Vantage 3.0
Introducing a hybrid approach to using Document AI and GenAI
Supercharge AI automation with the power of reliable, accurate OCR
Increase straight-through document processing with data-driven insights
Integrate reliable Document AI in your automation workflows with just a few lines of code
PROCESS UNDERSTANDING
PROCESS OPTIMIZATION
Purpose-built AI for limitless automation.
Kick-start your automation with pre-trained AI extraction models.
Meet our contributors, explore assets, and more.
BY INDUSTRY
BY BUSINESS PROCESS
BY TECHNOLOGY
Build
Integrate advanced text recognition capabilities into your applications and workflows via API.
AI-ready document data for context grounded GenAI output with RAG.
Explore purpose-built AI for Intelligent Automation.
Grow
Connect with peers and experienced OCR, IDP, and AI professionals.
A distinguished title awarded to developers who demonstrate exceptional expertise in ABBYY AI.
Explore
Insights
Implementation
January 28, 2019
It's Data Privacy Day! Do you treat your data privacy as you treat your home? Do you securely lock the doors to keep strangers out, hide the keys in a safe and secure place and keep your eyes peeled for prying eyes? Well, if you don’t, here are some facts to ponder:
The above are some reasons why industry, government and nonprofits joined forces every year since 2008 to recognize January 28 as Data Privacy Day and to create awareness about the importance of privacy and protecting personal information. On this Data Privacy Day we have some valuable experience to share. This helps you protect your privacy and prevent disclosure of sensitive information:

Share with care on the Cloud
Before submitting data about yourself or others, think about how it might be affected by a possible data breach. Follow reasonable security measures to protect individuals’ personal information from unauthorized access.

Lock down your login
Use a unique password for each account. For sensitive resources, turn on the strongest authentication tools available, apply security keys or unique one-time codes through an app on your mobile device. Remember that your usernames and passwords are not always enough to protect key accounts like email, banking and social media.

Keep your devices clean
Update your security software, web browser and operating system to have the best defense against viruses, malware and other online threats. Do not open any email attachments and links if sender is unknown or package is suspicious.

Don't use work email for personal reasons
Don't respond to requests for personal or sensitive information via your corporate email. Respect and protect the personal data of colleagues and customers by providing work contact information to online services and online stores only when there is a business need.

Prevent phishing attacks on your personal or financial data
To guard against Phishing attacks, don't post personal data, like your birthday, vacation plans, or your address or phone number, publicly on social media. Watch out for any URL redirects and spell-check email links before you click or enter sensitive information.

Secure your digital life with a password manager
Having both strong and unique passwords becomes both simple and effective with password managers. Use multi-factor authentication to control access to sensitive systems and data. That should prevent hackers from gaining access into your account, even if they managed to obtain your login and password.
Security and more security!
Every device should be secured by a password or strong authentication ‒ finger swipe, facial recognition etc. These security measures limit access to authorized users only and protect your information if devices are lost or stolen.

Secure your Internet traffic
Make sure that HTTPS is used (check the icon "Connected secure" next to the website address in browser) or corporate VPN: thereby, all the traffic that leaves your device will be encrypted.
Avoid privacy risks on social media
Be very careful about what you post online, else, you will end up giving the would-be burglars, stalkers, cyberbullies and identity thieves the information they require to cause harm. Always take advantage of the enhanced privacy options which are offered by social media sites, e.g. 2FA enablement, blocking the messages from strangers.