Spider scans your hard drive, web site, or other collection of files to identify confidential data such as social security, credit card, or bank account and routing numbers. When the scan is complete, Spider produces a list of files that may potentially contain confidential data.
You can then use Spider to:
Choosing the correct protection strategy is a combination of business needs, local policy and technology, user education, and other factors. Cornell community members using Spider can contact the Security group with questions.
Note: It is against University policy to store sensitive data on an unsecured machine. See the Security Requirements page for information.
Warning: Spider report files create a roadmap to confidential data and should be destroyed or well-secured.
If your computer or site may potentially contain sensitive data, you should use Spider. Running a basic scan will almost always provide useful information. More technical users may choose to use the advanced configuration features.
Spider scans your hard drive, web site, or other collection of files to identify confidential data such as social security, credit card, or bank account and routing numbers. Spider can identify the following types of data:
Spider can also scan for any data for which you can supply a regular expression including keyword searches.
Spider scans the space you designate (hard drive, web page, unallocated space) for patterns of numbers or letters that resemble specific types of confidential data such as Social Security numbers or bank routing numbers.
By default, Spider scans a limited list of file types that are the most likely to contain sensitive data. These include:
You specify the details for the scan including: