Overview of Data Masking

Data masking protects sensitive customer information by controlling what data is visible to different users and systems. When enabled, Capillary replaces sensitive field values with masked characters in the Member Care UI, API responses, and the analytics platforms unless explicit access is granted.

This ensures that sensitive information is:

  • Visible only to authorized users or API clients
  • Protected from accidental or unnecessary exposure
  • Handled in line with internal security and privacy requirements

Example

A customer’s mobile number is stored in the system.

  • A support user without permission sees the value as ****** in Member Care and in the API responses.
  • An authorized user or API client sees the full mobile number on Member Care and in the API responses

How data masking works

Capillary evaluates masking for each request based on:

Once enabled, this configuration applies across:

  • Member Care UI
  • All APIs
  • Analytics platform (Databricks)

What data is masked

When data masking is enabled, certain customer identifiers are handled automatically, while others require you to explicitly mark them as personally sensitive data. Once a field is marked, the same masking behaviour is applied consistently across Member Care, API responses, and Databricks.

Data masking in Member Care & APIs

Data typeMasked by defaultRequires explicit marking
Core customer identifiers (first name, last name, and mobile, email)YesNo
Identifiers under communication channelYesNo
Customer profile custom fieldsNoYes (mark as PSI)
Customer profile extended fieldsNoYes (mark as PSI)
Behavioural event attributesNoYes (mark as PSI)
📘

Note

External IDs are not masked. Card data, Transaction or billing data, and other data other than the mentioned above data are not masked.

Data masking in Databricks

In Databricks, sensitive customer data is masked by default and displayed as asterisks (*****). Unmasked values are shown only when the user or job has been explicitly authorised to access sensitive data.

Data categoryMasked in DatabricksNotes
Core customer identifiersYesFirst name, last name, email, mobile number, external ID
Customer profile custom fieldsYes, if marked as PSIMust be explicitly marked to be masked
Customer profile extended fieldsYes, if marked as PSIMust be explicitly marked to be masked
User (customer) profile tablesYesMasking applies to PSI-marked fields
Type-2 (history-tracking) user dimension tablesYesApplicable only to the USHC cluster
Card dataNoNot supported
Transaction or billing dataNoNot supported
Behavioural event dataNoNot masked in Databricks
Any other non-customer dataNoNot supported

Impact of data masking on existing and new users

When data masking is enabled for an organisation, the behaviour is the same for both existing and new users. All classified sensitive data is masked by default unless the user has access to sensitive data. By deafult, PSI data masking is disabled

Managing access to masked data

Capillary applies PSI masking differently for Member Care users and API clients.

Access typeWhat controls masking
Access to sensitive data on Member CareAccess to VIEW_MASKED_DATA permission set
Access to sensitive data in the API responsesAPI client with PSI permission

PSI masking in Member Care

In Member Care, access to masked data is controlled by user access.

How it works

When data masking is enabled for the organization:

  • Users without access to VIEW_MASKED_DATA permission set see masked values (*****) for masked fields.
  • Users access see unmasked values.

PSI masking for APIs

For APIs, data masking is controlled by API client permissions, not user roles.

How it works

When PSI masking is enabled for the organization:

  • API clients without access to masked data receive masked values for PSI-marked fields.
  • API clients with access receive unmasked values.
🚧

Data masking is not applicable for Basic Authentication. It is recommended to use OAuth.

Enabling data masking

By default, data masking is disabled for all organizations. To enable, perform the following:

  1. From Organization settings, navigate to Organization Setup -> PII Configurations.

  2. To enable the PII deletion, select the CONF_PSI_MASKING_ENABLED check box.

Behaviour

Once enabled, this configuration applies across:

  • Member Care UI
  • All APIs
  • Analytics platform (Databricks)