendor\s+bank\s+modification|remittance\s+update|supplier\s+verification|fraud\s+prevention)\b` - Corroborative keywords: supplier bank change requests, supplier, bank, change, requests, procurement, management, field, column, row, entry, record, value, form, register, database, extract, export, spreadsheet, table (+4 more) - Example matches: `supplier bank change`, `bank detail change`, `payment redirect` - Known false positives: Common words and phrases related to supplier bank change requests appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Supplier bank change requests Identifies documents containing references to supplier bank change requests in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-142-supplier-bank-change-requests` - URL: https://testpattern.dev/patterns/global-top500-142-supplier-bank-change-requests - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:bank\s+change\s+request|bank\s+detail\s+update|supplier\s+bank\s+change|remittance\s+change|payment\s+detail\s+change|bank\s+account\s+update|new\s+banking\s+details|wire\s+transfer\s+update|vendor\s+bank\s+modification|payment\s+redirection|beneficiary\s+change|account\s+verification)\b` - Corroborative keywords: supplier bank change requests, supplier, bank, change, requests, procurement, management - Example matches: `bank change request`, `bank detail update`, `supplier bank change` - Known false positives: Common words and phrases related to supplier bank change requests appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Supplier due diligence reports Identifies documents containing references to supplier due diligence reports in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-149-supplier-due-diligence-reports` - URL: https://testpattern.dev/patterns/au-top500-149-supplier-due-diligence-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:supplier\s+due\s+diligence|due\s+diligence\s+report|vendor\s+assessment|supplier\s+evaluation|background\s+check|financial\s+viability|compliance\s+verification|modern\s+slavery|supply\s+chain\s+risk|procurement\s+review)\b` - Corroborative keywords: supplier due diligence reports, supplier, due, diligence, reports, procurement, management, merger, acquisition, takeover, due diligence, scheme of arrangement, material non-public information, MNPI, inside information, price sensitive, price sensitive information, field, column, row (+26 more) - Example matches: `supplier due diligence`, `due diligence report`, `vendor assessment` - Known false positives: Common words and phrases related to supplier due diligence reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Supplier due diligence reports Identifies documents containing references to supplier due diligence reports in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-149-supplier-due-diligence-reports` - URL: https://testpattern.dev/patterns/global-top500-149-supplier-due-diligence-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:due\s+diligence\s+report|supplier\s+due\s+diligence|vendor\s+screening|background\s+check|supplier\s+qualification|compliance\s+verification|financial\s+stability|reputational\s+risk|sanctions\s+check|beneficial\s+ownership|modern\s+slavery\s+assessment)\b` - Corroborative keywords: supplier due diligence reports, supplier, due, diligence, reports, procurement, management, merger, acquisition, takeover, due diligence, scheme of arrangement, material non-public information, MNPI, inside information, price sensitive, price sensitive information, field, column, row (+26 more) - Example matches: `due diligence report`, `supplier due diligence`, `vendor screening` - Known false positives: Common words and phrases related to supplier due diligence reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Supplier invoice records Identifies documents containing references to supplier invoice records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-146-supplier-invoice-records` - URL: https://testpattern.dev/patterns/au-top500-146-supplier-invoice-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:supplier\s+invoice|invoice\s+record|tax\s+invoice|invoice\s+number|accounts\s+payable|payment\s+processing|invoice\s+date|remittance\s+advice)\b` - Corroborative keywords: supplier invoice records, supplier, invoice, records, procurement, management - Example matches: `supplier invoice`, `invoice record`, `tax invoice` - Known false positives: Common words and phrases related to supplier invoice records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Supplier invoice records Identifies documents containing references to supplier invoice records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-146-supplier-invoice-records` - URL: https://testpattern.dev/patterns/global-top500-146-supplier-invoice-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:supplier\s+invoice|invoice\s+number|invoice\s+date|payment\s+due|accounts\s+payable|invoice\s+amount|tax\s+invoice|invoice\s+approval|three[\s-]+way\s+match|invoice\s+reconciliation|credit\s+note|remittance\s+advice)\b` - Corroborative keywords: supplier invoice records, supplier, invoice, records, procurement, management - Example matches: `supplier invoice`, `invoice number`, `invoice date` - Known false positives: Common words and phrases related to supplier invoice records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Supplier performance scorecards Identifies documents containing references to supplier performance scorecards in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-160-supplier-performance-scorecards` - URL: https://testpattern.dev/patterns/au-top500-160-supplier-performance-scorecards - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:supplier\s+performance\s+scorecards|supplier\s+performance|vendor\s+rating|key\s+performance\s+indicator|service\s+level\s+agreement|delivery\s+performance|quality\s+metrics|contract\s+compliance|supplier\s+management)\b` - Corroborative keywords: supplier performance scorecards, supplier, performance, scorecards, procurement, management - Example matches: `supplier performance scorecards`, `supplier performance`, `vendor rating` - Known false positives: Common words and phrases related to supplier performance scorecards appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Supplier performance scorecards Identifies documents containing references to supplier performance scorecards in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-160-supplier-performance-scorecards` - URL: https://testpattern.dev/patterns/global-top500-160-supplier-performance-scorecards - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:supplier\s+performance\s+scorecards|supplier\s+performance|vendor\s+scorecard|performance\s+rating|supplier\s+evaluation|key\s+performance\s+indicator|service\s+level\s+agreement|delivery\s+performance|quality\s+metrics|contract\s+compliance|vendor\s+management|procurement\s+review)\b` - Corroborative keywords: supplier performance scorecards, supplier, performance, scorecards, procurement, management - Example matches: `supplier performance scorecards`, `supplier performance`, `vendor scorecard` - Known false positives: Common words and phrases related to supplier performance scorecards appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Supplier quality audit findings Identifies documents containing references to supplier quality audit findings in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-229-supplier-quality-audit-findings` - URL: https://testpattern.dev/patterns/au-top500-229-supplier-quality-audit-findings - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:supplier\s+quality\s+audit\s+findings|supplier\s+audit|vendor\s+assessment|supplier\s+evaluation|audit\s+findings|quality\s+inspection|supplier\s+scorecard|procurement\s+audit|supply\s+chain\s+quality|vendor\s+qualification)\b` - Corroborative keywords: supplier quality audit findings, supplier, quality, audit, findings, product, safety - Example matches: `supplier quality audit findings`, `supplier audit`, `vendor assessment` - Known false positives: Common words and phrases related to supplier quality audit findings appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Supplier quality audit findings Identifies documents containing references to supplier quality audit findings in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-229-supplier-quality-audit-findings` - URL: https://testpattern.dev/patterns/global-top500-229-supplier-quality-audit-findings - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:supplier\s+quality\s+audit\s+findings|supplier\s+audit|quality\s+audit|audit\s+findings|product\s+quality|safety\s+compliance|vendor\s+assessment|supplier\s+scorecard|corrective\s+action\s+request|supplier\s+nonconformance)\b` - Corroborative keywords: supplier quality audit findings, supplier, quality, audit, findings, product, safety - Example matches: `supplier quality audit findings`, `supplier audit`, `quality audit` - Known false positives: Common words and phrases related to supplier quality audit findings appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Support ticket transcripts Identifies support ticket transcripts patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-316-support-ticket-transcripts` - URL: https://testpattern.dev/patterns/au-top500-316-support-ticket-transcripts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:support\s+ticket|ticket\s+transcript|help\s+desk|service\s+desk|case\s+number|ticket\s+ID|customer\s+complaint|resolution\s+notes|incident\s+ticket|support\s+request|ticket\s+history)\b` - Corroborative keywords: support ticket transcripts, support, ticket, transcripts, operations, resilience, student, transcript, grade, GPA, enrollment, FERPA, FAFSA, financial aid, tuition, degree - Example matches: `support ticket`, `ticket transcript`, `help desk` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Support ticket transcripts Identifies support ticket transcripts patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-316-support-ticket-transcripts` - URL: https://testpattern.dev/patterns/global-top500-316-support-ticket-transcripts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:support\s+ticket|ticket\s+transcript|case\s+number|service\s+desk|customer\s+interaction|resolution\s+notes|ticket\s+history|agent\s+response|customer\s+complaint|trouble\s+ticket)\b` - Corroborative keywords: support ticket transcripts, support, ticket, transcripts, operations, resilience, student, transcript, grade, GPA, enrollment, FERPA, FAFSA, financial aid, tuition, degree, field, column, row, entry (+25 more) - Example matches: `support ticket`, `ticket transcript`, `case number` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Surgical Procedures Detects Surgical Procedures patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that identifies health and medical terminology in documents. Keyword matching is used to flag content containing medical language. - Slug: `global-surgical-procedures` - URL: https://testpattern.dev/patterns/global-surgical-procedures - Type: keyword_list - Confidence: low - Jurisdictions: global - Regulations: GDPR, HIPAA - Data categories: phi, health - Scope: wide - Risk rating: 8 - Example matches: `patient diagnosed with appendectomy`, `treatment plan includes cholecystectomy`, `clinical notes reference mastectomy` - Known false positives: Educational or research materials discussing medical topics without containing actual patient data; News articles or general health information websites mentioning medical conditions ### Surrogacy Arrangement Record Detects surrogacy arrangement records including parentage orders, surrogacy agreements, birth mother medical records, and intended parent assessments under the Surrogacy Act 2010 (Qld). These records contain deeply personal information about reproductive choices, medical procedures, and legal parentage transfers — disclosure can cause severe emotional distress and breach court-sealed parentage orders. - Slug: `surrogacy-arrangement-record` - URL: https://testpattern.dev/patterns/surrogacy-arrangement-record - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: IPA 2009 (Qld), Status of Children Act 1978 (Qld), Surrogacy Act 2010 (Qld) - Data categories: health, government - Scope: wide - Risk rating: 8 - Pattern: `(?i)\b(surrogacy\s+(?:arrangement|agreement)|parentage\s+order|gestational\s+(?:carrier|surrogacy)|birth\s+mother\s+(?:consent|medical|identity)|intended\s+parent[s]?\s+(?:assessment|application)|surrogacy\s+(?:counselling|guidance)\s+(?:report|certificate))\b` - Corroborative keywords: PROTECTED, Privacy, surrogacy arrangement, parentage order, birth mother, intended parents, gestational carrier, surrogacy agreement, Surrogacy Act 2010, counselling certificate, medical practitioner, independent legal advice, birth certificate, District Court, IVF, embryo transfer, surrogacy counsellor, consent, patient, clinical (+56 more) - Example matches: `PROTECTED Privacy. Surrogacy Arrangement Record — Surrogacy Act 2010 (Qld) Part 3. Birth mother: Michelle Anne TAYLOR, DOB 14/06/1990. Intended parents: Daniel and Sophie HARTLEY. Surrogacy agreement executed 12/09/2025 with independent legal advice confirmed for all parties. Surrogacy counselling report (s.22) completed by registered psychologist Dr Emma Liu. Gestational surrogacy — embryo transfer conducted at Queensland Fertility Group on 03/11/2025. Medical practitioner confirmation: Dr James Park. Parentage order to be applied for within 28 days of birth.`, `District Court of Queensland — Parentage Order Application. File No: SUR-2026-00189. Application under s.39 Surrogacy Act 2010 for transfer of parentage. Birth mother: Kelly Susan MORRISON. Child: male infant, DOB 22/02/2026, born at Mater Mothers Hospital Brisbane. Intended parents: Andrew and Yuki WATANABE. Surrogacy counselling certificates attached for all parties. Birth mother consent to parentage order confirmed. Medical records confirm gestational surrogacy with no genetic relationship between birth mother and child.`, `Confidential — Surrogacy Guidance Report. Prepared for: intended parents Marcus and Lauren BROWN. Surrogacy counsellor: Dr Patricia Feng, MAPS. This report is prepared under s.22 of the Surrogacy Act 2010 (Qld). Assessment confirms that both intended parents understand the legal, medical, and emotional implications of the surrogacy arrangement. The proposed birth mother, Angela SMITH, has undergone independent counselling. Independent legal advice certificates obtained from separate law firms. IVF treatment plan to commence following all statutory requirements being met.` - Known false positives: Published law reform reports and policy discussions about surrogacy legislation; Government fact sheets and public information about surrogacy legal frameworks; Fertility clinic marketing and general surrogacy program information ### Surveillance Operation Plan Detects documents containing physical and electronic surveillance operation plans including observation post positions, equipment deployments, team compositions, and target movement tracking plans. Disclosure enables counter-surveillance by criminal targets and compromises reusable surveillance positions and techniques. - Slug: `surveillance-operation-plan` - URL: https://testpattern.dev/patterns/surveillance-operation-plan - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: global - Regulations: QGISCF - Data categories: law-enforcement - Scope: wide - Risk rating: 8 - Pattern: `(?i)\b(surveillance\s+operation\s+(?:plan|order|briefing)|observation\s+post\s+(?:plan|location|deployment)|OP\s+plan|technical\s+surveillance\s+(?:device|deployment)|listening\s+device\s+(?:warrant|deployment)|tracking\s+device\s+(?:warrant|deployment)|surveillance\s+deployment\s+(?:plan|order)|trigger\s+plan)\b` - Corroborative keywords: PROTECTED, Law-Enforcement, COVERT, RESTRICTED, QPS Surveillance Group, observation post, OP, target movement, trigger point, eyeball, follow, static surveillance, mobile surveillance, technical attachment, callsign, radio channel, investigation, enforcement, prosecution, arrest (+37 more) - Example matches: `PROTECTED — COVERT. Surveillance Operation Plan — Operation MERCURY. QPS Surveillance Group. Observation post locations: OP1 at corner of Smith St and Main Rd (elevated position, 3rd floor car park). OP2 at unit 4, 127 Queen Street. Target: white Toyota Hilux Rego ABC-123. Trigger plan: team Alpha to follow on target departure from premises.`, `RESTRICTED. Technical surveillance deployment order. Tracking device warrant TSD-2025-0034 authorises attachment of GPS tracking device to target vehicle. Listening device warrant LD-2025-0021 authorises deployment within target premises at 45 Park Avenue, Southport. Surveillance deployment to commence 0600 hours Monday.`, `Surveillance operation briefing. Callsigns assigned: Alpha-1 through Alpha-5 for mobile surveillance team. Radio channel 4 encrypted. Static observation post established at location ECHO. Target movement pattern analysis indicates subject departs residence between 0730-0800 weekdays. Trigger plan attached.` - Known false positives: Government policy reviews and legislative discussions about surveillance powers; Corporate security and private investigation materials; Fiction depicting surveillance operations ### Surveillance video evidence Identifies documents containing references to surveillance video evidence in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-408-surveillance-video-evidence` - URL: https://testpattern.dev/patterns/au-top500-408-surveillance-video-evidence - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:surveillance\s+video\s+evidence|surveillance\s+footage|CCTV\s+evidence|video\s+evidence|covert\s+surveillance|surveillance\s+recording|body\s+worn\s+camera|security\s+footage|video\s+exhibit|law\s+enforcement|evidentiary\s+recording|surveillance\s+log)\b` - Corroborative keywords: surveillance video evidence, surveillance, video, evidence, law, enforcement, justice, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+31 more) - Example matches: `surveillance video evidence`, `surveillance footage`, `CCTV evidence` - Known false positives: Common words and phrases related to surveillance video evidence appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Surveillance video evidence Identifies documents containing references to surveillance video evidence in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-408-surveillance-video-evidence` - URL: https://testpattern.dev/patterns/global-top500-408-surveillance-video-evidence - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:surveillance\s+video|CCTV\s+footage|video\s+evidence|camera\s+footage|surveillance\s+recording|security\s+camera|body\s+camera|dash\s+camera|video\s+surveillance|footage\s+log|recorded\s+evidence|surveillance\s+footage)\b` - Corroborative keywords: surveillance video evidence - Example matches: `surveillance video`, `cctv footage`, `video evidence` - Known false positives: Common words and phrases related to surveillance video evidence appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Suspicious activity reports Detects references to suspicious activity reports in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-133-suspicious-activity-reports` - URL: https://testpattern.dev/patterns/au-top500-133-suspicious-activity-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:suspicious\s+activity\s+report|suspicious\s+matter\s+report|unusual\s+transaction|threshold\s+transaction|financial\s+intelligence|compliance\s+reporting|suspicious\s+behaviour|transaction\s+alert)\b` - Corroborative keywords: suspicious activity reports, suspicious, activity, reports, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+19 more) - Example matches: `suspicious activity report`, `suspicious matter report`, `unusual transaction` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Suspicious activity reports Detects references to suspicious activity reports in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-133-suspicious-activity-reports` - URL: https://testpattern.dev/patterns/global-top500-133-suspicious-activity-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:suspicious\s+activity\s+report|SAR\s+filing|suspicious\s+transaction|anti[\s-]+money\s+laundering|financial\s+intelligence|unusual\s+transaction|currency\s+transaction\s+report|suspicious\s+matter\s+report|transaction\s+monitoring|red\s+flag\s+indicator)\b` - Corroborative keywords: suspicious activity reports, suspicious, activity, reports, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+31 more) - Example matches: `suspicious activity report`, `sar filing`, `suspicious transaction` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Sweden Driver's License Number Detects Sweden driver's license number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `se-drivers-license` - URL: https://testpattern.dev/patterns/se-drivers-license - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: se, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\b\d{6}-?\d{4}\b` - Corroborative keywords: driver, licence, license, driving, DL, korkort, ID number, identification, ID card, permit, registration, certificate, field, column, row, entry, record, value, form, register (+21 more) - Example matches: `1234561234`, `123456-1234`, `987654-5678` - Known false positives: Swedish personnummer (personal identity number) shares a similar format, making it difficult to distinguish between the two by pattern alone. ### Sweden Passport Number Detects Sweden passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `se-passport-number` - URL: https://testpattern.dev/patterns/se-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: se, eu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b\d{8}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `12345678`, `98765432`, `34567890` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Sweden Physical Addresses Detects Sweden Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `se-physical-addresses` - URL: https://testpattern.dev/patterns/se-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: se, eu - Regulations: GDPR - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 gatan name, unit 4`, `located at 45 vägen example`, `deliver to 78 allén test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### Sweden Tax Identification Number Detects Sweden Tax Identification Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Due to the numeric format, corroborative evidence keywords are essential for reliable detection. - Slug: `se-tax-id` - URL: https://testpattern.dev/patterns/se-tax-id - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: se, eu - Regulations: gdpr - Data categories: pii, financial, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b\d{6}-?\d{4}\b` - Corroborative keywords: personnummer, skatteregistreringsnummer, tax identification, Skatteverket, samordningsnummer, TIN, tax identification number, tax number, tax return, IRD, NIF, tax ID, inland revenue, taxpayer identification, αριθμός φορολογικού μητρώου, ΑΦΜ, φορολογικός, Abgabenkontonummer, adóazonosító, adószám (+47 more) - Example matches: `123456-7890`, `1234567890`, `987654-3210` - Known false positives: Generic numeric sequences in non-tax contexts such as reference numbers or account identifiers; Numbers from other identification schemes with similar digit patterns ### Swift Bic Detects Swift Bic patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `global-swift-bic` - URL: https://testpattern.dev/patterns/global-swift-bic - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Data categories: financial - Scope: narrow - Risk rating: 9 - Pattern: `\b[A-Z]{6}[A-Z0-9]{2}([A-Z0-9]{3})?\b` - Corroborative keywords: bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC, field, column, row, entry, record, value, form, register, database, extract, export (+18 more) - Example matches: `DEUTDEFF`, `BNPAFRPP`, `CHASUS33XXX` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### SWIFT or BIC codes Detects references to swift or bic codes in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-104-swift-or-bic-codes` - URL: https://testpattern.dev/patterns/au-top500-104-swift-or-bic-codes - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:SWIFT\s+code|BIC\s+code|bank\s+identifier\s+code|correspondent\s+bank|wire\s+transfer|international\s+payment|SWIFT\s+network|bank\s+code|routing\s+code)\b` - Corroborative keywords: swift or bic codes, swift, bic, codes, financial, accounts, payments, bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC - Example matches: `SWIFT code`, `bic code`, `bank identifier code` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### SWIFT or BIC codes Detects references to swift or bic codes in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-104-swift-or-bic-codes` - URL: https://testpattern.dev/patterns/global-top500-104-swift-or-bic-codes - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR, PCI-DSS - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:swift\s+or\s+bic\s+codes|SWIFT\s+code|BIC\s+code|bank\s+identifier\s+code|correspondent\s+bank|intermediary\s+bank|wire\s+transfer|international\s+payment|clearing\s+system|SWIFT\s+network)\b` - Corroborative keywords: swift or bic codes, swift, bic, codes, financial, accounts, payments, bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC, field, column, row, entry (+25 more) - Example matches: `swift or bic codes`, `swift code`, `BIC code` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Switzerland Physical Addresses Detects Switzerland Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `ch-physical-addresses` - URL: https://testpattern.dev/patterns/ch-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: ch - Regulations: FADP (Switzerland) - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 Strasse name, unit 4`, `located at 45 Weg example`, `deliver to 78 Platz test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### Synergy realization plans Identifies documents containing references to synergy realization plans in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-185-synergy-realization-plans` - URL: https://testpattern.dev/patterns/au-top500-185-synergy-realization-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:synergy\s+realization|synergy\s+plan|cost\s+synergies|revenue\s+synergies|synergy\s+target|integration\s+savings|run[\s-]+rate\s+savings|merger\s+synergies|synergy\s+capture|post[\s-]+merger\s+value|operational\s+efficiency|headcount\s+reduction)\b` - Corroborative keywords: synergy realization plans, synergy, realization, plans, mergers, acquisitions, strategy - Example matches: `synergy realization`, `synergy plan`, `cost synergies` - Known false positives: Common words and phrases related to synergy realization plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Synergy realization plans Identifies documents containing references to synergy realization plans in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-185-synergy-realization-plans` - URL: https://testpattern.dev/patterns/global-top500-185-synergy-realization-plans - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:synergy\s+realization|cost\s+synergies|revenue\s+synergies|synergy\s+target|run[\s-]+rate\s+savings|integration\s+savings|headcount\s+reduction|operational\s+efficiency|merger\s+synergies|synergy\s+tracking|realization\s+timeline)\b` - Corroborative keywords: synergy realization plans, synergy, realization, plans, mergers, acquisitions, strategy - Example matches: `synergy realization`, `cost synergies`, `revenue synergies` - Known false positives: Common words and phrases related to synergy realization plans appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### System architecture diagrams Identifies system architecture diagrams patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-243-system-architecture-diagrams` - URL: https://testpattern.dev/patterns/au-top500-243-system-architecture-diagrams - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:system\s+architecture|architecture\s+diagram|network\s+topology|infrastructure\s+diagram|system\s+design|component\s+diagram|data\s+flow\s+diagram|deployment\s+architecture|technical\s+architecture|solution\s+architecture)\b` - Corroborative keywords: system architecture diagrams, system, architecture, diagrams, software, engineering - Example matches: `system architecture`, `architecture diagram`, `network topology` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### System architecture diagrams Identifies system architecture diagrams patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-243-system-architecture-diagrams` - URL: https://testpattern.dev/patterns/global-top500-243-system-architecture-diagrams - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:system\s+architecture|architecture\s+diagram|network\s+topology|infrastructure\s+diagram|system\s+design|component\s+diagram|data\s+flow\s+diagram|deployment\s+architecture|service\s+map|technical\s+architecture)\b` - Corroborative keywords: system architecture diagrams, system, architecture, diagrams, software, engineering - Example matches: `system architecture`, `architecture diagram`, `network topology` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Személyi szám Detects Személyi szám patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `hu-personal-id` - URL: https://testpattern.dev/patterns/hu-personal-id - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: eu, hu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d-\d{6}-\d{4}\b` - Corroborative keywords: személyi szám, personal identification, személyazonosító, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `1-750101-1234`, `2-880512-5678`, `3-920303-4567` - Known false positives: The distinctive dash-separated format (X-XXXXXX-XXXX) significantly reduces false positives.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### T.C. Kimlik Numarası Detects T.C. Kimlik Numarası patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `tr-national-id` - URL: https://testpattern.dev/patterns/tr-national-id - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: tr - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{11}\b` - Corroborative keywords: TC kimlik, kimlik numarası, national identification, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `12345678901`, `98765432109`, `45678901234` - Known false positives: Eleven-digit numeric sequences may match phone numbers or other administrative identifiers.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Taiwan Passport Number Detects Taiwan passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `tw-passport-number` - URL: https://testpattern.dev/patterns/tw-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: tw - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b\d{9}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `301234567`, `987654321`, `456789012` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Taiwan Physical Addresses Detects Taiwan Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `tw-physical-addresses` - URL: https://testpattern.dev/patterns/tw-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: tw - Regulations: PDPA (Taiwan) - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 路 name, unit 4`, `located at 45 街 example`, `deliver to 78 巷 test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### TAJ szám Detects TAJ szám patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `hu-social-security-taj` - URL: https://testpattern.dev/patterns/hu-social-security-taj - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, hu - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{3}\s?\d{3}\s?\d{3}\b` - Corroborative keywords: TAJ, társadalombiztosítási, social security, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `123 456 789`, `987654321`, `456 789 012` - Known false positives: Nine-digit sequences with optional spaces match phone numbers, postal codes, and other numeric references.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Target package intelligence Identifies documents containing references to target package intelligence in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-424-target-package-intelligence` - URL: https://testpattern.dev/patterns/au-top500-424-target-package-intelligence - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:target\s+package\s+intelligence|target\s+acquisition|intelligence\s+package|target\s+analysis|targeting\s+data|intelligence\s+assessment|threat\s+intelligence|target\s+identification|target\s+dossier|defence\s+intelligence|signals\s+intelligence|intelligence\s+product)\b` - Corroborative keywords: target package intelligence, target, package, intelligence, defense, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program, public benefit, constituency - Example matches: `target package intelligence`, `target acquisition`, `intelligence package` - Known false positives: Common words and phrases related to target package intelligence appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Target package intelligence Identifies documents containing references to target package intelligence in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-424-target-package-intelligence` - URL: https://testpattern.dev/patterns/global-top500-424-target-package-intelligence - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:target\s+package|intelligence\s+package|targeting\s+data|target\s+folder|strike\s+package|mission\s+planning|target\s+coordinates|battle\s+damage\s+assessment|target\s+acquisition|collateral\s+damage|target\s+nomination)\b` - Corroborative keywords: target package intelligence - Example matches: `target package`, `intelligence package`, `targeting data` - Known false positives: Common words and phrases related to target package intelligence appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Tax authority correspondence Detects references to tax authority correspondence in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-094-tax-authority-correspondence` - URL: https://testpattern.dev/patterns/au-top500-094-tax-authority-correspondence - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:tax\s+authority\s+correspondence|Australian\s+Taxation\s+Office|notice\s+of\s+assessment|tax\s+ruling|private\s+ruling|compliance\s+notice|audit\s+notification|tax\s+determination|tax\s+agent)\b` - Corroborative keywords: tax authority correspondence, tax, authority, correspondence, payroll, operations, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet, profit and loss (+1 more) - Example matches: `tax authority correspondence`, `australian taxation office`, `notice of assessment` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Tax authority correspondence Detects references to tax authority correspondence in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-094-tax-authority-correspondence` - URL: https://testpattern.dev/patterns/global-top500-094-tax-authority-correspondence - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:tax\s+authority\s+correspondence|tax\s+office\s+letter|revenue\s+authority|tax\s+notice|assessment\s+notice|tax\s+audit|compliance\s+notice|penalty\s+notice|tax\s+ruling|ATO\s+correspondence|IRS\s+notice)\b` - Corroborative keywords: tax authority correspondence, tax, authority, correspondence, payroll, operations, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet, profit and loss (+30 more) - Example matches: `tax authority correspondence`, `tax office letter`, `revenue authority` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Tax exemption certificates Identifies documents containing references to tax exemption certificates in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-147-tax-exemption-certificates` - URL: https://testpattern.dev/patterns/au-top500-147-tax-exemption-certificates - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:tax\s+exemption|exemption\s+certificate|GST\s+exempt|ATO\s+exemption|charitable\s+status|deductible\s+gift\s+recipient|income\s+tax\s+exempt|fringe\s+benefits\s+tax)\b` - Corroborative keywords: tax exemption certificates, tax, exemption, certificates, procurement, supplier, management, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie, credential (+16 more) - Example matches: `tax exemption`, `exemption certificate`, `GST exempt` - Known false positives: Common words and phrases related to tax exemption certificates appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Tax exemption certificates Identifies documents containing references to tax exemption certificates in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-147-tax-exemption-certificates` - URL: https://testpattern.dev/patterns/global-top500-147-tax-exemption-certificates - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:tax\s+exemption|exemption\s+certificate|tax\s+exempt|sales\s+tax\s+exemption|GST\s+exemption|VAT\s+exemption|withholding\s+tax|tax\s+clearance|certificate\s+of\s+exemption|resale\s+certificate|charitable\s+exemption|W[\s-]+9\s+form)\b` - Corroborative keywords: tax exemption certificates, tax, exemption, certificates, procurement, supplier, management, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie, credential (+44 more) - Example matches: `tax exemption`, `exemption certificate`, `tax exempt` - Known false positives: Common words and phrases related to tax exemption certificates appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Taxpayer case management files Identifies documents containing references to taxpayer case management files in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-381-taxpayer-case-management-files` - URL: https://testpattern.dev/patterns/au-top500-381-taxpayer-case-management-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:taxpayer\s+case\s+management\s+files|case\s+management|tax\s+file\s+number|assessment\s+notice|tax\s+return)\b` - Corroborative keywords: taxpayer case management files, taxpayer, case, management, files, government, citizen, services, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+31 more) - Example matches: `taxpayer case management files`, `case management`, `tax file number` - Known false positives: Common words and phrases related to taxpayer case management files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Taxpayer case management files Identifies documents containing references to taxpayer case management files in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-381-taxpayer-case-management-files` - URL: https://testpattern.dev/patterns/global-top500-381-taxpayer-case-management-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:taxpayer\s+case\s+management\s+files|taxpayer\s+file|tax\s+assessment|tax\s+audit|tax\s+return|revenue\s+case|tax\s+compliance|taxpayer\s+identification|tax\s+obligation|case\s+management|tax\s+investigation|assessment\s+notice)\b` - Corroborative keywords: taxpayer case management files - Example matches: `taxpayer case management files`, `taxpayer file`, `tax assessment` - Known false positives: Common words and phrases related to taxpayer case management files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Taxpayer identification number Identifies documents containing references to taxpayer identification number in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-025-taxpayer-identification-number` - URL: https://testpattern.dev/patterns/au-top500-025-taxpayer-identification-number - Type: regex - Engine: boost_regex - Confidence: low - Detection quality: Partial - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `\btaxpayer\s+identification\s+number\b` - Corroborative keywords: taxpayer identification number, taxpayer, identification, number, government, ids, civil, status, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+2 more) - Example matches: `Taxpayer identification number`, `taxpayer identification number`, `Taxpayer identification number` - Known false positives: Common words and phrases related to taxpayer identification number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Technical Design Document Detects technical design documents, system architecture specifications, and API documentation. - Slug: `au-technical-design-document` - URL: https://testpattern.dev/patterns/au-technical-design-document - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: intellectual-property, technology - Scope: narrow - Risk rating: 8 - Example matches: `System architecture document with API specification and schema design`, `Technical design review: solution architecture diagram version 2.1`, `Technical specification for interface design and architecture review` - Known false positives: References to architecture in building or design contexts. ### Telecom core network configurations Identifies documents containing references to telecom core network configurations in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-453-telecom-core-network-configurations` - URL: https://testpattern.dev/patterns/au-top500-453-telecom-core-network-configurations - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:telecom\s+core\s+network\s+configurations|core\s+network|routing\s+table|subscriber\s+profile|network\s+element|base\s+station|critical\s+infrastructure)\b` - Corroborative keywords: telecom core network configurations, telecom, core, network, configurations, critical, infrastructure, systems, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name (+17 more) - Example matches: `telecom core network configurations`, `core network`, `routing table` - Known false positives: Common words and phrases related to telecom core network configurations appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Telecom core network configurations Identifies documents containing references to telecom core network configurations in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-453-telecom-core-network-configurations` - URL: https://testpattern.dev/patterns/global-top500-453-telecom-core-network-configurations - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:telecom\s+core\s+network|core\s+network\s+configuration|network\s+topology|subscriber\s+routing|EPC\s+configuration|5G\s+core|IMS\s+platform|signaling\s+gateway|network\s+element|critical\s+infrastructure|backbone\s+network|peering\s+configuration)\b` - Corroborative keywords: telecom core network configurations, telecom, core, network, configurations, critical, infrastructure, systems, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name (+46 more) - Example matches: `telecom core network`, `core network configuration`, `network topology` - Known false positives: Common words and phrases related to telecom core network configurations appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Telemetry schemas Identifies telemetry schemas patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-259-telemetry-schemas` - URL: https://testpattern.dev/patterns/au-top500-259-telemetry-schemas - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:telemetry\s+schemas|software\s+engineering|data\s+collection|metrics\s+pipeline|event\s+tracking|data\s+model)\b` - Corroborative keywords: telemetry schemas, telemetry, schemas, software, engineering, architecture - Example matches: `telemetry schemas`, `software engineering`, `data collection` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Telemetry schemas Identifies telemetry schemas patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-259-telemetry-schemas` - URL: https://testpattern.dev/patterns/global-top500-259-telemetry-schemas - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:metrics\s+collection|event\s+tracking|data\s+pipeline|application\s+insights|open\s+telemetry|trace\s+data|span\s+definition|metric\s+definition)\b` - Corroborative keywords: telemetry schemas, telemetry, schemas, software, engineering, architecture - Example matches: `metrics collection`, `event tracking`, `data pipeline` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Terrorism Watchlist Entry Detects terrorism and national security watchlist entries including risk ratings, monitoring status, intelligence basis, and border alert configurations. Disclosure enables subjects to evade monitoring and compromises border security. - Slug: `terrorism-watchlist-entry` - URL: https://testpattern.dev/patterns/terrorism-watchlist-entry - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: law-enforcement - Scope: wide - Risk rating: 10 - Pattern: `(?i)\b(terrorism\s+watchlist|persons?\s+of\s+interest\s+register|national\s+security\s+flag|adverse\s+security\s+assessment|security\s+alert\s+(?:entry|notification)|border\s+alert\s+(?:entry|notification)|movement\s+alert\s+(?:list|entry)|no[\-\s]fly\s+list\s+(?:entry|nomination)|ASIO\s+(?:referral|assessment|security\s+assessment))\b` - Corroborative keywords: PROTECTED, Law-Enforcement, NATIONAL SECURITY, RESTRICTED, ASIO, AFP, Australian Border Force, watchlist, national security flag, adverse assessment, border alert, movement alert, no-fly list, enhanced screening, active monitoring, high risk, elevated risk, investigation, enforcement, prosecution (+38 more) - Example matches: `PROTECTED — NATIONAL SECURITY. Terrorism Watchlist Entry. Subject: Omar Hassan IBRAHIM, DOB 03/11/1988, passport PA1234567. National security flag: ACTIVE. ASIO adverse security assessment 14/10/2024. Ref ASA-2024-7892. Risk: HIGH. Border alert: movement alert — notify AFP/ASIO on travel. Enhanced screening all airports.`, `RESTRICTED. POI Register update. Subject added to watchlist per ASIO referral ASA-2025-0342. Adverse assessment: foreign terrorist organisation association. Active monitoring. No-fly list nomination to Home Affairs. Movement alert all border points.`, `Border alert notification. Subject: Fatima AL-RASHIDI. National security flag triggered at Brisbane International. Movement alert confirmed. ASIO assessment: elevated risk. Enhanced screening. AFP and ASIO notified. POI register entry active since March 2024.` - Known false positives: Government factsheets about border systems; Civil liberties reports on watchlist processes; Media reporting about watchlist challenges ### Teudat Zehut Detects Teudat Zehut patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `il-national-id` - URL: https://testpattern.dev/patterns/il-national-id - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: il - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{9}\b` - Corroborative keywords: teudat zehut, identity number, national ID, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `123456789`, `987654321`, `456789012` - Known false positives: Nine-digit numeric sequences are common in phone numbers, bank accounts, and other administrative references.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Third-party assurance attestations Identifies documents containing references to third-party assurance attestations in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-480-third-party-assurance-attestations` - URL: https://testpattern.dev/patterns/au-top500-480-third-party-assurance-attestations - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:third[\s-]+party\s+assurance|assurance\s+attestation|vendor\s+assessment|supplier\s+audit|third[\s-]+party\s+risk|SOC\s+2\s+report|external\s+audit|assurance\s+report|CPS\s+234|CPS\s+230|compliance\s+attestation|security\s+assurance)\b` - Corroborative keywords: third-party assurance attestations, third, party, assurance, attestations, privacy, compliance, risk - Example matches: `third-party assurance`, `assurance attestation`, `vendor assessment` - Known false positives: Common words and phrases related to third-party assurance attestations appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Third-party assurance attestations Identifies documents containing references to third-party assurance attestations in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-480-third-party-assurance-attestations` - URL: https://testpattern.dev/patterns/global-top500-480-third-party-assurance-attestations - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:third[\s-]+party\s+assurance\s+attestations|assurance\s+report|SOC\s+2|SOC\s+1|ISAE\s+3402|independent\s+audit|third[\s-]+party\s+assessment|vendor\s+assurance|control\s+effectiveness)\b` - Corroborative keywords: third-party assurance attestations, third, party, assurance, attestations, privacy, compliance, risk - Example matches: `third-party assurance attestations`, `assurance report`, `SOC 2` - Known false positives: Common words and phrases related to third-party assurance attestations appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Third-party risk assessments Identifies documents containing references to third-party risk assessments in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-148-third-party-risk-assessments` - URL: https://testpattern.dev/patterns/au-top500-148-third-party-risk-assessments - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:third[\s-]+party\s+risk|risk\s+assessment|vendor\s+risk|supplier\s+risk|due\s+diligence|risk\s+rating|compliance\s+assessment|security\s+assessment|CPS\s+230|outsourcing\s+risk)\b` - Corroborative keywords: third-party risk assessments, third, party, risk, assessments, procurement, supplier, management - Example matches: `third-party risk`, `risk assessment`, `vendor risk` - Known false positives: Common words and phrases related to third-party risk assessments appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Third-party risk assessments Identifies documents containing references to third-party risk assessments in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-148-third-party-risk-assessments` - URL: https://testpattern.dev/patterns/global-top500-148-third-party-risk-assessments - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:third[\s-]+party\s+risk|risk\s+assessment|vendor\s+risk|supplier\s+risk\s+rating|third[\s-]+party\s+due\s+diligence|risk\s+score|inherent\s+risk|residual\s+risk|risk\s+mitigation|vendor\s+assessment|cybersecurity\s+risk|compliance\s+assessment)\b` - Corroborative keywords: third-party risk assessments, third, party, risk, assessments, procurement, supplier, management - Example matches: `third-party risk`, `risk assessment`, `vendor risk` - Known false positives: Common words and phrases related to third-party risk assessments appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Threat intelligence subscriptions Identifies threat intelligence subscriptions patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-290-threat-intelligence-subscriptions` - URL: https://testpattern.dev/patterns/au-top500-290-threat-intelligence-subscriptions - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:threat\s+intelligence|stix|taxii|misp|intel\s+feed)\b` - Corroborative keywords: threat intelligence subscriptions, threat, intelligence, subscriptions, security, operations, data - Example matches: `Threat intelligence subscriptions`, `threat intelligence subscriptions`, `Threat intelligence subscriptions` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Threat intelligence subscriptions Identifies threat intelligence subscriptions patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-290-threat-intelligence-subscriptions` - URL: https://testpattern.dev/patterns/global-top500-290-threat-intelligence-subscriptions - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:threat\s+intelligence|stix|taxii|misp|intel\s+feed)\b` - Corroborative keywords: threat intelligence subscriptions, threat, intelligence, subscriptions, security, operations, data - Example matches: `Threat intelligence subscriptions`, `threat intelligence subscriptions`, `Threat intelligence subscriptions` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Threat model documents Identifies threat model documents patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-251-threat-model-documents` - URL: https://testpattern.dev/patterns/au-top500-251-threat-model-documents - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:threat\s+model|stride|trust\s+boundary|attack\s+surface|abuse\s+case)\b` - Corroborative keywords: threat model documents, threat, model, documents, software, engineering, architecture - Example matches: `Threat model documents`, `threat model documents`, `Threat model documents` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Threat model documents Identifies threat model documents patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-251-threat-model-documents` - URL: https://testpattern.dev/patterns/global-top500-251-threat-model-documents - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:threat\s+model|stride|trust\s+boundary|attack\s+surface|abuse\s+case)\b` - Corroborative keywords: threat model documents, threat, model, documents, software, engineering, architecture - Example matches: `Threat model documents`, `threat model documents`, `Threat model documents` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Time and attendance records Identifies documents containing references to time and attendance records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-077-time-and-attendance-records` - URL: https://testpattern.dev/patterns/au-top500-077-time-and-attendance-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:time\s+and\s+attendance|clock\s+in|clock\s+out|attendance\s+record|shift\s+roster|hours\s+worked|overtime\s+record|time\s+tracking|work\s+hours|rostered\s+hours|attendance\s+log)\b` - Corroborative keywords: time and attendance records, time, attendance, records, employment, workforce - Example matches: `time and attendance`, `clock in`, `clock out` - Known false positives: Common words and phrases related to time and attendance records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Time and attendance records Identifies documents containing references to time and attendance records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-077-time-and-attendance-records` - URL: https://testpattern.dev/patterns/global-top500-077-time-and-attendance-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:time\s+and\s+attendance|clock\s+in|clock\s+out|hours\s+worked|time\s+tracking|attendance\s+record|shift\s+roster|work\s+hours|overtime\s+record|time\s+card)\b` - Corroborative keywords: time and attendance records, time, attendance, records, employment, workforce - Example matches: `time and attendance`, `clock in`, `clock out` - Known false positives: Common words and phrases related to time and attendance records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Titled Person Reference Identifies personal names preceded by salutations (Mr, Mrs, Ms, Dr, Prof, etc.) in Australian documents. Uses structural regex for honorific + capitalised name components with corroborative evidence from family-name and forename census dictionaries. - Slug: `au-titled-person-reference` - URL: https://testpattern.dev/patterns/au-titled-person-reference - Type: keyword_dictionary - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii, personal-name - Scope: wide - Risk rating: 6 - Example matches: `Dear Dr Sarah Thompson`, `Attention: Prof. James Wilson`, `The Hon. Justice Michael Kirby` - Known false positives: Salutations preceding non-name words in informal text or brand references. ### Trade secret inventories Identifies trade secret inventories patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-208-trade-secret-inventories` - URL: https://testpattern.dev/patterns/au-top500-208-trade-secret-inventories - Type: regex - Engine: boost_regex - Confidence: low - Detection quality: Mixed - Jurisdictions: global - Regulations: NDB Scheme (Cth), SOCI Act 2018 (Cth), TIA Act 1979 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `\btrade\s+secret\s+inventories\b` - Corroborative keywords: trade secret inventories, trade, secret, inventories, intellectual, property, secrets, OFFICIAL, OFFICIAL:Sensitive, PROTECTED, SECRET, TOP SECRET, CABINET-IN-CONFIDENCE, NOFORN, REL TO, ORCON, National Cabinet, AUSTEO, AGAO, Sensitive: Legal (+24 more) - Example matches: `Trade secret inventories`, `trade secret inventories`, `Trade secret inventories` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Trade secret inventories Identifies trade secret inventories patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-208-trade-secret-inventories` - URL: https://testpattern.dev/patterns/global-top500-208-trade-secret-inventories - Type: regex - Engine: boost_regex - Confidence: low - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `\btrade\s+secret\s+inventories\b` - Corroborative keywords: trade secret inventories, trade, secret, inventories, intellectual, property, secrets, OFFICIAL, OFFICIAL:Sensitive, PROTECTED, SECRET, TOP SECRET, CABINET-IN-CONFIDENCE, NOFORN, REL TO, ORCON, National Cabinet, AUSTEO, AGAO, Sensitive: Legal (+53 more) - Example matches: `Trade secret inventories`, `trade secret inventories`, `Trade secret inventories` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Trade Secret/Proprietary Notice Detects trade secret designations, proprietary information notices, and commercial-in-confidence markings. - Slug: `au-trade-secret-notice` - URL: https://testpattern.dev/patterns/au-trade-secret-notice - Type: keyword_list - Confidence: medium - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), Privacy Act 1988 (Cth) - Data categories: intellectual-property, confidential - Scope: narrow - Risk rating: 9 - Example matches: `CONFIDENTIAL AND PROPRIETARY - trade secret information`, `COMMERCIAL-IN-CONFIDENCE: do not distribute or copy`, `Proprietary technology: restricted distribution, do not disclose` - Known false positives: Generic use of proprietary or secret in non-business contexts. ### Trademark strategy analyses Identifies documents containing references to trademark strategy analyses in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-207-trademark-strategy-analyses` - URL: https://testpattern.dev/patterns/au-top500-207-trademark-strategy-analyses - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:trademark\s+strategy|trademark\s+analysis|brand\s+protection|trademark\s+registration|trademark\s+portfolio|trade\s+mark|brand\s+strategy|trademark\s+search|trademark\s+opposition|trademark\s+infringement|IP\s+strategy|brand\s+valuation)\b` - Corroborative keywords: trademark strategy analyses, trademark, strategy, analyses, intellectual, property, trade, secrets - Example matches: `trademark strategy`, `trademark analysis`, `brand protection` - Known false positives: Common words and phrases related to trademark strategy analyses appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Trademark strategy analyses Identifies documents containing references to trademark strategy analyses in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-207-trademark-strategy-analyses` - URL: https://testpattern.dev/patterns/global-top500-207-trademark-strategy-analyses - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:trademark\s+strategy|brand\s+protection|trademark\s+registration|trademark\s+portfolio|trademark\s+search|mark\s+clearance|trademark\s+opposition|brand\s+valuation|trademark\s+infringement|intellectual\s+property\s+strategy|trademark\s+filing)\b` - Corroborative keywords: trademark strategy analyses, trademark, strategy, analyses, intellectual, property, trade, secrets - Example matches: `trademark strategy`, `brand protection`, `trademark registration` - Known false positives: Common words and phrases related to trademark strategy analyses appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Trading Algorithm or Quantitative Strategy Detects proprietary trading algorithms, quantitative investment strategies, or systematic risk models used by government investment vehicles such as QIC (Queensland Investment Corporation). Keyword-based fallback detection is provided for environments without ML classifier support. - Slug: `trading-algorithm-or-quantitative-strategy` - URL: https://testpattern.dev/patterns/trading-algorithm-or-quantitative-strategy - Type: trainable_classifier - Engine: universal - Confidence: high - Jurisdictions: global - Regulations: Corporations Act 2001 (Cth) - Data categories: financial - Scope: wide - Risk rating: 8 - Corroborative keywords: alpha generation, signal, backtest, backtesting, Sharpe ratio, factor model, systematic, execution algorithm, VWAP, TWAP, quantitative strategy, trading algorithm, proprietary, trade secret, PROTECTED, QIC, financial, fiscal, monetary, accounting (+11 more) - Example matches: `PROPRIETARY — TRADE SECRET. QIC Systematic Alpha Strategy v3.2. Signal generation: momentum factor combined with mean-reversion on 5-day rolling window. Backtest results: Sharpe ratio 1.8, max drawdown 12%. Alpha generation: 280bps annualised over benchmark. Execution algorithm: VWAP with 15% participation rate. PROTECTED.`, `PROTECTED — QIC Quantitative Investment. Factor model specification: Value (30%), Momentum (25%), Quality (25%), Low Vol (20%). Portfolio construction: long-short with gross exposure 150%. Rebalancing: weekly. Signal decay analysis and TWAP execution parameters attached. Proprietary — not for distribution.` - Known false positives: Academic research papers on quantitative finance and factor models; Financial education materials explaining trading concepts ### Traffic Camera Record Detects traffic camera and speed camera infringement records containing driver identification details, vehicle registration, and photographic evidence references. These records link specific individuals to traffic offences via camera evidence under the Transport Operations (Road Use Management) Act 1995 (Qld). - Slug: `traffic-camera-record` - URL: https://testpattern.dev/patterns/traffic-camera-record - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: SPER Act 1999 (Qld), TORUM Act 1995 (Qld) - Data categories: law-enforcement, government - Scope: narrow - Risk rating: 7 - Pattern: `(?i)\b(traffic\s+camera\s+(?:record|image|evidence)|speed\s+camera\s+(?:detection|infringement)|red\s+light\s+camera\s+(?:detection|infringement)|infringement\s+notice|registered\s+operator|penalty\s+infringement\s+notice)\b` - Corroborative keywords: SENSITIVE, Legal, traffic camera, speed camera, red light camera, infringement notice, registered operator, vehicle registration, penalty infringement, TMR, Department of Transport, SPER, camera evidence, demerit points, investigation, enforcement, prosecution, arrest, evidence, forensic (+52 more) - Example matches: `SENSITIVE Legal. Traffic Camera Infringement Record. Infringement Notice Number: TIN-2026-BNE-084291. Camera Site: Pacific Motorway southbound, Eight Mile Plains (Site ID: SC-4127). Detection: Speed camera — 118 km/h in 100 km/h zone. Date/Time: 14 February 2026, 08:42:17. Vehicle: White Toyota Hilux, registration 123ABC (QLD). Registered Operator: [Name], [Address], Upper Mount Gravatt QLD 4122. Penalty: $287 fine, 1 demerit point. Image reference: CAM-4127-20260214-084217.jpg.`, `Department of Transport and Main Roads — Penalty Infringement Notice. Reference: PIN-2026-0057823. Red light camera detection at intersection of Ipswich Road and Annerley Road, Woolloongabba. Camera Site ID: RLC-2089. Vehicle: registration 456DEF (QLD), silver Mazda 3. Registered operator: [Name], [Address], Coorparoo QLD 4151. Offence: Fail to stop at red traffic light — Transport Operations (Road Use Management) Act 1995 s.79. Demerit points: 3. Fine: $575. Statutory declaration option available.`, `SPER Enforcement — Outstanding Traffic Camera Infringement. Original Notice: TIN-2025-TSV-041872. Registered operator [Name] of [Address], Aitkenvale QLD 4814. Speed camera detection: 134 km/h in 110 km/h zone, Bruce Highway northbound at Bowen (Site ID: SC-7341). Original fine: $287 plus 1 demerit point. SPER enforcement order issued: additional $113.15 enforcement fee. Total amount due: $400.15. Payment required within 28 days or enforcement warrant may issue.` - Known false positives: Published speed camera and red light camera location lists; Road safety campaigns with aggregate infringement statistics; Motoring magazine articles about camera technology ### Travel itinerary details Identifies documents containing references to travel itinerary details in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-049-travel-itinerary-details` - URL: https://testpattern.dev/patterns/au-top500-049-travel-itinerary-details - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:travel\s+itinerary\s+details|travel\s+itinerary|flight\s+booking|booking\s+reference|passenger\s+name\s+record|hotel\s+reservation|accommodation\s+booking|trip\s+details|travel\s+plan)\b` - Corroborative keywords: travel itinerary details, travel, itinerary, details, contact, location, data - Example matches: `travel itinerary details`, `travel itinerary`, `flight booking` - Known false positives: Common words and phrases related to travel itinerary details appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Travel itinerary details Identifies documents containing references to travel itinerary details in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-049-travel-itinerary-details` - URL: https://testpattern.dev/patterns/global-top500-049-travel-itinerary-details - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:travel\s+itinerary\s+details|travel\s+itinerary|flight\s+itinerary|booking\s+confirmation|travel\s+plan|trip\s+details|departure\s+date|arrival\s+date|flight\s+number|hotel\s+reservation|travel\s+booking|passenger\s+name\s+record)\b` - Corroborative keywords: travel itinerary details, travel, itinerary, details, contact, location, data - Example matches: `travel itinerary details`, `travel itinerary`, `flight itinerary` - Known false positives: Common words and phrases related to travel itinerary details appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Treasury cash position reports Detects references to treasury cash position reports in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-118-treasury-cash-position-reports` - URL: https://testpattern.dev/patterns/au-top500-118-treasury-cash-position-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:cash\s+position|liquidity\s+report|cash\s+management|daily\s+cash\s+balance|overnight\s+position|bank\s+balance|funding\s+requirement|cash\s+forecast|cash\s+at\s+bank|treasury\s+operations)\b` - Corroborative keywords: treasury cash position reports, treasury, cash, position, reports, financial, accounts, payments, fiscal, monetary, accounting, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet, profit and loss (+1 more) - Example matches: `cash position`, `liquidity report`, `cash management` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Treasury cash position reports Detects references to treasury cash position reports in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-118-treasury-cash-position-reports` - URL: https://testpattern.dev/patterns/global-top500-118-treasury-cash-position-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR, PCI-DSS - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:cash\s+position|cash\s+balance|daily\s+position|bank\s+balance|cash\s+management|funding\s+position|cash\s+forecast|short[\s-]+term\s+investment|money\s+market|working\s+capital)\b` - Corroborative keywords: treasury cash position reports, treasury, cash, position, reports, financial, accounts, payments, fiscal, monetary, accounting, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet, profit and loss (+30 more) - Example matches: `cash position`, `cash balance`, `daily position` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Treatment plan details Identifies treatment plan details references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `au-top500-323-treatment-plan-details` - URL: https://testpattern.dev/patterns/au-top500-323-treatment-plan-details - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:treatment\s+plan|care\s+plan|clinical\s+plan|patient\s+treatment|therapy\s+plan|medical\s+record|clinical\s+notes|discharge\s+plan|treatment\s+protocol|patient\s+care)\b` - Corroborative keywords: treatment plan details, treatment, plan, details, health, biomedical, information, patient, clinical, medical, hospital, practitioner, diagnosis, prescription, physician, nurse, therapy, examination, consultation, referral - Example matches: `treatment plan`, `care plan`, `clinical plan` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### Treatment plan details Identifies treatment plan details references in healthcare and patient records. Protected health information under applicable data protection regulations. - Slug: `global-top500-323-treatment-plan-details` - URL: https://testpattern.dev/patterns/global-top500-323-treatment-plan-details - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: healthcare, phi - Scope: wide - Pattern: `(?is)\b(?:treatment\s+plan|care\s+plan|clinical\s+treatment|patient\s+treatment|therapeutic\s+plan|medical\s+record|attending\s+physician|clinical\s+pathway)\b` - Corroborative keywords: treatment plan details, treatment, plan, details, health, biomedical, information, patient, clinical, medical, hospital, practitioner, diagnosis, prescription, physician, nurse, therapy, examination, consultation, referral (+29 more) - Example matches: `treatment plan`, `care plan`, `clinical treatment` - Known false positives: Medical terminology in health education materials, research publications, clinical guidelines, or public health documents without patient-specific data.; General wellness and fitness content using medical vocabulary without constituting protected health information. ### Treaty negotiation drafts Identifies documents containing references to treaty negotiation drafts in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-487-treaty-negotiation-drafts` - URL: https://testpattern.dev/patterns/au-top500-487-treaty-negotiation-drafts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:treaty\s+negotiation|negotiation\s+draft|bilateral\s+treaty|multilateral\s+agreement|treaty\s+text|international\s+agreement|diplomatic\s+negotiation|treaty\s+obligation|cabinet\s+submission|foreign\s+affairs)\b` - Corroborative keywords: treaty negotiation drafts, treaty, negotiation, drafts, elections, diplomacy, statecraft, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+31 more) - Example matches: `treaty negotiation`, `negotiation draft`, `bilateral treaty` - Known false positives: Common words and phrases related to treaty negotiation drafts appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Treaty negotiation drafts Identifies documents containing references to treaty negotiation drafts in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-487-treaty-negotiation-drafts` - URL: https://testpattern.dev/patterns/global-top500-487-treaty-negotiation-drafts - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:treaty\s+negotiation\s+drafts|treaty\s+negotiation|bilateral\s+agreement|multilateral\s+treaty|draft\s+protocol|convention\s+text|negotiation\s+mandate|diplomatic\s+conference|treaty\s+provisions|international\s+agreement)\b` - Corroborative keywords: treaty negotiation drafts - Example matches: `treaty negotiation drafts`, `treaty negotiation`, `bilateral agreement` - Known false positives: Common words and phrases related to treaty negotiation drafts appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Troop movement information Identifies documents containing references to troop movement information in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-422-troop-movement-information` - URL: https://testpattern.dev/patterns/au-top500-422-troop-movement-information - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:troop\s+movement\s+information|troop\s+deployment|force\s+disposition|military\s+movement|unit\s+relocation|operational\s+deployment|force\s+posture|troop\s+strength|deployment\s+schedule|defence\s+intelligence|movement\s+order|theatre\s+of\s+operations)\b` - Corroborative keywords: troop movement information, troop, movement, information, defense, intelligence, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program, public benefit (+18 more) - Example matches: `troop movement information`, `troop deployment`, `force disposition` - Known false positives: Common words and phrases related to troop movement information appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Troop movement information Identifies documents containing references to troop movement information in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-422-troop-movement-information` - URL: https://testpattern.dev/patterns/global-top500-422-troop-movement-information - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:troop\s+movement|force\s+deployment|unit\s+relocation|military\s+movement|deployment\s+order|force\s+posture|troop\s+strength|order\s+of\s+battle|movement\s+order|staging\s+area|force\s+projection|theater\s+deployment)\b` - Corroborative keywords: troop movement information - Example matches: `troop movement`, `force deployment`, `unit relocation` - Known false positives: Common words and phrases related to troop movement information appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Turkey Physical Addresses Detects Turkey Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `tr-physical-addresses` - URL: https://testpattern.dev/patterns/tr-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: tr - Regulations: KVKK (Turkey) - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 sokak name, unit 4`, `located at 45 cadde example`, `deliver to 78 bulvarı test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### Types Of Medication Detects Types Of Medication patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that identifies health and medical terminology in documents. Keyword matching is used to flag content containing medical language. - Slug: `global-types-of-medication` - URL: https://testpattern.dev/patterns/global-types-of-medication - Type: keyword_list - Confidence: low - Jurisdictions: global - Regulations: GDPR, HIPAA - Data categories: phi, health - Scope: wide - Risk rating: 8 - Example matches: `patient diagnosed with antibiotic`, `treatment plan includes antiviral`, `clinical notes reference antifungal` - Known false positives: Educational or research materials discussing medical topics without containing actual patient data; News articles or general health information websites mentioning medical conditions ### U.K. Physical Addresses Detects U.K. Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `uk-physical-addresses` - URL: https://testpattern.dev/patterns/uk-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: uk - Regulations: GDPR - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 street name, unit 4`, `located at 45 road example`, `deliver to 78 avenue test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### U.S. Bank Account Number Detects U.S. Bank Account Number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Financial account numbers require corroborative evidence for reliable detection due to their generic numeric format. - Slug: `us-bank-account` - URL: https://testpattern.dev/patterns/us-bank-account - Type: regex - Engine: universal - Confidence: low - Detection quality: Verified - Jurisdictions: us - Regulations: CCPA/CPRA, FTC Act s5, GLBA, HIPAA, SOX, State Breach Laws (US) - Data categories: pii, financial - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{8,17}\b` - Corroborative keywords: bank account, account number, checking, savings, routing, ACH, bank account number, savings account, ANZ, ASB, banking, BNZ, chequing, financial institution, Kiwibank, Westpac, חשבון בנק, מספר חשבון, סניף, 口座番号 (+14 more) - Example matches: `12345678`, `12345678901234567`, `9876543210` - Known false positives: Generic numeric sequences such as reference numbers, invoice numbers, or identifiers from other domains; Phone numbers, postal codes, or other structured numbers with similar digit counts ### U.S. Driver's License Number Detects U.S. driver's license number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `us-drivers-license` - URL: https://testpattern.dev/patterns/us-drivers-license - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: us - Regulations: CCPA/CPRA, State Breach Laws (US) - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\b[A-Z]\d{7,12}\b|\b\d{7,9}\b` - Corroborative keywords: driver, licence, license, driving, DL, DMV, ID number, identification, ID card, permit, registration, certificate - Example matches: `A1234567`, `123456789`, `B123456789012` - Known false positives: Generic numeric sequences matching the driver's license format appearing in unrelated contexts. The broad format variation across US states increases the false positive rate. ### U.S. Physical Addresses Detects U.S. Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `us-physical-addresses` - URL: https://testpattern.dev/patterns/us-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: us - Regulations: CCPA/CPRA - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 street name, unit 4`, `located at 45 road example`, `deliver to 78 avenue test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### UAE Passport Number Detects UAE passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `ae-passport-number` - URL: https://testpattern.dev/patterns/ae-passport-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: ae - Regulations: UAE PDPL - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b\d{7,9}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `1234567`, `12345678`, `123456789` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Uimhir PSP Detects Uimhir PSP patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `ie-pps-number` - URL: https://testpattern.dev/patterns/ie-pps-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, ie - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{7}[A-Z]{1,2}\b` - Corroborative keywords: PPS, personal public service, RSI, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `1234567A`, `9876543AB`, `4567890W` - Known false positives: Seven digits followed by one or two letters may match postal codes, reference numbers, or product codes.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### UK Driving Licence Number >- This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. Detects UK driving licence numbers. GB licences follow a 16-character format encoding surname, date of birth, and gender. Northern Ireland licences are 8-digit numbers. - Slug: `uk-driving-licence` - URL: https://testpattern.dev/patterns/uk-driving-licence - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: uk - Data categories: pii, government-id - Scope: narrow - Risk rating: 6 - Pattern: `\b([A-Z9]{5}\d[0-6]\d[0-3]\d\d[A-Z9]{2}\d[A-Z0-9]{2}|\d{8})\b` - Corroborative keywords: driving licence, driver licence, DL, licence number, license number, DVLA, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `MORGA657054SM9IJ`, `JONES710238JA9AA`, `12345678` - Known false positives: 8-digit numbers matching NI format may be phone numbers, account numbers, or other identifiers ### Ukraine Passport Number (Domestic) Detects Ukraine domestic passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `ua-passport-number-domestic` - URL: https://testpattern.dev/patterns/ua-passport-number-domestic - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: ua - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b\d{6}-\d{5}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `123456-12345`, `987654-98765`, `456789-54321` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Ukraine Passport Number (International) Detects Ukraine international passport number patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `ua-passport-number-international` - URL: https://testpattern.dev/patterns/ua-passport-number-international - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: ua - Data categories: pii, government-id - Scope: narrow - Risk rating: 8 - Pattern: `\b[A-Z]{2}\d{6}\b` - Corroborative keywords: passport, travel document, passport number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `FE123456`, `AB987654`, `XY234567` - Known false positives: Generic alphanumeric sequences matching passport format in unrelated contexts. ### Ukraine Physical Addresses Detects Ukraine Physical Addresses patterns. This pattern is based on a Microsoft Purview built-in sensitive information type that uses machine learning and function-based detection for physical address identification. This keyword list provides address-related terms for supplementary matching. - Slug: `ua-physical-addresses` - URL: https://testpattern.dev/patterns/ua-physical-addresses - Type: keyword_list - Confidence: low - Jurisdictions: ua - Regulations: Personal Data Protection Law (Ukraine) - Data categories: pii, contact-information - Scope: wide - Risk rating: 3 - Example matches: `123 вулиця name, unit 4`, `located at 45 проспект example`, `deliver to 78 бульвар test` - Known false positives: References to street names in non-address contexts such as business names or landmarks; Navigation or mapping references that mention road types without containing actual addresses ### UMID Detects UMID patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `ph-unified-multipurpose-id` - URL: https://testpattern.dev/patterns/ph-unified-multipurpose-id - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: ph - Data categories: pii, government-id - Scope: narrow - Risk rating: 5 - Pattern: `\b\d{4}-\d{7}-\d\b` - Corroborative keywords: UMID, unified multi-purpose, SSS, GSIS, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `1234-5678901-2`, `9876-5432109-8`, `4567-8901234-5` - Known false positives: The dash-separated format (XXXX-XXXXXXX-X) is relatively specific.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Underwriting decision rationales Detects references to underwriting decision rationales in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-130-underwriting-decision-rationales` - URL: https://testpattern.dev/patterns/au-top500-130-underwriting-decision-rationales - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:underwriting\s+decision|decision\s+rationale|risk\s+assessment|underwriting\s+criteria|approval\s+decision|decline\s+reason|risk\s+appetite|underwriting\s+guidelines|credit\s+decision|risk\s+rating)\b` - Corroborative keywords: underwriting decision rationales, underwriting, decision, rationales, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+2 more) - Example matches: `underwriting decision`, `decision rationale`, `risk assessment` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Underwriting decision rationales Detects references to underwriting decision rationales in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-130-underwriting-decision-rationales` - URL: https://testpattern.dev/patterns/global-top500-130-underwriting-decision-rationales - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:underwriting\s+decision|risk\s+assessment|approval\s+rationale|decline\s+reason|risk\s+appetite|underwriting\s+criteria|risk\s+classification|conditional\s+approval|risk\s+rating|loss\s+ratio)\b` - Corroborative keywords: underwriting decision rationales, underwriting, decision, rationales, credit, lending, insurance, financial, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet (+31 more) - Example matches: `underwriting decision`, `risk assessment`, `approval rationale` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Unemployment benefit records Identifies documents containing references to unemployment benefit records in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-383-unemployment-benefit-records` - URL: https://testpattern.dev/patterns/au-top500-383-unemployment-benefit-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:unemployment\s+benefit\s+records|Services\s+Australia|income\s+support|mutual\s+obligations|employment\s+services|social\s+security)\b` - Corroborative keywords: unemployment benefit records, unemployment, benefit, records, government, citizen, services, employee, payroll, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check (+87 more) - Example matches: `unemployment benefit records`, `services australia`, `income support` - Known false positives: Common words and phrases related to unemployment benefit records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Unemployment benefit records Identifies documents containing references to unemployment benefit records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-383-unemployment-benefit-records` - URL: https://testpattern.dev/patterns/global-top500-383-unemployment-benefit-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:unemployment\s+benefit\s+records|unemployment\s+insurance|jobseeker\s+allowance|unemployment\s+claim|benefit\s+payment|employment\s+services|job\s+search\s+requirement|unemployment\s+compensation|benefit\s+period|claimant\s+record|workforce\s+program|reemployment\s+assistance)\b` - Corroborative keywords: unemployment benefit records, employee, payroll, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check, WWCC, Blue Card, criminal history, background check, employment screening, right to work (+81 more) - Example matches: `unemployment benefit records`, `unemployment insurance`, `jobseeker allowance` - Known false positives: Common words and phrases related to unemployment benefit records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Union membership status Identifies documents containing references to union membership status in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-068-union-membership-status` - URL: https://testpattern.dev/patterns/au-top500-068-union-membership-status - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:union\s+membership|trade\s+union|union\s+member|industrial\s+organisation|union\s+delegate|union\s+dues|collective\s+bargaining|union\s+representative|industrial\s+action|union\s+affiliation|member\s+number|union\s+status)\b` - Corroborative keywords: union membership status, union, membership, status, employment, workforce, records, proprietary, intellectual property, trade secret, patent, copyright, trademark, confidential, invention, prototype, algorithm, formula, source code, design document (+37 more) - Example matches: `union membership`, `trade union`, `union member` - Known false positives: Common words and phrases related to union membership status appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Union membership status Identifies documents containing references to union membership status in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-068-union-membership-status` - URL: https://testpattern.dev/patterns/global-top500-068-union-membership-status - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:union\s+membership|trade\s+union|union\s+dues|collective\s+bargaining|union\s+representative|industrial\s+action|union\s+affiliation|labor\s+union|union\s+delegate|enterprise\s+agreement|union\s+member)\b` - Corroborative keywords: union membership status, union, membership, status, employment, workforce, records, proprietary, intellectual property, trade secret, patent, copyright, trademark, confidential, invention, prototype, algorithm, formula, source code, design document (+37 more) - Example matches: `union membership`, `trade union`, `union dues` - Known false positives: Common words and phrases related to union membership status appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Unique Student Identifier Detects Unique Student Identifier (USI) patterns. A 10-character alphanumeric code (uppercase letters and digits) mandatory since January 2023 for higher education in Australia. - Slug: `au-unique-student-identifier` - URL: https://testpattern.dev/patterns/au-unique-student-identifier - Type: regex - Engine: universal - Confidence: low - Detection quality: Partial - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: pii, government-id - Scope: wide - Risk rating: 6 - Pattern: `\b[A-Z0-9]{10}\b` - Corroborative keywords: USI, unique student identifier, student identifier, student, transcript, grade, GPA, enrollment, FERPA, FAFSA, financial aid, tuition, degree - Example matches: `ABC1234567`, `2K48TF3GHP`, `A1B2C3D4E5` - Known false positives: Common words and phrases related to unique student identifier appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Unique Taxpayer Reference Detects Unique Taxpayer Reference patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `uk-unique-taxpayer-reference` - URL: https://testpattern.dev/patterns/uk-unique-taxpayer-reference - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: uk - Data categories: pii, government-id - Scope: narrow - Risk rating: 5 - Pattern: `\b\d{10}\b` - Corroborative keywords: identifier, number, ID, ID number, identification, ID card, license, permit, registration, certificate, transaction, transfer, payment, deposit, withdrawal, debit, credit - Example matches: `1234567890`, `9876543210`, `0123456789` - Known false positives: Long numeric sequences in unrelated contexts (tracking numbers, serial codes) matching the Unique Taxpayer Reference format ### Unpublished research datasets Identifies documents containing references to unpublished research datasets in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-210-unpublished-research-datasets` - URL: https://testpattern.dev/patterns/au-top500-210-unpublished-research-datasets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:unpublished\s+research\s+datasets|unpublished\s+data|research\s+dataset|intellectual\s+property|proprietary\s+research|confidential\s+dataset|raw\s+research\s+data|experimental\s+results)\b` - Corroborative keywords: unpublished research datasets, unpublished, research, datasets, intellectual, property, trade, secrets - Example matches: `unpublished research datasets`, `unpublished data`, `research dataset` - Known false positives: Common words and phrases related to unpublished research datasets appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Unpublished research datasets Identifies documents containing references to unpublished research datasets in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-210-unpublished-research-datasets` - URL: https://testpattern.dev/patterns/global-top500-210-unpublished-research-datasets - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:unpublished\s+research\s+datasets|unpublished\s+data|research\s+dataset|confidential\s+dataset|intellectual\s+property|trade\s+secrets|proprietary\s+data|restricted\s+dataset)\b` - Corroborative keywords: unpublished research datasets, unpublished, research, datasets, intellectual, property, trade, secrets - Example matches: `unpublished research datasets`, `unpublished data`, `research dataset` - Known false positives: Common words and phrases related to unpublished research datasets appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Unpublished thesis data Identifies documents containing references to unpublished thesis data in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-357-unpublished-thesis-data` - URL: https://testpattern.dev/patterns/au-top500-357-unpublished-thesis-data - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:unpublished\s+thesis\s+data|research\s+data|draft\s+manuscript|intellectual\s+property|HDR\s+candidate)\b` - Corroborative keywords: unpublished thesis data, unpublished, thesis, data, education, research, administration - Example matches: `unpublished thesis data`, `research data`, `draft manuscript` - Known false positives: Common words and phrases related to unpublished thesis data appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Unpublished thesis data Identifies documents containing references to unpublished thesis data in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-357-unpublished-thesis-data` - URL: https://testpattern.dev/patterns/global-top500-357-unpublished-thesis-data - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:unpublished\s+thesis|thesis\s+data|dissertation\s+draft|research\s+findings|preliminary\s+results|thesis\s+manuscript|doctoral\s+research|masters\s+thesis|thesis\s+committee|thesis\s+supervisor|embargoed\s+research|unpublished\s+manuscript)\b` - Corroborative keywords: unpublished thesis data, unpublished, thesis, data, education, research, administration - Example matches: `unpublished thesis`, `thesis data`, `dissertation draft` - Known false positives: Common words and phrases related to unpublished thesis data appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Unreleased feature specifications Identifies documents containing references to unreleased feature specifications in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-222-unreleased-feature-specifications` - URL: https://testpattern.dev/patterns/au-top500-222-unreleased-feature-specifications - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:unreleased\s+feature\s+specifications|feature\s+specification|unreleased\s+feature|product\s+roadmap|confidential\s+specification|feature\s+design|product\s+backlog|sprint\s+planning|release\s+candidate)\b` - Corroborative keywords: unreleased feature specifications, unreleased, feature, specifications, product, quality, safety - Example matches: `unreleased feature specifications`, `feature specification`, `unreleased feature` - Known false positives: Common words and phrases related to unreleased feature specifications appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Unreleased feature specifications Identifies documents containing references to unreleased feature specifications in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-222-unreleased-feature-specifications` - URL: https://testpattern.dev/patterns/global-top500-222-unreleased-feature-specifications - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:unreleased\s+feature\s+specifications|feature\s+specification|unreleased\s+feature|product\s+roadmap|quality\s+assurance|safety\s+requirements|feature\s+design|confidential\s+specification|product\s+backlog)\b` - Corroborative keywords: unreleased feature specifications, unreleased, feature, specifications, product, quality, safety - Example matches: `unreleased feature specifications`, `feature specification`, `unreleased feature` - Known false positives: Common words and phrases related to unreleased feature specifications appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Unreleased product architecture Identifies documents containing references to unreleased product architecture in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-220-unreleased-product-architecture` - URL: https://testpattern.dev/patterns/au-top500-220-unreleased-product-architecture - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:unreleased\s+product\s+architecture|product\s+roadmap|unreleased\s+design|system\s+architecture|confidential\s+product|intellectual\s+property|trade\s+secret|product\s+blueprint|technical\s+architecture)\b` - Corroborative keywords: unreleased product architecture, unreleased, product, architecture, intellectual, property, trade, secrets - Example matches: `unreleased product architecture`, `product roadmap`, `unreleased design` - Known false positives: Common words and phrases related to unreleased product architecture appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Unreleased product architecture Identifies documents containing references to unreleased product architecture in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-220-unreleased-product-architecture` - URL: https://testpattern.dev/patterns/global-top500-220-unreleased-product-architecture - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:unreleased\s+product\s+architecture|product\s+architecture|system\s+architecture|intellectual\s+property|trade\s+secrets|proprietary\s+architecture|product\s+roadmap|technical\s+design|confidential\s+product)\b` - Corroborative keywords: unreleased product architecture, unreleased, product, architecture, intellectual, property, trade, secrets - Example matches: `unreleased product architecture`, `product architecture`, `system architecture` - Known false positives: Common words and phrases related to unreleased product architecture appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### URL Detects URL patterns. - Slug: `global-url` - URL: https://testpattern.dev/patterns/global-url - Type: regex - Engine: universal - Confidence: medium - Detection quality: Partial - Jurisdictions: global - Data categories: network, pii - Scope: wide - Pattern: `\bhttps?://[^\s<>"{}|\\^`\[\]]+\b` - Corroborative keywords: identifier, number, ID, address, age, birthday, citizenship, city, date of birth, DOB, email, ethnicity, fax, first name, full name, gender, given name, last name, maiden name, middle name (+38 more) - Example matches: `https://example.com/path`, `http://api.example.com/v1/data`, `https://sub.domain.co.uk/page?q=1` - Known false positives: Common words and phrases related to url appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Us ABA Routing Detects Us ABA Routing patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `us-aba-routing-number` - URL: https://testpattern.dev/patterns/us-aba-routing-number - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: us - Regulations: CCPA/CPRA, FTC Act s5, GLBA, HIPAA, SOX, State Breach Laws (US) - Data categories: financial - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{9}\b` - Corroborative keywords: bank account, account number, account no, BSB, routing number, sort code, IBAN, SWIFT, BIC - Example matches: `021000021`, `011401533`, `091000019` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In American English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### US Individual Taxpayer Identification Number (ITIN) Detects US Individual Taxpayer Identification Numbers (ITINs) issued by the IRS to individuals who are required to have a US taxpayer identification number but are not eligible for a Social Security Number. ITINs always begin with the digit 9, and the fourth and fifth digits fall in the range 70-99, distinguishing them from SSNs. The pattern matches both formatted (9XX-7X-XXXX) and unformatted (9XX7XXXXX) variants. - Slug: `us-individual-taxpayer-id` - URL: https://testpattern.dev/patterns/us-individual-taxpayer-id - Type: regex - Engine: boost_regex - Confidence: high - Detection quality: Mixed - Jurisdictions: us - Regulations: CCPA/CPRA, FTC Act s5, GLBA, HIPAA, SOX, State Breach Laws (US) - Data categories: pii, financial, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b9\d{2}[-\s]?[7-9]\d[-\s]?\d{4}\b` - Corroborative keywords: ITIN, individual taxpayer, taxpayer identification, tax ID, ID number, identification, ID card, license, permit, registration, certificate, transaction, transfer, payment, deposit, withdrawal, debit, credit - Example matches: `912-78-1234`, `912 78 1234`, `912781234` - Known false positives: SSN range overlap for 9xx area numbers that coincidentally have group digits in the 70-99 range ### US Passport Number Detects US passport numbers, which consist of 8 to 9 digits optionally preceded by a single uppercase letter. Older US passports use a 9-digit numeric format, while newer passport books and cards may include a single alpha prefix followed by 8 digits. Due to the relatively simple format, corroborative keyword proximity is strongly recommended to reduce false positives. - Slug: `us-passport-number` - URL: https://testpattern.dev/patterns/us-passport-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Verified - Jurisdictions: us - Regulations: CCPA/CPRA, HIPAA, State Breach Laws (US) - Data categories: pii, government-id - Scope: narrow - Pattern: `\b[A-Z]?\d{8,9}\b` - Corroborative keywords: passport, passport number, passport no, travel document, australian passport, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `A12345678`, `123456789` - Known false positives: Other 8-9 digit numbers such as order IDs, reference codes, phone numbers, and account identifiers; Reference codes and serial numbers with an optional single-letter prefix ### US Social Security Number Detects US Social Security Numbers (SSNs) in both formatted (XXX-XX-XXXX) and unformatted (XXXXXXXXX) representations. The pattern excludes invalid SSN ranges including area numbers 000, 666, and 900-999, group numbers 00, and serial numbers 0000, in accordance with SSA assignment rules. SSNs are critical PII used across healthcare, financial, and government contexts. - Slug: `us-social-security-number` - URL: https://testpattern.dev/patterns/us-social-security-number - Type: regex - Engine: boost_regex - Confidence: high - Detection quality: Verified - Jurisdictions: us - Regulations: CCPA/CPRA, GLBA, HIPAA, SOX - Data categories: pii, phi, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b(?!000|666|9\d{2})\d{3}[-\s](?!00)\d{2}[-\s](?!0000)\d{4}\b` - Corroborative keywords: social security, SSN, social security number, SS#, soc sec, ID number, identification, ID card, license, permit, registration, certificate, address, age, birthday, citizenship, city, date of birth, DOB, email (+21 more) - Example matches: `123-45-6789`, `123 45 6789`, `123456789` - Known false positives: Random nine-digit numbers without context may match the pattern ### User Login Credentials Detects user login credential patterns in documents and configuration files. This pattern is based on a Microsoft Purview built-in sensitive information type. In Purview, this is a broad, function-based detector. This keyword-based version flags documents that may contain login credentials for further review. - Slug: `global-user-login-credentials` - URL: https://testpattern.dev/patterns/global-user-login-credentials - Type: regex - Engine: universal - Confidence: low - Detection quality: Partial - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: wide - Risk rating: 10 - Pattern: `(?i)\b(?:username|user[._-]?name|user[._-]?id|login)\s*[:=]\s*"?[^\s"']{3,}"?\s*[;,\n]\s*(?:password|passwd|pwd)\s*[:=]\s*"?[^\s"';,]{6,}"?` - Corroborative keywords: username, password, login, credential, authentication, sign in, user account, logon, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie (+42 more) - Example matches: `username=admin;password=P@ssw0rd123`, `user_name="testuser" password="TestS3cret"`, `login=root,pwd=000000000000` - Known false positives: Login form descriptions, authentication flow documentation, and security training materials.; Automated test scripts with test account credentials. ### Valuation models Identifies documents containing references to valuation models in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-184-valuation-models` - URL: https://testpattern.dev/patterns/au-top500-184-valuation-models - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:valuation\s+model|valuation\s+models|DCF\s+model|discounted\s+cash\s+flow|enterprise\s+value|equity\s+value|comparable\s+analysis|precedent\s+transactions|terminal\s+value|fair\s+market\s+value|implied\s+valuation)\b` - Corroborative keywords: valuation models, valuation, models, mergers, acquisitions, strategy - Example matches: `valuation model`, `valuation models`, `DCF model` - Known false positives: Common words and phrases related to valuation models appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Valuation models Identifies documents containing references to valuation models in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-184-valuation-models` - URL: https://testpattern.dev/patterns/global-top500-184-valuation-models - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:valuation\s+model|discounted\s+cash\s+flow|DCF\s+analysis|enterprise\s+value|equity\s+value|comparable\s+transactions|precedent\s+transactions|terminal\s+value|fairness\s+opinion|implied\s+valuation)\b` - Corroborative keywords: valuation models, valuation, models, mergers, acquisitions, strategy - Example matches: `valuation model`, `discounted cash flow`, `DCF analysis` - Known false positives: Common words and phrases related to valuation models appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Vehicle Identification Number Detects Vehicle Identification Number patterns. Excludes I, O, Q characters - Slug: `global-vin` - URL: https://testpattern.dev/patterns/global-vin - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Data categories: device-id - Scope: specific - Risk rating: 6 - Pattern: `\b[A-HJ-NPR-Z0-9]{17}\b` - Corroborative keywords: device, identifier, serial number, hardware, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+19 more) - Example matches: `1HGBH41JXMN109186`, `WVWZZZ3CZWE123456`, `5YJSA1E26MF123456` - Known false positives: Technical identifiers appearing in public documentation, network configuration guides, or example configurations without representing actual infrastructure.; Placeholder and example values commonly used in technical tutorials and vendor documentation. ### Vehicle registration details Identifies documents containing references to vehicle registration details in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-050-vehicle-registration-details` - URL: https://testpattern.dev/patterns/au-top500-050-vehicle-registration-details - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:vehicle\s+registration\s+details|vehicle\s+registration|registration\s+number|number\s+plate|licence\s+plate|vehicle\s+identification\s+number|registered\s+owner|motor\s+vehicle|transport\s+authority)\b` - Corroborative keywords: vehicle registration details, vehicle, registration, details, contact, location, data, ID number, identification, ID card, license, permit, certificate, field, column, row, entry, record, value, form (+22 more) - Example matches: `vehicle registration details`, `vehicle registration`, `registration number` - Known false positives: Common words and phrases related to vehicle registration details appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Vehicle registration details Identifies documents containing references to vehicle registration details in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-050-vehicle-registration-details` - URL: https://testpattern.dev/patterns/global-top500-050-vehicle-registration-details - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:vehicle\s+registration\s+details|vehicle\s+registration|registration\s+number|license\s+plate|number\s+plate|vehicle\s+identification|registration\s+certificate|motor\s+vehicle|registered\s+owner|vehicle\s+record|plate\s+number)\b` - Corroborative keywords: vehicle registration details, vehicle, registration, details, contact, location, data, ID number, identification, ID card, license, permit, certificate, field, column, row, entry, record, value, form (+22 more) - Example matches: `vehicle registration details`, `vehicle registration`, `registration number` - Known false positives: Common words and phrases related to vehicle registration details appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Vehicle title and transfer records Identifies documents containing references to vehicle title and transfer records in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-394-vehicle-title-and-transfer-records` - URL: https://testpattern.dev/patterns/au-top500-394-vehicle-title-and-transfer-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:vehicle\s+title\s+and\s+transfer\s+records|motor\s+vehicle|transport\s+authority|ownership\s+transfer)\b` - Corroborative keywords: vehicle title and transfer records, vehicle, title, transfer, records, government, citizen, services, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record (+24 more) - Example matches: `vehicle title and transfer records`, `motor vehicle`, `transport authority` - Known false positives: Common words and phrases related to vehicle title and transfer records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Vehicle title and transfer records Identifies documents containing references to vehicle title and transfer records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-394-vehicle-title-and-transfer-records` - URL: https://testpattern.dev/patterns/global-top500-394-vehicle-title-and-transfer-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:vehicle\s+title\s+and\s+transfer\s+records|vehicle\s+registration|title\s+transfer|vehicle\s+identification\s+number|registered\s+owner|motor\s+vehicle|registration\s+certificate|transfer\s+of\s+ownership|vehicle\s+inspection|roadworthy\s+certificate|license\s+plate|odometer\s+disclosure)\b` - Corroborative keywords: vehicle title and transfer records, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract, export, spreadsheet (+17 more) - Example matches: `vehicle title and transfer records`, `vehicle registration`, `title transfer` - Known false positives: Common words and phrases related to vehicle title and transfer records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Vendor master records Identifies documents containing references to vendor master records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-141-vendor-master-records` - URL: https://testpattern.dev/patterns/au-top500-141-vendor-master-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:vendor\s+master|vendor\s+record|supplier\s+master|vendor\s+management|vendor\s+code|vendor\s+registration|accounts\s+payable|payment\s+terms|vendor\s+bank\s+details|approved\s+vendor\s+list)\b` - Corroborative keywords: vendor master records, vendor, master, records, procurement, supplier, management - Example matches: `vendor master`, `vendor record`, `supplier master` - Known false positives: Common words and phrases related to vendor master records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Vendor master records Identifies documents containing references to vendor master records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-141-vendor-master-records` - URL: https://testpattern.dev/patterns/global-top500-141-vendor-master-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:vendor\s+master|vendor\s+record|supplier\s+master\s+data|vendor\s+onboarding|vendor\s+code|payment\s+terms|vendor\s+classification|accounts\s+payable|vendor\s+bank\s+details|remittance\s+address|vendor\s+registration|ERP\s+vendor)\b` - Corroborative keywords: vendor master records, vendor, master, records, procurement, supplier, management - Example matches: `vendor master`, `vendor record`, `supplier master data` - Known false positives: Common words and phrases related to vendor master records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Vendor privacy due diligence reports Identifies documents containing references to vendor privacy due diligence reports in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-469-vendor-privacy-due-diligence-reports` - URL: https://testpattern.dev/patterns/au-top500-469-vendor-privacy-due-diligence-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:vendor\s+privacy\s+due\s+diligence\s+reports|vendor\s+assessment|due\s+diligence|third[\s-]+party\s+risk|supplier\s+privacy|data\s+processing\s+agreement|privacy\s+maturity|security\s+posture|vendor\s+management)\b` - Corroborative keywords: vendor privacy due diligence reports, vendor, privacy, due, diligence, reports, compliance, risk, merger, acquisition, takeover, due diligence, scheme of arrangement, material non-public information, MNPI, inside information, price sensitive, price sensitive information - Example matches: `vendor privacy due diligence reports`, `vendor assessment`, `due diligence` - Known false positives: Common words and phrases related to vendor privacy due diligence reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Vendor privacy due diligence reports Identifies documents containing references to vendor privacy due diligence reports in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-469-vendor-privacy-due-diligence-reports` - URL: https://testpattern.dev/patterns/global-top500-469-vendor-privacy-due-diligence-reports - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:vendor\s+privacy|due\s+diligence|third\s+party\s+assessment|vendor\s+risk|privacy\s+questionnaire|data\s+processing\s+agreement|security\s+assessment|privacy\s+compliance|supply\s+chain\s+risk|vendor\s+audit|privacy\s+maturity)\b` - Corroborative keywords: vendor privacy due diligence reports, vendor, privacy, due, diligence, reports, compliance, risk, merger, acquisition, takeover, due diligence, scheme of arrangement, material non-public information, MNPI, inside information, price sensitive, price sensitive information, field, column (+27 more) - Example matches: `vendor privacy`, `due diligence`, `third party assessment` - Known false positives: Common words and phrases related to vendor privacy due diligence reports appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Vendor Risk Assessment Detects vendor risk assessments revealing third-party security posture and supply chain vulnerabilities. - Slug: `au-vendor-risk-assessment` - URL: https://testpattern.dev/patterns/au-vendor-risk-assessment - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: IPA 2009 (Qld), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: security, governance - Scope: narrow - Risk rating: 7 - Example matches: `Vendor risk assessment: third-party risk and vendor due diligence`, `Supply chain risk review with vendor security questionnaire results`, `Vendor management program: vendor assessment and outsourcing risk evaluation` - Known false positives: Generic vendor references in non-risk contexts. ### Victim impact statements Identifies documents containing references to victim impact statements in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-418-victim-impact-statements` - URL: https://testpattern.dev/patterns/au-top500-418-victim-impact-statements - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:victim\s+impact\s+statements|victim\s+impact|victim\s+statement|victim\s+support|victim\s+compensation|sentencing\s+submission|crime\s+victim|victim\s+services|impact\s+assessment|victim\s+advocate|restorative\s+justice|victims\s+of\s+crime)\b` - Corroborative keywords: victim impact statements, victim, impact, statements, law, enforcement, justice, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+31 more) - Example matches: `victim impact statements`, `victim impact`, `victim statement` - Known false positives: Common words and phrases related to victim impact statements appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Victim impact statements Identifies documents containing references to victim impact statements in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-418-victim-impact-statements` - URL: https://testpattern.dev/patterns/global-top500-418-victim-impact-statements - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:victim\s+impact|victim\s+statement|victim\s+testimony|victim\s+advocate|victim\s+services|victim\s+notification|victim\s+restitution|victim\s+rights|harm\s+statement|sentencing\s+statement|victim\s+compensation|victim\s+support)\b` - Corroborative keywords: victim impact statements - Example matches: `victim impact`, `victim statement`, `victim testimony` - Known false positives: Common words and phrases related to victim impact statements appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Visa grant number Identifies documents containing references to visa grant number in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-032-visa-grant-number` - URL: https://testpattern.dev/patterns/au-top500-032-visa-grant-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `\b\d{13}\b` - Corroborative keywords: visa grant number, visa, grant, number, government, ids, civil, status, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record (+23 more) - Example matches: `Visa grant number`, `visa grant number`, `Visa grant number` - Known false positives: Common words and phrases related to visa grant number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Visa grant number Identifies documents containing references to visa grant number in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-032-visa-grant-number` - URL: https://testpattern.dev/patterns/global-top500-032-visa-grant-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Risk rating: 8 - Pattern: `(?is)\b(?:visa\s+grant\s+number|visa\s+grant|grant\s+number|visa\s+number|visa\s+reference|visa\s+approval|travel\s+visa|visa\s+subclass|visa\s+holder|entry\s+visa|visa\s+status|immigration\s+visa)\b` - Corroborative keywords: visa grant number, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract, export, spreadsheet (+17 more) - Example matches: `visa grant number`, `visa grant`, `grant number` - Known false positives: Common words and phrases related to visa grant number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Voiceprints Identifies documents containing references to voiceprints in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-011-voiceprints` - URL: https://testpattern.dev/patterns/au-top500-011-voiceprints - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:voice\s+recognition|voice\s+biometric|voice\s+template|voice\s+authentication|speaker\s+recognition|voice\s+sample|voice\s+pattern|voice\s+ID|vocal\s+biometric)\b` - Corroborative keywords: voiceprints, personal, identity, demographics, voiceprint, voice recognition, voice template, iris template, iris scan, retina scan, retinal scan, eye scan, field, column, row, entry, record, value, form, register (+21 more) - Example matches: `voice recognition`, `voice biometric`, `voice template` - Known false positives: Common words and phrases related to voiceprints appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Voiceprints Identifies documents containing references to voiceprints in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-011-voiceprints` - URL: https://testpattern.dev/patterns/global-top500-011-voiceprints - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:voice\s+recognition|voice\s+biometric|voice\s+template|speaker\s+recognition|voice\s+sample|voice\s+authentication|vocal\s+pattern|speech\s+recognition|voice\s+enrollment|voice\s+signature)\b` - Corroborative keywords: voiceprints, personal, identity, demographics, voiceprint, voice recognition, voice template, iris template, iris scan, retina scan, retinal scan, eye scan, field, column, row, entry, record, value, form, register (+21 more) - Example matches: `voice recognition`, `voice biometric`, `voice template` - Known false positives: Common words and phrases related to voiceprints appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Volatile memory captures Identifies volatile memory captures patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-298-volatile-memory-captures` - URL: https://testpattern.dev/patterns/au-top500-298-volatile-memory-captures - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: Criminal Code Act 1995 (Cth), Evidence Act 1977 (Qld) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:memory\s+dump|volatile\s+memory|ram\s+capture|hiberfil)\b` - Corroborative keywords: volatile memory captures, volatile, memory, captures, security, operations, threat, data - Example matches: `Volatile memory captures`, `volatile memory captures`, `Volatile memory captures` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Volatile memory captures Identifies volatile memory captures patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-298-volatile-memory-captures` - URL: https://testpattern.dev/patterns/global-top500-298-volatile-memory-captures - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:memory\s+dump|volatile\s+memory|ram\s+capture|hiberfil)\b` - Corroborative keywords: volatile memory captures, volatile, memory, captures, security, operations, threat, data - Example matches: `Volatile memory captures`, `volatile memory captures`, `Volatile memory captures` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Voter registration number Identifies documents containing references to voter registration number in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-026-voter-registration-number` - URL: https://testpattern.dev/patterns/au-top500-026-voter-registration-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:voter\s+registration\s+number)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: voter registration number, voter, registration, number, government, ids, civil, status, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+30 more) - Example matches: `Voter registration number`, `voter registration number`, `Voter registration number` - Known false positives: Common words and phrases related to voter registration number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Voter registration number Identifies documents containing references to voter registration number in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-026-voter-registration-number` - URL: https://testpattern.dev/patterns/global-top500-026-voter-registration-number - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:voter\s+registration\s+number)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: voter registration number, ID, identifier, number, reference, code, index, serial, account, file number, case number, record number, ref, field, column, row, entry, record, value, form (+10 more) - Example matches: `structured record with identifier and contextual anchors` - Known false positives: Common words and phrases related to voter registration number appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Voter roll extract files Identifies documents containing references to voter roll extract files in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-481-voter-roll-extract-files` - URL: https://testpattern.dev/patterns/au-top500-481-voter-roll-extract-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:voter\s+roll\s+extract\s+files)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: voter roll extract files, voter, roll, extract, files, elections, diplomacy, statecraft, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant (+31 more) - Example matches: `Voter roll extract files`, `voter roll extract files`, `Voter roll extract files` - Known false positives: Common words and phrases related to voter roll extract files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Voter roll extract files Identifies documents containing references to voter roll extract files in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-481-voter-roll-extract-files` - URL: https://testpattern.dev/patterns/global-top500-481-voter-roll-extract-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:voter\s+roll\s+extract\s+files)\b\s{0,80}\b[A-Z0-9][A-Z0-9\-/ ]{4,24}\b` - Corroborative keywords: voter roll extract files, ID, identifier, number, reference, code, index, serial, account, file number, case number, record number, ref, field, column, row, entry, record, value, form (+10 more) - Example matches: `structured record with identifier and contextual anchors` - Known false positives: Common words and phrases related to voter roll extract files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Vulnerability Assessment Report Detects vulnerability assessment reports containing CVE details and unpatched system findings. - Slug: `au-vulnerability-assessment-report` - URL: https://testpattern.dev/patterns/au-vulnerability-assessment-report - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: Criminal Code Act 1995 (Cth), SOCI Act 2018 (Cth) - Data categories: security - Scope: narrow - Risk rating: 9 - Example matches: `Vulnerability assessment report: CVE-2025-1234 with CVSS score 9.8 critical`, `Vulnerability scan findings: unpatched systems and remediation priority list`, `Vulnerability management: critical vulnerability finding with patch status review` - Known false positives: Non-technical use of vulnerability. ### Vulnerability scan outputs Identifies vulnerability scan outputs patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-286-vulnerability-scan-outputs` - URL: https://testpattern.dev/patterns/au-top500-286-vulnerability-scan-outputs - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: Criminal Code Act 1995 (Cth), SOCI Act 2018 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:vulnerability\s+scan\s+outputs|vulnerability\s+scan|cvss\s+score|severity\s+rating|security\s+assessment|penetration\s+test)\b` - Corroborative keywords: vulnerability scan outputs, vulnerability, scan, outputs, security, operations, threat, data - Example matches: `vulnerability scan outputs`, `vulnerability scan`, `cvss score` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Vulnerability scan outputs Identifies vulnerability scan outputs patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-286-vulnerability-scan-outputs` - URL: https://testpattern.dev/patterns/global-top500-286-vulnerability-scan-outputs - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:vulnerability\s+scan|severity\s+rating|vulnerability\s+assessment|scan\s+report|patch\s+status|risk\s+score)\b` - Corroborative keywords: vulnerability scan outputs, vulnerability, scan, outputs, security, operations, threat, data - Example matches: `vulnerability scan`, `severity rating`, `vulnerability assessment` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Wage garnishment orders Detects references to wage garnishment orders in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-087-wage-garnishment-orders` - URL: https://testpattern.dev/patterns/au-top500-087-wage-garnishment-orders - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:wage\s+garnishment\s+orders|garnishee\s+notice|court\s+order|child\s+support|centrelink\s+debt|tax\s+debt\s+recovery|attachment\s+of\s+earnings|compulsory\s+deduction|Services\s+Australia|Fair\s+Work|garnishee\s+order)\b` - Corroborative keywords: wage garnishment orders, wage, garnishment, orders, payroll, tax, operations, employee, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check, WWCC (+73 more) - Example matches: `wage garnishment orders`, `garnishee notice`, `court order` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Wage garnishment orders Detects references to wage garnishment orders in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-087-wage-garnishment-orders` - URL: https://testpattern.dev/patterns/global-top500-087-wage-garnishment-orders - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:wage\s+garnishment\s+orders|wage\s+garnishment|garnishee\s+notice|court\s+order|child\s+support\s+order|debt\s+recovery|attachment\s+of\s+earnings|statutory\s+deduction|writ\s+of\s+execution|garnishment\s+amount|disposable\s+earnings)\b` - Corroborative keywords: wage garnishment orders, wage, garnishment, orders, payroll, tax, operations, employee, benefits, termination, hire date, salary, compensation, 401k, W-2, I-9, superannuation, police check, working with children check, WWCC (+85 more) - Example matches: `wage garnishment orders`, `wage garnishment`, `garnishee notice` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### War-gaming simulation outputs Identifies documents containing references to war-gaming simulation outputs in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-435-war-gaming-simulation-outputs` - URL: https://testpattern.dev/patterns/au-top500-435-war-gaming-simulation-outputs - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:war\s+gaming|simulation\s+output|tabletop\s+exercise|scenario\s+analysis|defense\s+simulation|operational\s+planning|threat\s+modeling|national\s+security|classified\s+simulation|military\s+exercise)\b` - Corroborative keywords: war-gaming simulation outputs, war, gaming, simulation, outputs, defense, intelligence, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+2 more) - Example matches: `war gaming`, `simulation output`, `tabletop exercise` - Known false positives: Common words and phrases related to war-gaming simulation outputs appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### War-gaming simulation outputs Identifies documents containing references to war-gaming simulation outputs in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-435-war-gaming-simulation-outputs` - URL: https://testpattern.dev/patterns/global-top500-435-war-gaming-simulation-outputs - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:war\s+gaming|simulation\s+output|tabletop\s+exercise|scenario\s+analysis|combat\s+simulation|operational\s+scenario|campaign\s+analysis|wargame\s+results|strategic\s+simulation|threat\s+modeling)\b` - Corroborative keywords: war-gaming simulation outputs - Example matches: `war gaming`, `simulation output`, `tabletop exercise` - Known false positives: Common words and phrases related to war-gaming simulation outputs appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Warranty claim analytics Identifies documents containing references to warranty claim analytics in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-236-warranty-claim-analytics` - URL: https://testpattern.dev/patterns/au-top500-236-warranty-claim-analytics - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:warranty\s+claim|claim\s+analytics|warranty\s+data|return\s+rate|defect\s+rate|claim\s+frequency|warranty\s+cost|product\s+warranty|consumer\s+guarantee|claim\s+trend)\b` - Corroborative keywords: warranty claim analytics, warranty, claim, analytics, product, quality, safety - Example matches: `warranty claim`, `claim analytics`, `warranty data` - Known false positives: Common words and phrases related to warranty claim analytics appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Warranty claim analytics Identifies documents containing references to warranty claim analytics in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-236-warranty-claim-analytics` - URL: https://testpattern.dev/patterns/global-top500-236-warranty-claim-analytics - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:warranty\s+claim|claim\s+analytics|warranty\s+data|return\s+rate|defect\s+rate|warranty\s+cost|claim\s+frequency|product\s+return|warranty\s+period|failure\s+trend)\b` - Corroborative keywords: warranty claim analytics, warranty, claim, analytics, product, quality, safety - Example matches: `warranty claim`, `claim analytics`, `warranty data` - Known false positives: Common words and phrases related to warranty claim analytics appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Water Quality Data Reference Detects references to water quality monitoring data, compliance reports, and environmental water testing results. - Slug: `au-water-quality-data-reference` - URL: https://testpattern.dev/patterns/au-water-quality-data-reference - Type: keyword_list - Confidence: medium - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: environmental, infrastructure - Scope: narrow - Risk rating: 5 - Example matches: `Water quality report: turbidity within ADWG limits`, `Water testing results show E. coli below threshold`, `Catchment data and water monitoring compliance review` - Known false positives: Generic references to water or quality in non-monitoring contexts. ### Water treatment dosing formulas Identifies documents containing references to water treatment dosing formulas in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-446-water-treatment-dosing-formulas` - URL: https://testpattern.dev/patterns/au-top500-446-water-treatment-dosing-formulas - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:water\s+treatment|dosing\s+formula|chlorine\s+dosage|treatment\s+plant|critical\s+infrastructure|potable\s+water|water\s+quality|pH\s+setpoint)\b` - Corroborative keywords: water treatment dosing formulas, water, treatment, dosing, formulas, critical, infrastructure, systems, turbidity, residual chlorine, E.coli, Escherichia coli, ADWG, Australian Drinking Water Guidelines, catchment, water quality, water treatment, wastewater, sewage, dam level (+1 more) - Example matches: `water treatment`, `dosing formula`, `chlorine dosage` - Known false positives: Common words and phrases related to water treatment dosing formulas appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Water treatment dosing formulas Identifies documents containing references to water treatment dosing formulas in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-446-water-treatment-dosing-formulas` - URL: https://testpattern.dev/patterns/global-top500-446-water-treatment-dosing-formulas - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:water\s+treatment|dosing\s+formula|chlorine\s+dosage|pH\s+setpoint|chemical\s+dosing|treatment\s+plant|potable\s+water|residual\s+chlorine)\b` - Corroborative keywords: water treatment dosing formulas, water, treatment, dosing, formulas, critical, infrastructure, systems, turbidity, residual chlorine, E.coli, Escherichia coli, ADWG, Australian Drinking Water Guidelines, catchment, water quality, water treatment, wastewater, sewage, dam level (+30 more) - Example matches: `water treatment`, `dosing formula`, `chlorine dosage` - Known false positives: Common words and phrases related to water treatment dosing formulas appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Weapons system vulnerability data Identifies documents containing references to weapons system vulnerability data in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-430-weapons-system-vulnerability-data` - URL: https://testpattern.dev/patterns/au-top500-430-weapons-system-vulnerability-data - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:weapons\s+system\s+vulnerability|vulnerability\s+assessment|exploit\s+analysis|armament\s+weakness|defense\s+vulnerability|weapons\s+system|threat\s+assessment|classified\s+vulnerability|penetration\s+testing|defense\s+intelligence|national\s+security|system\s+weakness)\b` - Corroborative keywords: weapons system vulnerability data, weapons, system, vulnerability, data, defense, intelligence, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+2 more) - Example matches: `weapons system vulnerability`, `vulnerability assessment`, `exploit analysis` - Known false positives: Common words and phrases related to weapons system vulnerability data appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Welfare eligibility determinations Identifies documents containing references to welfare eligibility determinations in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-382-welfare-eligibility-determinations` - URL: https://testpattern.dev/patterns/au-top500-382-welfare-eligibility-determinations - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:welfare\s+eligibility\s+determinations|Services\s+Australia|income\s+support|means\s+test|social\s+security)\b` - Corroborative keywords: welfare eligibility determinations, welfare, eligibility, determinations, government, citizen, services, agency, department, ministry, public sector, civil service, social services, public administration, statutory authority, regulatory body, public servant, government program, public benefit, constituency (+29 more) - Example matches: `welfare eligibility determinations`, `services australia`, `income support` - Known false positives: Common words and phrases related to welfare eligibility determinations appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Welfare eligibility determinations Identifies documents containing references to welfare eligibility determinations in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-382-welfare-eligibility-determinations` - URL: https://testpattern.dev/patterns/global-top500-382-welfare-eligibility-determinations - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:welfare\s+eligibility\s+determinations|eligibility\s+assessment|welfare\s+benefits|means\s+test|income\s+support|social\s+assistance|benefit\s+determination|welfare\s+application|eligibility\s+criteria|welfare\s+recipient|benefit\s+entitlement|social\s+welfare)\b` - Corroborative keywords: welfare eligibility determinations - Example matches: `welfare eligibility determinations`, `eligibility assessment`, `welfare benefits` - Known false positives: Common words and phrases related to welfare eligibility determinations appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Whistleblower identity records Identifies documents containing references to whistleblower identity records in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-065-whistleblower-identity-records` - URL: https://testpattern.dev/patterns/au-top500-065-whistleblower-identity-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:whistleblower\s+identity|protected\s+disclosure|public\s+interest\s+disclosure|whistleblower\s+protection|discloser\s+identity|confidential\s+disclosure|qualifying\s+disclosure|whistleblower\s+report|PID\s+Act|eligible\s+whistleblower|reportable\s+conduct)\b` - Corroborative keywords: whistleblower identity records, whistleblower, identity, records, employment, workforce - Example matches: `whistleblower identity`, `protected disclosure`, `public interest disclosure` - Known false positives: Common words and phrases related to whistleblower identity records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Whistleblower identity records Identifies documents containing references to whistleblower identity records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-065-whistleblower-identity-records` - URL: https://testpattern.dev/patterns/global-top500-065-whistleblower-identity-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:protected\s+disclosure|anonymous\s+report|confidential\s+informant|whistleblower\s+protection|disclosure\s+report|reporting\s+person|ethics\s+hotline|whistleblower\s+identity|complainant\s+identity)\b` - Corroborative keywords: whistleblower identity records, whistleblower, identity, records, employment, workforce - Example matches: `protected disclosure`, `anonymous report`, `confidential informant` - Known false positives: Common words and phrases related to whistleblower identity records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Whistleblower protection case records Identifies documents containing references to whistleblower protection case records in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-497-whistleblower-protection-case-records` - URL: https://testpattern.dev/patterns/au-top500-497-whistleblower-protection-case-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:whistleblower\s+protection|public\s+interest\s+disclosure|PID\s+Act|whistleblower\s+case|protected\s+disclosure|discloser\s+protection|reprisal\s+protection|Commonwealth\s+Ombudsman|qualifying\s+disclosure|whistleblower\s+complaint|Corporations\s+Act)\b` - Corroborative keywords: whistleblower protection case records, whistleblower, protection, case, records, elections, diplomacy, statecraft, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant (+32 more) - Example matches: `whistleblower protection`, `public interest disclosure`, `PID Act` - Known false positives: Common words and phrases related to whistleblower protection case records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Whistleblower protection case records Identifies documents containing references to whistleblower protection case records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-497-whistleblower-protection-case-records` - URL: https://testpattern.dev/patterns/global-top500-497-whistleblower-protection-case-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:whistleblower\s+protection\s+case\s+records|whistleblower\s+protection|protected\s+disclosure|public\s+interest\s+disclosure|complainant\s+identity|anonymous\s+report|integrity\s+commission|disclosure\s+officer|reprisal\s+protection|whistleblowing\s+scheme)\b` - Corroborative keywords: whistleblower protection case records - Example matches: `whistleblower protection case records`, `whistleblower protection`, `protected disclosure` - Known false positives: Common words and phrases related to whistleblower protection case records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Whole-of-Government ERP Payment Authorisation File Detects bulk payment authorisation files extracted from government ERP systems (SAP, Oracle, TechnologyOne) containing payee bank accounts, payment amounts, and authorisation codes for batch processing. - Slug: `whole-of-government-erp-payment-authorisation-file` - URL: https://testpattern.dev/patterns/whole-of-government-erp-payment-authorisation-file - Type: regex - Engine: universal - Confidence: high - Detection quality: Error - Jurisdictions: au - Regulations: Financial Accountability Act 2009 (Qld) - Data categories: financial, government - Scope: wide - Risk rating: 8 - Pattern: `^0\s*.{17}\d{3}-\d{3}` - Corroborative keywords: payment file, ABA file, BECS, direct entry, batch payment, EFT file, authorised, approved, certified, released for payment, SAP, Oracle, TechnologyOne, ERP, payment run, remittance, financial, fiscal, monetary, accounting (+26 more) - Example matches: `PROTECTED — ERP Payment Authorisation File. Source: SAP Payment Run PR-2026-0451. Batch payment file (ABA format) authorised for processing. Contains 1,247 payment records totalling $34,567,890.45. BSB/Account details for all payees included. Dual authorisation: Approved by J. Smith and B. Williams. Released for BECS direct entry.`, `0 064-000Department of Health 0123456Payment File 280226 1064-000 12345678 530000003450000Employee Payment J Smith 064-000 98765432 1084-004 87654321 530000004520000Employee Payment M Jones 084-004 11223344` - Known false positives: Individual payment requests and purchase order approvals; ABA/BECS file format specifications and training documentation ### Wire transfer instructions Detects references to wire transfer instructions in financial and compliance documents. Commonly found in Australian regulatory filings, transaction records, and audit documentation. - Slug: `au-top500-116-wire-transfer-instructions` - URL: https://testpattern.dev/patterns/au-top500-116-wire-transfer-instructions - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth), SOCI Act 2018 (Cth) - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:wire\s+transfer|telegraphic\s+transfer|beneficiary\s+account|correspondent\s+bank|international\s+transfer|funds\s+transfer|remitting\s+bank|wire\s+instruction|payment\s+order)\b` - Corroborative keywords: wire transfer instructions, wire, transfer, instructions, financial, accounts, payments, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet, profit and loss (+1 more) - Example matches: `wire transfer`, `telegraphic transfer`, `beneficiary account` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In Australian English, standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Wire transfer instructions Detects references to wire transfer instructions in financial and compliance documents. Commonly found in international regulatory filings, transaction records, and audit documentation. - Slug: `global-top500-116-wire-transfer-instructions` - URL: https://testpattern.dev/patterns/global-top500-116-wire-transfer-instructions - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR, PCI-DSS - Data categories: financial - Scope: wide - Pattern: `(?is)\b(?:wire\s+transfer|SWIFT\s+code|beneficiary\s+bank|routing\s+number|correspondent\s+bank|intermediary\s+bank|bank\s+account|transfer\s+instructions|wire\s+payment|funds\s+transfer|ABA\s+number)\b` - Corroborative keywords: wire transfer instructions, wire, transfer, instructions, financial, accounts, payments, fiscal, monetary, accounting, treasury, audit, revenue, expenditure, budget, ledger, accounts payable, accounts receivable, balance sheet, profit and loss (+30 more) - Example matches: `wire transfer`, `swift code`, `beneficiary bank` - Known false positives: Financial terminology appearing in published reports, accounting textbooks, regulatory guidance, or template documents without actual transaction data.; In English (as the primary international business language), standard business terminology overlapping with financial detection keywords in routine correspondence and documentation. ### Witness identity records Identifies documents containing references to witness identity records in Australian contexts. This information type is classified as personally identifiable information under the Privacy Act 1988. - Slug: `au-top500-404-witness-identity-records` - URL: https://testpattern.dev/patterns/au-top500-404-witness-identity-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), IPA 2009 (Qld), NDB Scheme (Cth), Privacy Act 1988 (Cth) - Data categories: government-id, pii - Scope: wide - Pattern: `(?is)\b(?:witness\s+identity\s+records|witness\s+protection|witness\s+statement|protected\s+witness|witness\s+details|court\s+witness|identity\s+protection|law\s+enforcement|justice\s+records|witness\s+interview)\b` - Corroborative keywords: witness identity records, witness, identity, records, law, enforcement, justice, government, agency, department, ministry, public sector, civil service, welfare, social services, public administration, statutory authority, regulatory body, public servant, government program (+31 more) - Example matches: `witness identity records`, `witness protection`, `witness statement` - Known false positives: Common words and phrases related to witness identity records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Witness identity records Identifies documents containing references to witness identity records in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-404-witness-identity-records` - URL: https://testpattern.dev/patterns/global-top500-404-witness-identity-records - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:witness\s+identity|witness\s+protection|witness\s+statement|witness\s+name|witness\s+address|protected\s+witness|witness\s+relocation|witness\s+testimony|witness\s+interview|witness\s+deposition)\b` - Corroborative keywords: witness identity records - Example matches: `witness identity`, `witness protection`, `witness statement` - Known false positives: Common words and phrases related to witness identity records appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Witness Protection Program Record Detects documents containing witness protection program records including new identities, relocation details, and safe house locations for protected witnesses. Disclosure directly endangers the lives of witnesses and their families who have testified against violent criminals. - Slug: `witness-protection-program-record` - URL: https://testpattern.dev/patterns/witness-protection-program-record - Type: keyword_proximity - Engine: universal - Confidence: high - Jurisdictions: au - Regulations: PPRA 2000 (Qld), Witness Protection Act 2000 (Qld) - Data categories: law-enforcement, government - Scope: wide - Risk rating: 10 - Pattern: `(?i)\b(witness\s+protection|protected\s+witness|relocation\s+plan|safe\s+house\s+location|new\s+identity\s+(?:document|program|package)|Witness\s+Protection\s+Act)\b` - Corroborative keywords: PROTECTED, Law-Enforcement, WITNESS PROTECTION, Witness Protection Act 2000, relocation, new identity, safe house, assumed name, protected person, protection order, threat assessment, QPS, Queensland Police, identity documents, drivers licence, Medicare card, birth certificate, investigation, enforcement, prosecution (+54 more) - Example matches: `PROTECTED — WITNESS PROTECTION. Record of protected witness relocation. Protected person: formerly known as Sandra Marie BLAKE. New identity documents issued under Witness Protection Act 2000 (Qld) s.10. Relocation plan: interstate transfer to safe house location designated WP-2024-0087.`, `Witness Protection Program — Threat Assessment Update. Subject remains at HIGH risk from associates of convicted drug trafficker Raymond COSTELLO. Safe house location reviewed and deemed secure. New identity integration progressing; protected witness has commenced employment under assumed name.`, `Memorandum to QPS Witness Protection Unit. Re: Application for inclusion in witness protection program. The witness provided evidence in Operation MERCURY resulting in the conviction of three members of the organised crime syndicate. Relocation plan prepared. New identity package includes Queensland drivers licence, Medicare card, and bank accounts.` - Known false positives: News reporting about witness protection programs in general terms; Legislative and policy documents discussing the Witness Protection Act framework; Crime fiction and films featuring witness protection storylines ### Work email address Identifies documents containing references to work email address in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-045-work-email-address` - URL: https://testpattern.dev/patterns/au-top500-045-work-email-address - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:work\s+email\s+address|work\s+email|corporate\s+email|business\s+email|office\s+email|company\s+email|professional\s+email|organisational\s+email|employer\s+email|staff\s+email|employee\s+email|workplace\s+contact)\b` - Corroborative keywords: work email address, work, email, address, contact, location, data, age, birthday, citizenship, city, date of birth, DOB, ethnicity, fax, first name, full name, gender, given name, last name (+58 more) - Example matches: `work email address`, `work email`, `corporate email` - Known false positives: Common words and phrases related to work email address appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Work email address Identifies documents containing references to work email address in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-045-work-email-address` - URL: https://testpattern.dev/patterns/global-top500-045-work-email-address - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:work\s+email\s+address|work\s+email|corporate\s+email|business\s+email|company\s+email|office\s+email|professional\s+email|employer\s+email|organizational\s+email|work\s+contact|staff\s+email|employee\s+email)\b` - Corroborative keywords: work email address, work, email, address, contact, location, data, age, birthday, citizenship, city, date of birth, DOB, ethnicity, fax, first name, full name, gender, given name, last name (+58 more) - Example matches: `work email address`, `work email`, `corporate email` - Known false positives: Common words and phrases related to work email address appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Workplace investigation files Identifies documents containing references to workplace investigation files in Australian contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `au-top500-079-workplace-investigation-files` - URL: https://testpattern.dev/patterns/au-top500-079-workplace-investigation-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: AML/CTF Act (Cth), HRIPA (Cth), IPA 2009 (Qld), My Health Records Act 2012 (Cth), NDB Scheme (Cth), Privacy Act 1988 (Cth), TIA Act 1979 (Cth) - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:workplace\s+investigation|investigation\s+report|investigation\s+findings|workplace\s+inquiry|investigation\s+outcome|formal\s+investigation|investigation\s+file|terms\s+of\s+reference|investigation\s+summary|witness\s+statement)\b` - Corroborative keywords: workplace investigation files, workplace, investigation, files, employment, workforce, records - Example matches: `workplace investigation`, `investigation report`, `investigation findings` - Known false positives: Common words and phrases related to workplace investigation files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In Australian English, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### Workplace investigation files Identifies documents containing references to workplace investigation files in international contexts. This information type is classified as personally identifiable information under applicable data protection regulations. - Slug: `global-top500-079-workplace-investigation-files` - URL: https://testpattern.dev/patterns/global-top500-079-workplace-investigation-files - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: global - Regulations: GDPR - Data categories: pii - Scope: wide - Pattern: `(?is)\b(?:workplace\s+investigation|investigation\s+report|investigation\s+findings|witness\s+statement|formal\s+investigation|investigation\s+outcome|incident\s+report|investigation\s+file|investigator\s+notes)\b` - Corroborative keywords: workplace investigation files, workplace, investigation, files, employment, workforce, records - Example matches: `workplace investigation`, `investigation report`, `investigation findings` - Known false positives: Common words and phrases related to workplace investigation files appearing in policy documents, training materials, HR templates, or compliance guidelines without actual personal data.; In English (as the primary international business language), similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection.; High-frequency pattern matches in large document corpora due to broad regex anchors. Expected match rate is significantly higher than specific identifier patterns. ### X.509 Certificate Private Key Detects X.509 certificate private key PEM headers. This is a broad pattern covering RSA, EC, PKCS#8, and OpenSSH private key formats. This pattern is based on a Microsoft Purview built-in sensitive information type. For more specific detection, see global-rsa-private, global-ec-private, global-pkcs8-private, and global-openssh-private. - Slug: `global-x509-certificate-private-key` - URL: https://testpattern.dev/patterns/global-x509-certificate-private-key - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: global - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: specific - Risk rating: 10 - Pattern: `-----BEGIN\s+(RSA\s+|EC\s+|OPENSSH\s+|DSA\s+|ENCRYPTED\s+)?PRIVATE\s+KEY-----` - Corroborative keywords: private key, certificate, X.509, PEM, key file, SSL, TLS, encryption, api key, api_key, apikey, access key, access token, auth token, authorization, bearer, conn str, connection string, connectionstring, cookie (+44 more) - Example matches: `-----BEGIN RSA PRIVATE KEY-----`, `-----BEGIN PRIVATE KEY-----`, `-----BEGIN EC PRIVATE KEY-----` - Known false positives: Documentation and tutorials showing private key format examples without actual key material.; Encrypted private keys (BEGIN ENCRYPTED PRIVATE KEY) that require a passphrase. ### Zero-day vulnerability details Identifies zero-day vulnerability details patterns in security and access control contexts. Detects potential exposure of sensitive security information in Australian systems. - Slug: `au-top500-288-zero-day-vulnerability-details` - URL: https://testpattern.dev/patterns/au-top500-288-zero-day-vulnerability-details - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Mixed - Jurisdictions: au - Regulations: Criminal Code Act 1995 (Cth) - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:zero[\s-]+day\s+vulnerability|zero\s+day|proof\s+of\s+concept|responsible\s+disclosure|attack\s+vector|remote\s+code\s+execution|privilege\s+escalation|threat\s+advisory)\b` - Corroborative keywords: zero-day vulnerability details, zero, day, vulnerability, details, security, operations, threat, data - Example matches: `zero-day vulnerability`, `zero day`, `proof of concept` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### Zero-day vulnerability details Identifies zero-day vulnerability details patterns in security and access control contexts. Detects potential exposure of sensitive security information in international systems. - Slug: `global-top500-288-zero-day-vulnerability-details` - URL: https://testpattern.dev/patterns/global-top500-288-zero-day-vulnerability-details - Type: regex - Engine: boost_regex - Confidence: medium - Detection quality: Not detected - Jurisdictions: global - Regulations: GDPR - Data categories: credentials, security - Scope: wide - Pattern: `(?is)\b(?:vulnerability\s+disclosure|proof\s+of\s+concept|attack\s+vector|remote\s+code\s+execution|privilege\s+escalation|threat\s+advisory|security\s+bulletin|responsible\s+disclosure)\b` - Corroborative keywords: zero-day vulnerability details, zero, day, vulnerability, details, security, operations, threat, data - Example matches: `vulnerability disclosure`, `proof of concept`, `attack vector` - Known false positives: Authentication-related terminology in software documentation, security training materials, or system architecture descriptions without actual credentials.; Code snippets and configuration examples containing credential-related keywords or placeholder values in developer documentation. ### ΑΜΚΑ Detects ΑΜΚΑ patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `gr-social-security-amka` - URL: https://testpattern.dev/patterns/gr-social-security-amka - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, gr - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{11}\b` - Corroborative keywords: AMKA, ΑΜΚΑ, social security, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `01017512345`, `12038856789`, `15039245678` - Known false positives: Eleven-digit numeric sequences may match phone numbers or other administrative identifiers.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Αστυνομική Ταυτότητα Detects Αστυνομική Ταυτότητα patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `gr-national-id` - URL: https://testpattern.dev/patterns/gr-national-id - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, gr - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b[A-Z]{2}\d{6}\b` - Corroborative keywords: ταυτότητα, identity card, αστυνομική, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `AB123456`, `XY987654`, `CD456789` - Known false positives: Two uppercase letters followed by six digits may match airport codes with flight numbers, product codes, or other alphanumeric references.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Δελτίο Ταυτότητας Detects Δελτίο Ταυτότητας patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `cy-identity-card` - URL: https://testpattern.dev/patterns/cy-identity-card - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, cy - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b\d{8}\b` - Corroborative keywords: δελτίο ταυτότητας, identity card, kimlik, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `12345678`, `98765432`, `45678901` - Known false positives: Eight-digit numeric sequences are extremely common in dates, phone numbers, and other non-identity contexts.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### Единен граждански номер (ЕГН) Detects Единен граждански номер (ЕГН) patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `bg-uniform-civil-number` - URL: https://testpattern.dev/patterns/bg-uniform-civil-number - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: eu, bg - Regulations: BDSG, CNIL / LIL, GDPR - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{10}\b` - Corroborative keywords: EGN, uniform civil number, граждански номер, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `7501011234`, `8812125678`, `9203034567` - Known false positives: Ten-digit numeric sequences appear in phone numbers, account numbers, and other non-identity contexts.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### بطاقة الهوية القطرية Detects بطاقة الهوية القطرية patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `qa-id-card` - URL: https://testpattern.dev/patterns/qa-id-card - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: qa - Regulations: PDPPL (QA) - Data categories: pii, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b\d{11}\b` - Corroborative keywords: بطاقة الهوية, QID, identity card, Qatar ID, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `27512345678`, `28398765432`, `29945678901` - Known false positives: Eleven-digit numeric sequences may match phone numbers or other administrative identifiers.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### เลขประจำตัวประชาชน Detects เลขประจำตัวประชาชน patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `th-population-id` - URL: https://testpattern.dev/patterns/th-population-id - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: th - Regulations: PDPA (TH) - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d-\d{4}-\d{5}-\d{2}-\d\b` - Corroborative keywords: เลขประจำตัว, population ID, citizen ID, บัตรประชาชน, ID number, identification, ID card, license, permit, registration, certificate - Example matches: `1-1234-56789-01-2`, `3-9876-54321-09-8`, `5-4567-89012-34-5` - Known false positives: The distinctive dash-separated format (X-XXXX-XXXXX-XX-X) is highly specific and rarely matches non-identity data.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### 住民票コード Detects 住民票コード patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `jp-resident-registration` - URL: https://testpattern.dev/patterns/jp-resident-registration - Type: regex - Engine: universal - Confidence: medium - Detection quality: Verified - Jurisdictions: jp - Regulations: APPI - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{11}\b` - Corroborative keywords: 住民票コード, resident registration, jūminhyō, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `12345678901`, `98765432109`, `45678901234` - Known false positives: Eleven-digit numeric sequences may match phone numbers or other administrative identifiers.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### 國民身分證統一編號 Detects 國民身分證統一編號 patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `tw-national-id` - URL: https://testpattern.dev/patterns/tw-national-id - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: tw - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b[A-Z][12]\d{8}\b` - Corroborative keywords: 身分證, national ID, 統一編號, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `A123456789`, `B234567890`, `F198765432` - Known false positives: The letter-digit-8digits format with gender constraint (1 or 2) provides good structural validation.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### 在留カード番号 Detects 在留カード番号 patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `jp-residence-card` - URL: https://testpattern.dev/patterns/jp-residence-card - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: jp - Regulations: APPI - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b[A-Z]{2}\d{8}[A-Z]{2}\b` - Corroborative keywords: 在留カード, residence card, zairyū card, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `AB12345678CD`, `XY98765432EF`, `MN45678901GH` - Known false positives: The distinctive format (XX99999999XX) is relatively specific but may match some product or serial codes.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### 外僑居留證 / 台灣地區居留證 Detects 外僑居留證 / 台灣地區居留證 patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `tw-resident-certificate` - URL: https://testpattern.dev/patterns/tw-resident-certificate - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: tw - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b[A-Z][A-D]\d{8}\b` - Corroborative keywords: ARC, TARC, resident certificate, 居留證, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `AA12345678`, `BC98765432`, `FD45678901` - Known false positives: Two letters followed by eight digits may match some reference codes, but the A-D constraint on the second letter reduces false positives.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### 社会保険番号 Detects 社会保険番号 patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `jp-social-insurance` - URL: https://testpattern.dev/patterns/jp-social-insurance - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: jp - Regulations: APPI - Data categories: pii, government-id - Scope: narrow - Risk rating: 9 - Pattern: `\b\d{4}-\d{6}-\d{1}\b` - Corroborative keywords: 社会保険, social insurance, SIN, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database, extract (+19 more) - Example matches: `1234-567890-1`, `9876-543210-9`, `4567-890123-4` - Known false positives: The specific dash-separated format (XXXX-XXXXXX-X) reduces false positives considerably.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. ### 香港身份證 Detects 香港身份證 patterns. This pattern is based on a Microsoft Purview built-in sensitive information type. Users already running Purview may prefer to enable the built-in SIT directly, or use this version as a starting point for customisation. - Slug: `hk-identity-card` - URL: https://testpattern.dev/patterns/hk-identity-card - Type: regex - Engine: universal - Confidence: high - Detection quality: Verified - Jurisdictions: hk - Data categories: pii, government-id - Scope: narrow - Risk rating: 7 - Pattern: `\b[A-Z]{1,2}\d{6}\([0-9A]\)` - Corroborative keywords: HKID, 身份證, identity card, hong kong ID, ID number, identification, ID card, license, permit, registration, certificate, field, column, row, entry, record, value, form, register, database (+20 more) - Example matches: `A123456(7)`, `AB987654(A)`, `C456789(0)` - Known false positives: The distinctive format with parenthesized check digit is relatively specific but may appear in formatted reference numbers.; In multiple languages, similar terminology used in formal or administrative contexts (education, professional documentation) that does not constitute sensitive data collection. --- ## Keyword Dictionaries 119 shared keyword dictionaries provide corroborative evidence for pattern matching. - **AT Financial Keywords** (`at-financial`): 30 keywords - **Australia Government Classification Markings** (`classification-australia-government`): 16 keywords - **Australian Abn Keywords** (`au-identity-abn`): 3 keywords - **Australian Acn Keywords** (`au-identity-acn`): 4 keywords - **Australian Bsb Keywords** (`au-routing-number-terms`): 3 keywords - **Australian Drivers License Keywords** (`au-vehicle-permit-terms`): 7 keywords - **Australian Given Names - Combined (common)** (`au-forenames-combined-common`): 1600 keywords - **Australian Given Names - Combined (less common)** (`au-forenames-combined-less-common`): 2000 keywords - **Australian Given Names - Combined (very common)** (`au-forenames-combined-very-common`): 400 keywords - **Australian Given Names - Female (very common)** (`au-forenames-female-very-common`): 200 keywords - **Australian Given Names - Male (very common)** (`au-forenames-male-very-common`): 200 keywords - **Australian Government Citizenship Immigration Keywords** (`au-government-citizenship-immigration`): 10 keywords - **Australian Government Defence Markers Keywords** (`au-government-defence-markers`): 11 keywords - **Australian Government Foi Keywords** (`au-government-foi`): 16 keywords - **Australian Government Security Clearances Keywords** (`au-government-security-clearances`): 12 keywords - **Australian Government Services Australia Keywords** (`au-government-services-australia`): 14 keywords - **Australian Healthcare Codes Keywords** (`au-healthcare-codes`): 8 keywords - **Australian Healthcare Identifiers Keywords** (`au-healthcare-identifiers`): 14 keywords - **Australian Healthcare Medications Keywords** (`au-healthcare-medications`): 9 keywords - **Australian Healthcare Mental Health Keywords** (`au-healthcare-mental-health`): 20 keywords - **Australian Healthcare Procedures Keywords** (`au-healthcare-procedures`): 11 keywords - **Australian Healthcare Records Keywords** (`au-healthcare-records`): 17 keywords - **Australian Indian Given Names** (`au-forenames-indian`): 35 keywords - **Australian Major Cities** (`au-major-cities`): 22 keywords - **Australian Medicare Keywords** (`au-health-scheme-terms`): 5 keywords - **Australian Multicultural Surnames** (`au-family-names-diverse`): 36 keywords - **Australian Ndis Keywords** (`au-identity-ndis`): 4 keywords - **Australian Passport Keywords** (`au-travel-credentials`): 4 keywords - **Australian Phone Keywords** (`au-telecom-terms`): 19 keywords - **Australian States and Territories (Abbreviations)** (`au-states-abbreviations`): 8 keywords - **Australian States and Territories (Full Names)** (`au-states-full`): 8 keywords - **Australian Street Types (Extended)** (`au-road-classification-extended`): 308 keywords - **Australian Surnames - Common** (`au-family-names-census`): 11241 keywords - **Australian Surnames - Very Common** (`au-family-names-top-tier`): 1286 keywords - **Australian Tfn Keywords** (`au-tax-registration-terms`): 5 keywords - **Australian Unit Types** (`au-unit-types`): 38 keywords - **Australian Usi Keywords** (`au-identity-usi`): 3 keywords - **Australian Vietnamese Given Names** (`au-forenames-vietnamese`): 30 keywords - **Banking Keywords** (`banking`): 30 keywords - **BE Financial Keywords** (`be-financial`): 18 keywords - **Biometric Behavioral Keywords** (`biometric-behavioral`): 7 keywords - **Biometric Biometric Types Keywords** (`biometric-biometric-types`): 6 keywords - **Biometric Facial Keywords** (`biometric-facial`): 8 keywords - **Biometric Fingerprint Keywords** (`biometric-fingerprint`): 7 keywords - **Biometric Voice Iris Keywords** (`biometric-voice-iris`): 8 keywords - **Business Identifier Keywords** (`business-identifier`): 12 keywords - **CA Financial Keywords** (`ca-financial`): 20 keywords - **CA Health Keywords** (`ca-health`): 34 keywords - **CO Financial Keywords** (`co-financial`): 13 keywords - **Common Honorifics** (`salutations-standard`): 26 keywords - **Corporate Classification Markings** (`classification-corporate`): 10 keywords - **Corporate Confidentiality Keywords** (`corporate-confidentiality`): 9 keywords - **Corporate Deal Documents Keywords** (`corporate-deal-documents`): 11 keywords - **Corporate Finance Keywords** (`corporate-finance`): 15 keywords - **Corporate Governance Keywords** (`corporate-governance`): 15 keywords - **Corporate Intellectual Property Keywords** (`corporate-ip`): 21 keywords - **Corporate Legal Keywords** (`corporate-legal`): 21 keywords - **Corporate Ma Activity Keywords** (`corporate-m-and-a`): 10 keywords - **Credentials and Secrets Keywords** (`credentials`): 29 keywords - **Critical Infrastructure Energy Keywords** (`infrastructure-energy`): 15 keywords - **Critical Infrastructure Industry Keywords** (`industry-critical-infrastructure`): 22 keywords - **Critical Infrastructure Water Keywords** (`infrastructure-water`): 13 keywords - **Data Record Context Keywords** (`data-record-context`): 17 keywords - **Date of Birth Contextual Keywords** (`birth-record-context`): 6 keywords - **Date of Birth Direct Keywords** (`birth-record-labels`): 12 keywords - **Diagnosis Codes Keywords** (`diagnosis-codes`): 12 keywords - **Education Industry Keywords** (`industry-education`): 10 keywords - **Ehic Keywords** (`ehic`): 11 keywords - **Email Actions Keywords** (`correspondence-action-terms`): 7 keywords - **Email Domains Keywords** (`correspondence-domain-terms`): 5 keywords - **Email Labels Keywords** (`correspondence-address-labels`): 9 keywords - **Emerging Ai Training Data Keywords** (`emerging-ai-training`): 14 keywords - **Emerging Children Data Keywords** (`emerging-children`): 12 keywords - **Emerging Geolocation Data Keywords** (`emerging-geolocation`): 12 keywords - **Emerging Indigenous Data Keywords** (`emerging-indigenous`): 12 keywords - **Emerging Neurodata Data Keywords** (`emerging-neurodata`): 7 keywords - **EN Government Classification Markers** (`en-government-classification`): 29 keywords - **EN Government Exclusion Keywords** (`en-government-exclusion`): 65 keywords - **ES Financial Keywords** (`es-financial`): 18 keywords - **Financial Bank Account Keywords** (`financial-deposit-terms`): 9 keywords - **Financial Credit Card Keywords** (`financial-payment-card-terms`): 11 keywords - **Financial Cvv Keywords** (`financial-cvv`): 6 keywords - **Financial Expiry Keywords** (`financial-expiry`): 7 keywords - **Financial Transaction Keywords** (`financial-transaction`): 7 keywords - **FR Financial Keywords** (`fr-financial`): 23 keywords - **FR Health Keywords** (`fr-health`): 12 keywords - **Generic Data Labels Keywords** (`generic-data-labels`): 12 keywords - **Government Services Keywords** (`government-services`): 15 keywords - **Greek/Cypriot Financial Keywords** (`gr-cy-financial`): 17 keywords - **GST Keywords** (`gst`): 12 keywords - **Healthcare Clinical Keywords** (`healthcare-clinical`): 15 keywords - **Healthcare Codes Keywords** (`healthcare-codes`): 9 keywords - **Healthcare Identifiers Keywords** (`healthcare-identifiers`): 10 keywords - **HR Industry Keywords** (`industry-hr`): 71 keywords - **HU Financial Keywords** (`hu-financial`): 22 keywords - **IL Financial Keywords** (`il-financial`): 13 keywords - **Insurance Industry Keywords** (`industry-insurance`): 10 keywords - **International Phone Keywords** (`phone-international`): 11 keywords - **IT Financial Keywords** (`it-financial`): 12 keywords - **JP Financial Keywords** (`jp-financial`): 14 keywords - **Law Enforcement Keywords** (`law-enforcement`): 15 keywords - **Legal Classification Markings** (`classification-legal`): 5 keywords - **MT Financial Keywords** (`mt-financial`): 11 keywords - **NHI Keywords** (`nhi`): 12 keywords - **NL Financial Keywords** (`nl-financial`): 30 keywords - **Noise and Template Exclusion** (`template-exclusion`): 13 keywords - **NZ Financial Keywords** (`nz-financial`): 25 keywords - **NZ Government Keywords** (`nz-government`): 12 keywords - **PII Government Id Context Keywords** (`pii-civic-credentials`): 7 keywords - **PII Personal Information Keywords** (`pii-personal`): 29 keywords - **PL Financial Keywords** (`pl-financial`): 13 keywords - **Professional Honorifics** (`salutations-professional`): 12 keywords - **PT Financial Keywords** (`pt-financial`): 16 keywords - **RU Financial Keywords** (`ru-financial`): 15 keywords - **SE Financial Keywords** (`se-financial`): 11 keywords - **SI Financial Keywords** (`si-financial`): 13 keywords - **TAX ID Keywords** (`tax-id`): 30 keywords - **US Financial Keywords** (`us-financial`): 16 keywords - **VAT Numbers Keywords** (`vat-numbers`): 31 keywords --- Sponsored by Compl8 (https://aairii.com) — The missing pieces for Microsoft Purview