As illustrated in FIG. 1, exemplary system 100 may also include one or more databases, such as database 120. In one example, database 120 may be configured to store data loss prevention policies 122, which may correspond to policies that specify which data is defined as sensitive data that should be prevented from leaking and/or specify how to prevent the sensitive data from leaking. As used herein, the term “policy” generally refers to any specification of one or more rules or procedures for preventing data loss, as discussed further below. Database 120 may also be configured to store sensitive data 124. As used herein, the term “sensitive data” generally refers to data that is defined as protected according to one or more data loss prevention policies. In other words, upon detecting one or more actions that may potentially leak sensitive data, the data loss prevention system may be triggered to take one or more actions in response to prevent the potential leak.
Database 120 may represent portions of a single database or computing device or a plurality of databases or computing devices. For example, database 120 may represent a portion of server 206 in FIG. 2, computing system 610 in FIG. 6, and/or portions of exemplary network architecture 700 in FIG. 7. Alternatively, database 120 in FIG. 1 may represent one or more physically separate devices capable of being accessed by a computing device, such as server 206 in FIG. 2, computing system 610 in FIG. 6, and/or portions of exemplary network architecture 700 in FIG. 7.