{"id":18922,"date":"2025-12-23T16:28:17","date_gmt":"2025-12-23T21:28:17","guid":{"rendered":"https:\/\/www.iri.com\/blog\/?p=18922"},"modified":"2025-12-23T16:28:17","modified_gmt":"2025-12-23T21:28:17","slug":"masking-pii-in-fedwire-files","status":"publish","type":"post","link":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/","title":{"rendered":"Masking PII in Fedwire Files"},"content":{"rendered":"<p><b>Abstract<\/b><span style=\"font-weight: 400;\">: <\/span><i><span style=\"font-weight: 400;\">This article discusses the content and obfuscation of historically used banking industry files using the <\/span><\/i><a href=\"https:\/\/www.iri.com\/products\/fieldshield\"><i><span style=\"font-weight: 400;\">IRI FieldShield<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> data masking tool on proprietary tag-based formats (e.g., <\/span><\/i><i><span style=\"font-weight: 400;\">{1500}<\/span><\/i><i><span style=\"font-weight: 400;\">, <\/span><\/i><i><span style=\"font-weight: 400;\">{4200}<\/span><\/i><i><span style=\"font-weight: 400;\">. For Fedwire files using newer ISO 20022 XML formats, use <\/span><\/i><a href=\"https:\/\/www.iri.com\/products\/darkshield\"><i><span style=\"font-weight: 400;\">IRI DarkShield<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">.\u00a0\u00a0<\/span><\/i><\/p>\n<p><span style=\"font-weight: 400;\">Fedwire files are structured electronic messages that conform to the Federal Reserve\u2019s required formats, enabling payments to be processed through the Fedwire Funds Service.<span id='easy-footnote-1-18922' class='easy-footnote-margin-adjust'><\/span><span class='easy-footnote'><a href='https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#easy-footnote-bottom-1-18922' title=' The Federal Reserve also provides participants with Fedwire files, which could also be Fedwire activity statements, end-of-day summary files, and error or reject files.'><sup>1<\/sup><\/a><\/span><\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-18928\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Structuring-Fedwire-Messages-1024x611.png\" alt=\"\" width=\"602\" height=\"359\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Structuring-Fedwire-Messages-1024x611.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Structuring-Fedwire-Messages-300x179.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Structuring-Fedwire-Messages-768x458.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Structuring-Fedwire-Messages-1536x916.png 1536w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Structuring-Fedwire-Messages.png 1110w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">These files are not relatively flat, however, because their format can vary depending on the content; e.g,<\/span><\/p>\n<p><strong>1.\u00a0 Header Information<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sender (financial institution)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Receiver<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Message type (e.g., funds transfer)<\/span><\/li>\n<\/ul>\n<p><strong>2.\u00a0 Payment Details<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Amount<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sender\u2019s account information<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Receiver\u2019s account information<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Intermediate financial institutions (if any)<\/span><\/li>\n<\/ul>\n<p><strong>3.\u00a0 Additional Reference Data<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Originator information<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Beneficiary information<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reference numbers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Purpose of payment<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Corporate or bank treasury systems can also generate files containing multiple Fedwire transfers, and upload or send t<\/span><span style=\"font-weight: 400;\">hem to a bank or FedLine system. Banks using FedLine services exchange Fedwire messages via encrypted file transfers (e.g., via FedLine Direct) or message-based protocols.<\/span><\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-18927 alignnone\" src=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Fedwire-transfer-1024x487.png\" alt=\"\" width=\"629\" height=\"299\" srcset=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Fedwire-transfer-1024x487.png 1024w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Fedwire-transfer-300x143.png 300w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Fedwire-transfer-768x365.png 768w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Fedwire-transfer-1536x730.png 1536w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Fedwire-transfer-2048x974.png 2048w, https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Fedwire-transfer.png 1110w\" sizes=\"(max-width: 629px) 100vw, 629px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Following is a basic Fedwire file snippet containing some of the information described above, albeit already encoded for privacy when provided to IRI (but see masked result below):<\/span><\/p>\n<pre>D0000900110000000018300000020000WIREIN JVRIYAX Y DPOVTQVEC\u00a0 \u00a0 OVXSAO RW PJM (NWJJYP BRUZPIZO\r\nD0000900110000000018300001750200WIREIN HMDMLUC9HKJT CSS \u00a0 \u00a0 \u00a0 LVJV YES 2616 TLNXLE BS QOR 20\r\nD0000900110000000018300000150000WIREIN UUP E IYNB VDSSQC; VWH.YPV UEQS XZWWEA IDWL ITFHPZI \r\nD0000900110000000018300017624287WIREIN AMWQUZH JALFS ZB QMULBB89128950; ZSL 959201VT\u00a0 EFM C6\r\nD0000900110000000018300000935781WIREIN WNJVP WIIKMCFL OK VYAEO\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \r\nD0000900110000000016300000100000WIREOUT Z A ZSQSCEWOKU\u00a0 \u00a0 \u00a0 \u00a0 20241213B4LB4U1C000002\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \r\nD0000000009800240711400000210000WIREOUT PracqhjFdfvkiotXmanvd.20241213B4LB4U1C000003\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \r\nD0000900110000000016300000210000WIREOUT PracqhjFdfvkiotXmanvd.20241213B4LB4U1C000003\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 \r\nD0000000009001792511400001682884WIREOUT Ybtqatnkp Jrstudjk Prh20241213B4LB4U1C000004\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\r\nD0000000009601330411200055267563WIREOUT WYHPJU XCPTEC AUJHA \u00a0 20241213B4LB4U1C000005<\/pre>\n<p><span style=\"font-weight: 400;\">To define and mask this data, you could create (by hand, or <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/the-basic-fieldshield-masking-job-wizard\/\"><span style=\"font-weight: 400;\">via wizard<\/span><\/a><span style=\"font-weight: 400;\"> in the IRI Workbench <\/span><a href=\"https:\/\/www.iri.com\/products\/workbench\/fieldshield-gui\"><span style=\"font-weight: 400;\">GUI for FieldShield<\/span><\/a><span style=\"font-weight: 400;\"> built on Eclipse), a job script in the domain-specific \u201c<\/span><a href=\"https:\/\/www.iri.com\/products\/cosort\/sortcl\"><span style=\"font-weight: 400;\">SortCL<\/span><\/a><span style=\"font-weight: 400;\">\u201d 4GL, like this:<\/span><\/p>\n<pre><span style=\"color: #993366;\"><b>\/INFILE<\/b><\/span><span style=\"font-weight: 400;\">=ALT_UPACH.TXT<\/span>\r\n<span style=\"font-weight: 400;\"> \u00a0\u00a0<\/span><span style=\"color: #993366;\"><b>\/PROCESS<\/b><span style=\"font-weight: 400;\">=<\/span><b>RECORD<\/b><\/span>\r\n<span style=\"font-weight: 400;\"> \u00a0\u00a0<\/span><span style=\"font-weight: 400; color: #3366ff;\"># WIREIN RECORDS<\/span>\r\n<span style=\"font-weight: 400;\"> \u00a0\u00a0<\/span><span style=\"color: #993366;\"><b>\/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(WIREIN_SECTION1,<\/span><span style=\"color: #993366;\"><b>POSITION<\/b><\/span><span style=\"font-weight: 400;\">=1,<\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=32,<\/span><b>T<span style=\"color: #993366;\">YPE<\/span><\/b><span style=\"font-weight: 400;\">=ASCII)<\/span>\r\n<span style=\"font-weight: 400;\"> \u00a0\u00a0<\/span><span style=\"color: #993366;\"><b>\/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(WIREIN_FIELD, <\/span><b><span style=\"color: #993366;\">POSITION<\/span><\/b><span style=\"font-weight: 400;\">=33, <\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=6)#This says WIREIN<\/span>\r\n<span style=\"font-weight: 400;\"> \u00a0\u00a0<\/span><span style=\"color: #993366;\"><b>\/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(WIREIN_NAME,<\/span><span style=\"color: #993366;\"><b>POSITION<\/b><\/span><span style=\"font-weight: 400;\">=40,<\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=53,<\/span><span style=\"color: #993366;\"><b>TYPE<\/b><\/span><span style=\"font-weight: 400;\">=ASCII)<\/span>\r\n<span style=\"font-weight: 400;\"> \u00a0\u00a0<\/span><span style=\"font-weight: 400; color: #3366ff;\"># WIREOUT RECORDS<\/span>\r\n<span style=\"font-weight: 400;\"> \u00a0\u00a0<\/span><span style=\"color: #993366;\"><b>\/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(WIREOUT_SECTION1,<\/span><span style=\"color: #993366;\"><b>POSITION<\/b><\/span><span style=\"font-weight: 400;\">=1,<\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=32,<\/span><span style=\"color: #993366;\"><b>TYPE<\/b><\/span><span style=\"font-weight: 400;\">=ASCII)<\/span>\r\n<span style=\"font-weight: 400;\"> \u00a0\u00a0<\/span><span style=\"color: #993366;\"><b>\/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(WIREOUT_FIELD, <\/span><span style=\"color: #993366;\"><b>POSITION<\/b><\/span><span style=\"font-weight: 400;\">=33, <\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=7)# This says WIREOUT<\/span>\r\n<span style=\"font-weight: 400;\"> \u00a0\u00a0<\/span><span style=\"color: #993366;\"><b>\/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(WIREOUT_NAME, <\/span><span style=\"color: #993366;\"><b>POSITION<\/b><\/span><span style=\"font-weight: 400;\">=41,<\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=22, <\/span><span style=\"color: #993366;\"><b>TYPE<\/b><\/span><span style=\"font-weight: 400;\">=ASCII)<\/span>\r\n<span style=\"font-weight: 400;\"> \u00a0\u00a0<\/span><span style=\"color: #993366;\"><b>\/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(WIREOUT_LAST, <\/span><span style=\"color: #993366;\"><b>POSITION<\/b><\/span><span style=\"font-weight: 400;\">=63,<\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=30, <\/span><span style=\"color: #993366;\"><b>TYPE<\/b><\/span><span style=\"font-weight: 400;\">=ASCII)<\/span>\r\n\r\n<span style=\"color: #993366;\"><b>\/REPORT<\/b>\r\n<b>\/OUTFILE<\/b><\/span><span style=\"font-weight: 400;\">=ALT_UPACH.out<\/span>\r\n<span style=\"color: #993366;\"><b>      \/PROCESS<\/b><span style=\"font-weight: 400;\">=<\/span><b>RECORD<\/b>\r\n<b>      \/INCLUDE<\/b> <b>WHERE<\/b><\/span><span style=\"font-weight: 400;\"> WIREIN_FIELD == <\/span><span style=\"font-weight: 400; color: #3366ff;\">\"WIREIN\"<\/span>\r\n<span style=\"color: #993366;\"><b>      \/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(WIREIN_SECTION1, <\/span><span style=\"color: #993366;\"><b>POSITION<\/b><\/span><span style=\"font-weight: 400;\">=1, <\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=32, <\/span><span style=\"color: #993366;\"><b>TYPE<\/b><\/span><span style=\"font-weight: 400;\">=ASCII)<\/span>\r\n<span style=\"color: #993366;\"><b>      \/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(WIREIN_FIELD, <\/span><span style=\"color: #993366;\"><b>POSITION<\/b><\/span><span style=\"font-weight: 400;\">=33, <\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=6, <\/span><span style=\"color: #993366;\"><b>TYPE<\/b><\/span><span style=\"font-weight: 400;\">=ASCII)<\/span>\r\n<span style=\"color: #993366;\"><b>      \/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(ENC_FP_WIREIN_NAME=enc_fp_aes256_alphanum(WIREIN_NAME),<\/span>\r\n<span style=\"font-weight: 400;\">  \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/span><span style=\"color: #993366;\"><b>POSITION<\/b><\/span><span style=\"font-weight: 400;\">=40, <\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=53, <\/span><span style=\"color: #993366;\"><b>TYPE<\/b><\/span><span style=\"font-weight: 400;\">=ASCII)<\/span>\r\n<span style=\"color: #993366;\"><b>\/OUTFILE<\/b><\/span><span style=\"font-weight: 400;\">=LT_UPACH.out<\/span>\r\n<span style=\"color: #993366;\"><b>      \/PROCESS<\/b><span style=\"font-weight: 400;\">=<\/span><b>RECORD<\/b>\r\n<b>      \/INCLUDE<\/b> <b>WHERE<\/b><\/span><span style=\"font-weight: 400;\"> WIREOUT_FIELD == <\/span><span style=\"font-weight: 400; color: #3366ff;\">\"WIREOUT\"<\/span>\r\n<span style=\"color: #993366;\"><b>      \/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(WIREOUT_SECTION1, <\/span><span style=\"color: #993366;\"><b>POSITION<\/b><\/span><span style=\"font-weight: 400;\">=1, <\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=32, <\/span><span style=\"color: #993366;\"><b>TYPE<\/b><\/span><span style=\"font-weight: 400;\">=ASCII)<\/span>\r\n<span style=\"color: #993366;\"><b>      \/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(WIREOUT_FIELD, <\/span><span style=\"color: #993366;\"><b>POSITION<\/b><\/span><span style=\"font-weight: 400;\">=33, <\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=7, <\/span><span style=\"color: #993366;\"><b>TYPE<\/b><\/span><span style=\"font-weight: 400;\">=ASCII)<\/span>\r\n<span style=\"color: #993366;\"><b>      \/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(ENC_FP_WIREOUT_NAME= enc_fp_aes256_alphanum(WIREOUT_NAME),<\/span>\r\n<span style=\"font-weight: 400;\">\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 <\/span><span style=\"color: #993366;\"><b>POSITION<\/b><\/span><span style=\"font-weight: 400;\">=41, <\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=22, <\/span><span style=\"color: #993366;\"><b>TYPE<\/b><\/span><span style=\"font-weight: 400;\">=ASCII)<\/span>\r\n<span style=\"color: #993366;\"><b>      \/FIELD<\/b><\/span><span style=\"font-weight: 400;\">=(WIREOUT_LAST, <\/span><span style=\"color: #993366;\"><b>POSITION<\/b><\/span><span style=\"font-weight: 400;\">=63, <\/span><span style=\"color: #993366;\"><b>SIZE<\/b><\/span><span style=\"font-weight: 400;\">=30, <\/span><span style=\"color: #993366;\"><b>TYPE<\/b><\/span><span style=\"font-weight: 400;\">=ASCII)<\/span><\/pre>\n<p><span style=\"font-weight: 400;\">Notice that there are two output files with the same name to cover both types of record formats (\u201cwirein\u201d and \u201cwireout\u201d). To mask the transaction sender and recipient names, a deterministic masking (<\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\/encrypt\/format-preserving-encryption\"><span style=\"font-weight: 400;\">format-preserving encryption<\/span><\/a><span style=\"font-weight: 400;\">) function was applied to the name fields.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">After running this FieldShield job from the GUI, command line, or job scheduler, the masked output file could look like this, noting the same character casing and spacing in the name field:<\/span><\/p>\n<pre><span style=\"font-weight: 400;\">D0000900110000000018300000020000WIREIN EURFRBE M QKBGLVQHN\u00a0 \u00a0 MWRVON OD QMJ (YNCVXW MJUKAHXW<\/span>\r\n<span style=\"font-weight: 400;\">D0000900110000000018300001750200WIREIN FMOOUKY0XVHK RHL \u00a0 \u00a0 \u00a0 HKQV DJM 3298 BKOCVG LX QLF 23<\/span>\r\n<span style=\"font-weight: 400;\">D0000900110000000018300000150000WIREIN MHP V IUEP OMFEHF; QTS.ATN KXEA XCJVYP GWDM SSALUEH <\/span>\r\n<span style=\"font-weight: 400;\">D0000900110000000018300017624287WIREIN BKVCIDT RMXZX VE BNMOCV14312813; BYA 874389WN\u00a0 EBU Y4<\/span>\r\n<span style=\"font-weight: 400;\">D0000900110000000018300000935781WIREIN YFGNI SOWPUXVI AO GSKPQ\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>\r\n<span style=\"font-weight: 400;\">D0000900110000000016300000100000WIREOUT S T ZCEUDIPPLY\u00a0 \u00a0 \u00a0 \u00a0 20241213B4LB4U1C000002\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>\r\n<span style=\"font-weight: 400;\">D0000000009800240711400000210000WIREOUT GqaptyvDyedqhtxQjiqjv.20241213B4LB4U1C000003\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>\r\n<span style=\"font-weight: 400;\">D0000900110000000016300000210000WIREOUT GqaptyvDyedqhtxQjiqjv.20241213B4LB4U1C000003\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span>\r\n<span style=\"font-weight: 400;\">D0000000009001792511400001682884WIREOUT <\/span><span style=\"font-weight: 400;\">Diltmcick<\/span> <span style=\"font-weight: 400;\">Zrdkjskn<\/span><span style=\"font-weight: 400;\"> Duo20241213B4LB4U1C000004\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/span>\r\n<span style=\"font-weight: 400;\">D0000000009601330411200055267563WIREOUT IFZPNS MCZVLO QDOJH \u00a0 20241213B4LB4U1C000005\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/span><\/pre>\n<p><span style=\"font-weight: 400;\">There are many other <\/span><a href=\"https:\/\/www.iri.com\/solutions\/data-masking\/static-data-masking\"><span style=\"font-weight: 400;\">data masking functions<\/span><\/a><span style=\"font-weight: 400;\"> available to FieldShield users, and all can be centralized as <\/span><a href=\"https:\/\/www.iri.com\/blog\/data-protection\/iri-data-classification\/\"><span style=\"font-weight: 400;\">data class rules<\/span><\/a><span style=\"font-weight: 400;\"> to preserve data integrity across a range of data sources.<\/span><\/p>\n<p><b>End Note<\/b><span style=\"font-weight: 400;\">: <\/span><i><span style=\"font-weight: 400;\">Please email <\/span><\/i><a href=\"mailto:fieldshield@iri.com\"><i><span style=\"font-weight: 400;\">fieldshield@iri.com<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> with any questions, see <\/span><\/i><i><span style=\"font-weight: 400;\">this article<\/span><\/i><i><span style=\"font-weight: 400;\"> on masking data in ACH files, and <\/span><\/i><a href=\"https:\/\/www.iri.com\/blog\/iri\/business\/data-masking-in-the-bfsi-sector\/\"><i><span style=\"font-weight: 400;\">this article<\/span><\/i><\/a><i><span style=\"font-weight: 400;\"> for more data masking use cases in the BFSI industry. <\/span><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Abstract: This article discusses the content and obfuscation of historically used banking industry files using the IRI FieldShield data masking tool on proprietary tag-based formats (e.g., {1500}, {4200}. For Fedwire files using newer ISO 20022 XML formats, use IRI DarkShield.\u00a0\u00a0 Fedwire files are structured electronic messages that conform to the Federal Reserve\u2019s required formats, enabling<\/p>\n<div><a class=\"btn-filled btn\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/\" title=\"Masking PII in Fedwire Files\">Read More<\/a><\/div>\n","protected":false},"author":10,"featured_media":18933,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8,34],"tags":[2338,14,1813,2336,2337,2248,98,1388,520,2340,1306,2339],"class_list":["post-18922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-business","tag-banking-compliance","tag-data-masking","tag-deterministic-masking","tag-fedwire","tag-fedwire-files","tag-financial-data-security","tag-format-preserving-encryption","tag-iri-darkshield","tag-iri-fieldshield","tag-iso-20022","tag-pii-masking","tag-wire-transfer-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v23.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Masking PII in Fedwire Files - IRI<\/title>\n<meta name=\"description\" content=\"Explore Fedwire and its essential role in electronic payments. Learn how to navigate its formats and details effectively.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Masking PII in Fedwire Files\" \/>\n<meta property=\"og:description\" content=\"Explore Fedwire and its essential role in electronic payments. Learn how to navigate its formats and details effectively.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/\" \/>\n<meta property=\"og:site_name\" content=\"IRI\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-23T21:28:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Masking-PII-in-Fedwire-Files-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1110\" \/>\n\t<meta property=\"og:image:height\" content=\"532\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Susan Gegner\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Susan Gegner\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/\"},\"author\":{\"name\":\"Susan Gegner\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/87be5da567628ab9396ca81170f36d63\"},\"headline\":\"Masking PII in Fedwire Files\",\"datePublished\":\"2025-12-23T21:28:17+00:00\",\"dateModified\":\"2025-12-23T21:28:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/\"},\"wordCount\":393,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Masking-PII-in-Fedwire-Files-1.png\",\"keywords\":[\"banking compliance\",\"data masking\",\"Deterministic Masking\",\"Fedwire\",\"Fedwire files\",\"Financial Data Security\",\"format-preserving encryption\",\"IRI DarkShield\",\"IRI FieldShield\",\"ISO 20022\",\"pii masking\",\"wire transfer security\"],\"articleSection\":[\"Data Masking\/Protection\",\"IRI Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/\",\"url\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/\",\"name\":\"Masking PII in Fedwire Files - IRI\",\"isPartOf\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Masking-PII-in-Fedwire-Files-1.png\",\"datePublished\":\"2025-12-23T21:28:17+00:00\",\"dateModified\":\"2025-12-23T21:28:17+00:00\",\"description\":\"Explore Fedwire and its essential role in electronic payments. Learn how to navigate its formats and details effectively.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#primaryimage\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Masking-PII-in-Fedwire-Files-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Masking-PII-in-Fedwire-Files-1.png\",\"width\":1110,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.iri.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Masking PII in Fedwire Files\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.iri.com\/blog\/#website\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"name\":\"IRI\",\"description\":\"Total Data Management Blog\",\"publisher\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.iri.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.iri.com\/blog\/#organization\",\"name\":\"IRI\",\"url\":\"https:\/\/www.iri.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"contentUrl\":\"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png\",\"width\":750,\"height\":206,\"caption\":\"IRI\"},\"image\":{\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/87be5da567628ab9396ca81170f36d63\",\"name\":\"Susan Gegner\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2b1ca5592a65d44483351292cf1ae00a?s=96&d=blank&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2b1ca5592a65d44483351292cf1ae00a?s=96&d=blank&r=g\",\"caption\":\"Susan Gegner\"},\"url\":\"https:\/\/www.iri.com\/blog\/author\/susang\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Masking PII in Fedwire Files - IRI","description":"Explore Fedwire and its essential role in electronic payments. Learn how to navigate its formats and details effectively.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/","og_locale":"en_US","og_type":"article","og_title":"Masking PII in Fedwire Files","og_description":"Explore Fedwire and its essential role in electronic payments. Learn how to navigate its formats and details effectively.","og_url":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/","og_site_name":"IRI","article_published_time":"2025-12-23T21:28:17+00:00","og_image":[{"width":1110,"height":532,"url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Masking-PII-in-Fedwire-Files-1.png","type":"image\/png"}],"author":"Susan Gegner","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Susan Gegner","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#article","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/"},"author":{"name":"Susan Gegner","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/87be5da567628ab9396ca81170f36d63"},"headline":"Masking PII in Fedwire Files","datePublished":"2025-12-23T21:28:17+00:00","dateModified":"2025-12-23T21:28:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/"},"wordCount":393,"commentCount":0,"publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Masking-PII-in-Fedwire-Files-1.png","keywords":["banking compliance","data masking","Deterministic Masking","Fedwire","Fedwire files","Financial Data Security","format-preserving encryption","IRI DarkShield","IRI FieldShield","ISO 20022","pii masking","wire transfer security"],"articleSection":["Data Masking\/Protection","IRI Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/","url":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/","name":"Masking PII in Fedwire Files - IRI","isPartOf":{"@id":"https:\/\/www.iri.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#primaryimage"},"image":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#primaryimage"},"thumbnailUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Masking-PII-in-Fedwire-Files-1.png","datePublished":"2025-12-23T21:28:17+00:00","dateModified":"2025-12-23T21:28:17+00:00","description":"Explore Fedwire and its essential role in electronic payments. Learn how to navigate its formats and details effectively.","breadcrumb":{"@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#primaryimage","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Masking-PII-in-Fedwire-Files-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Masking-PII-in-Fedwire-Files-1.png","width":1110,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/www.iri.com\/blog\/data-protection\/masking-pii-in-fedwire-files\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.iri.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Masking PII in Fedwire Files"}]},{"@type":"WebSite","@id":"https:\/\/www.iri.com\/blog\/#website","url":"https:\/\/www.iri.com\/blog\/","name":"IRI","description":"Total Data Management Blog","publisher":{"@id":"https:\/\/www.iri.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.iri.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.iri.com\/blog\/#organization","name":"IRI","url":"https:\/\/www.iri.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","contentUrl":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2019\/02\/iri-logo-total-data-management-small-1.png","width":750,"height":206,"caption":"IRI"},"image":{"@id":"https:\/\/www.iri.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/87be5da567628ab9396ca81170f36d63","name":"Susan Gegner","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.iri.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/2b1ca5592a65d44483351292cf1ae00a?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2b1ca5592a65d44483351292cf1ae00a?s=96&d=blank&r=g","caption":"Susan Gegner"},"url":"https:\/\/www.iri.com\/blog\/author\/susang\/"}]}},"jetpack_featured_media_url":"https:\/\/www.iri.com\/blog\/wp-content\/uploads\/2025\/12\/Masking-PII-in-Fedwire-Files-1.png","_links":{"self":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18922"}],"collection":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/comments?post=18922"}],"version-history":[{"count":7,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18922\/revisions"}],"predecessor-version":[{"id":18924,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/posts\/18922\/revisions\/18924"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media\/18933"}],"wp:attachment":[{"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/media?parent=18922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/categories?post=18922"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.iri.com\/blog\/wp-json\/wp\/v2\/tags?post=18922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}