Verics- Filtered and sensitive data

filtraciones y datos sensibles
Everything you need to know about your Verics report


In this section, we have put all the leaks found in the domain we have analysed. This allows us to obtain a general and structured view of the volume of the leaks, as well as to see how many times each one is repeated and to see the percentage in which they appear.

Volume of filtrations

In this bar chart we show you the 10 most frequent leaks in the documents we have analysed, and the rest we group in “others”.
To identify the data we have found in your domains, we follow a classification scheme based on the information they contain.

  • Filtrations: Assume a breach of GDPR:
    • Names and surnames of individuals
    • DNIs
  • Sensitive: They may represent a breach of the regulation in association with other data:
    • GPS coordinates
    • Addresses
  • Style: They offer information about the software tools that have been used for the creation and/or manipulation of those files.
    • Office tools
    • Photo cameras
    • Printer and photocopier models

Distribution of the leaks

In the graph of circular sectors, you can see which volume represents the leaks grouped by their frequency of appearance within the entire website

With this representation, we show that the leaks that appear a small number of times, all together, represent the largest volume of leaks on the web.

Details of the data

In this table, you can see a summary of the most important leaks that we have found in the documents of your website.
Number of occurrences: specify the number of occurrences of each leak
Data: shows if the leak we have found corresponds to a name, ID, personal email…
Severity: shows the interpretation of these data according to the classification we have described above.
Direct search: allows you to find the profile of the person in networks such as LinkedIn.


If you analyse the information in both graphs together, you can see how much the small leaks of personal data are involved in the whole website.
As you know, the bar chart shows the most frequent leaks. They do not usually pose a risk when it comes to breaching the RGPD.

  • Natural persons: Normally they will be the ones who generate the content of the website, so it is rare that they represent a breach of the regulations since (as a rule) there will be the appropriate authorisations for it to appear.
  • Generic aliases: Examples such as “Communications Department” or “Publications” are some of the most common ones we have found. This is linked to stricter and more centralised publication channels.

The most relevant part is the “Others” bar. This value corresponds to the sum of all the filtrations that we have detected that appear rarely, but all together, they represent a huge percentage within the total of the filtrations.

These cases are the problematic ones, since given the number of times they appear, they are not linked to the creation of content on the web.

Also, we can understand that these documents have not followed the usual channels of publication, since if this had been the case, this data would have been replaced by the generic aliases of the communication departments.

The conclusion is that, it is right here where special care must be taken to protect this information.

Related post:


Ref – File types

Discover the different types of files that Verics and Metacleaner can process.