Data Enrichment. TC Oversight Controls can be used to enrich, transform, identify, and bifurcate various data streams. It can filter messages from the mail stream and bifurcate it into your archive and supervision system to enrich communications, collect analytics in real time, and perform data type extractions to feed into analytics platforms. When data passes through a system, it can be tagged, properties can be added, and the system can apply different types of logging and routing rules in order to improve surveillance. TCOC accepts data in all sorts of forms, from files, email, databases, and analytics/big data platforms, and sends them to destinations of your choice in its native format, enriched, merged, or transformed. Emails are sent to be data extracted for trend analytics, indexed, or content analyzed. TCOC can enhance emails in any way of your choosing, as message transformation and enhancement are fully configurable and flexible. This functionality can do anything from automatically adding users to the Cc line of an email, identifying groups or names, changing email headers, filtering attachments, adding or removing information, or any other type of message transformation named by the client.
Enrich: Enrich communications, collect analytics in real time, and perform data type extractions to feed into analytics platforms.
Transform: Transform messages in any way of your choosing, as message transformation is fully configurable and flexible.
Bifurcate: Filter messages from any data stream and bifurcate it into your archive and supervision system.
Identify: Utilize enriched data to better identify security or regulatory concerns within the data itself.
There are many different scenarios where data enrichment or transformation could be warranted within a firm, from integrating between two platforms to tagging communications for use in supervision. What we’ve come to see is most, if not all, communication supervision products don’t have the ability to incorporate all the various data sources which could result in a message needing to be supervised. Sources like a “Due Diligence” system that identifies active acquisitions and the people working on it can be used to create a more effective insider trading or exposure of privileged information policy. The basic flow outlined in this TCOC scenario is of an email being directed to the archive; its participants are scanned and looked up within a control room database that houses the active mergers and acquisitions. The results are then amended to the email and, in certain cases, also bifurcated to the control room for review.