Redaction allows you to identify and mask sensitive information from transcriptions to protect privacy and comply with data protection regulations. The Pulse STT API supports two types of redaction: PII (Personally Identifiable Information) and PCI (Payment Card Information).
Add redact_pii and/or redact_pci parameters to your WebSocket connection query parameters. Both parameters default to false. Options: true, false.
redact_pii)When redact_pii=true is enabled, the following types of personally identifiable information are automatically identified and redacted:
Redacted PII items are replaced with placeholder tokens like [FIRSTNAME_1], [FIRSTNAME_2], [PHONENUMBER_1], etc.
redact_pci)When redact_pci=true is enabled, the following types of payment card information are automatically identified and redacted:
Redacted PCI items are replaced with placeholder tokens like [CREDITCARDCVV_1], [ZIPCODE_1], [ACCOUNTNUMBER_1], etc.
When redaction is enabled, the transcription text contains placeholder tokens instead of the original sensitive information. The response also includes a redacted_entities array listing all the redacted entity placeholders.
Redacted entities are replaced with placeholder tokens following the pattern:
[ENTITYTYPE_N] where ENTITYTYPE indicates the type of information (e.g., FIRSTNAME, PHONENUMBER, CREDITCARDCVV, ZIPCODE, ACCOUNTNUMBER)N is a sequential number starting from 1 to uniquely identify each instanceExamples:
[FIRSTNAME_1], [FIRSTNAME_2] - First names[PHONENUMBER_1] - Phone numbers[CREDITCARDCVV_1] - Credit card CVV codes[ZIPCODE_1] - ZIP/Postal codes[ACCOUNTNUMBER_1] - Account numbersFor the highest level of protection and effective compliance auditing, enable both redact_pii=true and redact_pci=true flags in your request.
Additionally, use the redacted_entities array in the response as an audit trail to track what data has been redacted from each transcript.
Redaction helps with compliance requirements for:
Note: Redaction is a tool to help protect sensitive information, but it should be used as part of a comprehensive data protection strategy. Always consult with legal and compliance teams to ensure your implementation meets regulatory requirements.