How to use PII Detection
- Open the tool route and provide source files.
- Review settings and limits before running.
- Run once and inspect the output.
Tips
- Keep original files separate from edited exports.
- Use clear naming conventions to avoid mixups.
- If quota is reached, wait for month reset or upgrade for unlimited usage.
What this does not protect
- This tool does not guarantee legal anonymity.
- Device or account compromise risk remains outside tool scope.
- It does not replace legal, compliance, or incident-response workflows.