{"id":18669,"date":"2025-10-28T16:45:45","date_gmt":"2025-10-28T20:45:45","guid":{"rendered":"https:\/\/www.iri.com\/blog\/?p=18669"},"modified":"2025-10-29T15:04:58","modified_gmt":"2025-10-29T19:04:58","slug":"masking-pii-in-audio-files","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/","title":{"rendered":"Masking PII in Audio Files"},"content":{"rendered":"<p><em>Voice recordings can contain personally identifiable information (PII), such as names, phone numbers, or other sensitive data embedded in spoken words.<\/em><\/p>\n<p><span style=\"font-weight: 400;\">According to Mediartis, \u201c<\/span><span style=\"font-weight: 400;\">The <\/span><a href=\"https:\/\/www.cnil.fr\/en\/sheet-ndeg1-identify-personal-data\"><span style=\"font-weight: 400;\">CNIL (French GDPR Supervisory Authority<\/span><\/a><span style=\"font-weight: 400;\">) provides examples of personal data such as photos, voice recordings, first or last names, pseudonyms, dates of birth, telephone numbers, social security numbers, postal addresses, email addresses, fingerprints, retinal prints and more<\/span><span style=\"font-weight: 400;\">\u201d.\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-18697\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/voice-recording-PII-1-300x197.png\" alt=\"\" width=\"489\" height=\"321\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/voice-recording-PII-1-300x197.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/voice-recording-PII-1-768x503.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/voice-recording-PII-1.png 1021w\" sizes=\"(max-width: 489px) 100vw, 489px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Voices themselves qualify as a form of personally identifiable information (PII); voice prints are one such example. Aside from the voice itself, the <\/span><strong>content <\/strong><span style=\"font-weight: 400;\"><strong>of a conversation<\/strong> can also contain PII.\u00a0 <\/span><span style=\"font-weight: 400;\">The ability to remove PII from audio streams helps users\u00a0<\/span><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\">take one step closer to addressing the myriad data security regulations that govern the protection of personal information<\/span>.<\/p>\n<h5><b><\/b><b>DarkShield and Unstructured Data<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">IRI originally entered the data security theater with the introduction of <\/span><a href=\"https:\/\/www.iri.com\/products\/fieldshield\"><span style=\"font-weight: 400;\">IRI FieldShield<\/span><\/a><span style=\"font-weight: 400;\">, which focused on masking structured data while providing <\/span><span style=\"font-weight: 400;\">many of the ETL features associated with <\/span><a href=\"https:\/\/www.iri.com\/products\/cosort\/sortcl\"><span style=\"font-weight: 400;\">SortCL<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As data privacy requirements expanded to include <strong>semi-structured and unstructured<\/strong> data, FieldShield alone could not meet those demands. That led to the creation of <\/span><a href=\"https:\/\/www.iri.com\/produts\/darkshield\"><span style=\"font-weight: 400;\">DarkShield<\/span><\/a><span style=\"font-weight: 400;\">;<\/span> designed to discover and protect sensitive data across a wide range of formats, both on-premise and in the cloud.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18683 alignright\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/DarkShield-Coverage-300x300.png\" alt=\"\" width=\"284\" height=\"284\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/DarkShield-Coverage-300x300.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/DarkShield-Coverage-150x150.png 150w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/DarkShield-Coverage-768x768.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/DarkShield-Coverage-70x70.png 70w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/DarkShield-Coverage.png 1024w\" sizes=\"(max-width: 284px) 100vw, 284px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">DarkShield can find and mask data classified as sensitive in structured sources (flat files and relational databases), too, but supports these additional sources on-premise and in the cloud:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">NoSQL DBs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">JSON, XML, HL7, X12, FHIR files<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Parquet and PDF files<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Microsoft Office files (Word, Excel, and PowerPoint)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Raw text, log and .SQL files<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Images (bmp, gif, jpg, png, tif, DICOM)<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">DarkShield can also detect and redact signatures found in several file formats, and protecting handwritten PII is also on the roadmap.<\/span><\/p>\n<h5><b>Introducing Audio File Masking<\/b><\/h5>\n<p>Until now, DarkShield supported various file types containing text or images from which text could be extracted. With Darkshield version 1.6.7, IRI has expanded that support to include audio files.<\/p>\n<p><span style=\"font-weight: 400;\">DarkShield achieves this by using a Speech-to-Text model called <\/span><a href=\"https:\/\/openai.com\/index\/whisper\/\"><span style=\"font-weight: 400;\">Whisper<\/span><\/a><span style=\"font-weight: 400;\"> (made by OpenAI) to produce transcriptions. The transcriptions are then scanned for PII, and when found, the audio sound bytes containing PII are modified.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Current audio file formats supported by DarkShield include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">.wav<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">.mp3<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">.mpeg<\/span><\/li>\n<\/ul>\n<h5><b><\/b><b>DarkShield Audio Rule: How Audio Masking Works<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">From the IRI rules dialog in the IRI Workbench <\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\/darkshield-gui\"><span style=\"font-weight: 400;\">GUI for DarkShield<\/span><\/a><span style=\"font-weight: 400;\"> shown here, we can create and apply an Audio Manipulation rule to mask any PII found in audio files.<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18675\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/create-and-apply-an-Audio-Manipulation-rule-244x300.png\" alt=\"\" width=\"409\" height=\"503\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/create-and-apply-an-Audio-Manipulation-rule-244x300.png 244w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/create-and-apply-an-Audio-Manipulation-rule.png 511w\" sizes=\"(max-width: 409px) 100vw, 409px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">To create a rule for the purpose of masking PII in audio, there are now new Audio Manipulation rules. These rules allow you to either replace audio sounds or delete slices of audio sound.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To configure and create these rules, open an IRI Library and open the New Data Rule Wizard dialogue. Then select the Audio Manipulation item, and click next.<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18677\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Audio-Manipulation_Function-300x182.png\" alt=\"\" width=\"359\" height=\"218\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Audio-Manipulation_Function-300x182.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Audio-Manipulation_Function.png 504w\" sizes=\"(max-width: 359px) 100vw, 359px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">On the next page, either select to delete or replace audio via the corresponding radio button.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you select the Replacement Audio option, you can choose between using bleeps, bird sounds, white noise, or silence to replace audio sound bytes. Otherwise, the Delete option will simply slice and cut out the sound bytes containing the discovered PII.<\/span><\/p>\n<h5><b>Searching an Audio File<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">To discover PII inside an audio file we leverage data classes as we normally would when creating a DarkShield job. Once a DarkShield .dsc file is created we just run a Search job.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In my example, I have a data class called Klaus that only looks for the name Klaus in a speech performed by former president Trump. Below you can see a sample of the search results annotations json log from DarkShield.<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18678\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/json-log-249x300.png\" alt=\"\" width=\"664\" height=\"800\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/json-log-249x300.png 249w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/json-log.png 708w\" sizes=\"(max-width: 664px) 100vw, 664px\" \/><\/p>\n<h5><b>Search and Mask an Audio File<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">To mask PII inside an audio file, we leverage data classes to find PII and masking rules to mask PII as we would normally do when creating a DarkShield job. Once a DarkShield .dsc file is create,d we just run a Search and Mask job.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In my example, I have a data class called Klaus that only looks for the name Klaus and replaces the word with a bleep sound. Below you can see a sample of the search and mask results json log from DarkShield.\u00a0<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18679\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/sample-of-the-search-and-mask-results-json-log-300x247.png\" alt=\"\" width=\"727\" height=\"599\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/sample-of-the-search-and-mask-results-json-log-300x247.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/sample-of-the-search-and-mask-results-json-log.png 716w\" sizes=\"(max-width: 727px) 100vw, 727px\" \/><\/p>\n<h5><b>Audio Clip: Before &amp; After Masking\u00a0<\/b><\/h5>\n<p>Sample clips showing the difference before and after masking.<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-18698\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/before-after-masking-voice-300x201.png\" alt=\"\" width=\"400\" height=\"268\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/before-after-masking-voice-300x201.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/before-after-masking-voice-768x515.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/before-after-masking-voice.png 1023w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/p>\n<p><strong><em>Audio clip before masking (original recording):<\/em><\/strong><\/p>\n<!--[if lt IE 9]><script>document.createElement('audio');<\/script><![endif]-->\n<audio class=\"wp-audio-shortcode\" id=\"audio-18669-1\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/ElevenLabsGrace.mp3?_=1\" \/><a href=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/ElevenLabsGrace.mp3\">https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/ElevenLabsGrace.mp3<\/a><\/audio>\n<p><strong><em>Masked audio clip (beep sound applied):<\/em><\/strong><\/p>\n<audio class=\"wp-audio-shortcode\" id=\"audio-18669-2\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/masked_beep_noises-1.mp3?_=2\" \/><a href=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/masked_beep_noises-1.mp3\">https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/masked_beep_noises-1.mp3<\/a><\/audio>\n<p><strong><em>Masked audio clip (bird sound applied):<\/em><\/strong><\/p>\n<audio class=\"wp-audio-shortcode\" id=\"audio-18669-3\" preload=\"none\" style=\"width: 100%;\" controls=\"controls\"><source type=\"audio\/mpeg\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/masked_bird_noises-1.mp3?_=3\" \/><a href=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/masked_bird_noises-1.mp3\">https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/masked_bird_noises-1.mp3<\/a><\/audio>\n","protected":false},"excerpt":{"rendered":"<p>Voice recordings can contain personally identifiable information (PII), such as names, phone numbers, or other sensitive data embedded in spoken words. According to Mediartis, \u201cThe CNIL (French GDPR Supervisory Authority) provides examples of personal data such as photos, voice recordings, first or last names, pseudonyms, dates of birth, telephone numbers, social security numbers, postal addresses,<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/\" title=\"Masking PII in Audio Files\">Read More<\/a><\/div>\n","protected":false},"author":152,"featured_media":18691,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[2229,2225,2221,2224,20,1081,14,1784,18,13,15,2230,1743,1388,520,789,850,2227,2228,2231,2233,2069,152,2232,2222,143,2226,2223],"class_list":["post-18669","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","tag-ai-based-pii-detection","tag-audio-files","tag-audio-masking","tag-cnil","tag-data-anonymization","tag-data-classification","tag-data-masking","tag-data-masking-software","tag-data-privacy","tag-data-protection-2","tag-data-security","tag-enterprise-data-governance","tag-gdpr-compliance","tag-iri-darkshield","tag-iri-fieldshield","tag-iri-voracity","tag-iri-workbench","tag-mp3","tag-mpeg","tag-personal-data-masking","tag-pii-in-audio-files","tag-pii-redaction","tag-sensitive-data","tag-speech-data-privacy","tag-speech-to-text","tag-unstructured-data","tag-wav","tag-whisper-model"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Masking PII in Audio Files - IRI<\/title>\n<meta name=\"description\" content=\"Learn about the importance of data masking in audio file to protect personal information and meet data security regulations comprehensively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Masking PII in Audio Files\" \/>\n<meta property=\"og:description\" content=\"Learn about the importance of data masking in audio file to protect personal information and meet data security regulations comprehensively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-28T20:45:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-29T19:04:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Masking-PII-in-Audio-Files_featured-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"532\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Adam Lewis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Lewis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/\"},\"author\":{\"name\":\"Adam Lewis\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e\"},\"headline\":\"Masking PII in Audio Files\",\"datePublished\":\"2025-10-28T20:45:45+00:00\",\"dateModified\":\"2025-10-29T19:04:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/\"},\"wordCount\":761,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Masking-PII-in-Audio-Files_featured-image.png\",\"keywords\":[\"AI-based PII detection\",\"audio files\",\"audio masking\",\"CNIL\",\"data anonymization\",\"data classification\",\"data masking\",\"data masking software\",\"data privacy\",\"data protection\",\"data security\",\"enterprise data governance\",\"gdpr compliance\",\"IRI DarkShield\",\"IRI FieldShield\",\"IRI Voracity\",\"IRI Workbench\",\"mp3\",\"mpeg\",\"personal data masking\",\"PII in audio files\",\"pii redaction\",\"sensitive data\",\"speech data privacy\",\"speech-to-text\",\"unstructured data\",\"wav\",\"Whisper model\"],\"articleSection\":[\"Data Masking\/Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/\",\"name\":\"Masking PII in Audio Files - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Masking-PII-in-Audio-Files_featured-image.png\",\"datePublished\":\"2025-10-28T20:45:45+00:00\",\"dateModified\":\"2025-10-29T19:04:58+00:00\",\"description\":\"Learn about the importance of data masking in audio file to protect personal information and meet data security regulations comprehensively.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Masking-PII-in-Audio-Files_featured-image.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Masking-PII-in-Audio-Files_featured-image.png\",\"width\":1110,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Masking PII in Audio Files\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e\",\"name\":\"Adam Lewis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g\",\"caption\":\"Adam Lewis\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/adaml\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Masking PII in Audio Files - IRI","description":"Learn about the importance of data masking in audio file to protect personal information and meet data security regulations comprehensively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/","og_locale":"en_US","og_type":"article","og_title":"Masking PII in Audio Files","og_description":"Learn about the importance of data masking in audio file to protect personal information and meet data security regulations comprehensively.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/","og_site_name":"IRI","article_published_time":"2025-10-28T20:45:45+00:00","article_modified_time":"2025-10-29T19:04:58+00:00","og_image":[{"width":1110,"height":532,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Masking-PII-in-Audio-Files_featured-image.png","type":"image\/png"}],"author":"Adam Lewis","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adam Lewis","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/"},"author":{"name":"Adam Lewis","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e"},"headline":"Masking PII in Audio Files","datePublished":"2025-10-28T20:45:45+00:00","dateModified":"2025-10-29T19:04:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/"},"wordCount":761,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Masking-PII-in-Audio-Files_featured-image.png","keywords":["AI-based PII detection","audio files","audio masking","CNIL","data anonymization","data classification","data masking","data masking software","data privacy","data protection","data security","enterprise data governance","gdpr compliance","IRI DarkShield","IRI FieldShield","IRI Voracity","IRI Workbench","mp3","mpeg","personal data masking","PII in audio files","pii redaction","sensitive data","speech data privacy","speech-to-text","unstructured data","wav","Whisper model"],"articleSection":["Data Masking\/Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/","name":"Masking PII in Audio Files - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Masking-PII-in-Audio-Files_featured-image.png","datePublished":"2025-10-28T20:45:45+00:00","dateModified":"2025-10-29T19:04:58+00:00","description":"Learn about the importance of data masking in audio file to protect personal information and meet data security regulations comprehensively.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Masking-PII-in-Audio-Files_featured-image.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Masking-PII-in-Audio-Files_featured-image.png","width":1110,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-audio-files\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Masking PII in Audio Files"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/37c0e5beab094bd61cc521902df2876e","name":"Adam Lewis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/087667d0c75d33bb6fab6e734bd89333?s=96&d=blank&r=g","caption":"Adam Lewis"},"url":"https:\/\/www.iri.com\/blog\/author\/adaml\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/10\/Masking-PII-in-Audio-Files_featured-image.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18669"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/152"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=18669"}],"version-history":[{"count":12,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18669\/revisions"}],"predecessor-version":[{"id":18671,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18669\/revisions\/18671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/18691"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=18669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=18669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=18669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}