Skip to main content

Egnyte Unveils AI Agents to Boost Efficiency and Reduce Risk for the Architecture, Engineering, and Construction Industry

MOUNTAIN VIEW, Calif., September 9, 2025 – Egnyte, a leader in secure content collaboration, intelligence, and governance, today announced its first industry-specific AI agents specifically designed to support the unique needs of the Architecture, Engineering, and Construction (AEC) industry. These AEC AI agents target some of the most time-consuming and costly parts of the process, from bid to completion, by addressing some of the most labor-intensive tasks involving often very complex documents. The company’s first AEC AI agents embed secure, domain-specific AI into critical workflows to extract details from large specification files and quickly deliver AI guidance for building code compliance.

“Today’s announcement of embedding industry-specific AI agents into Egnyte’s platform marks an important milestone in how end users can engage with AI. These tools enable customers to take advantage of the power of AI without having to move their data and potentially expose it to security, compliance, and governance risks,” said Amrit Jassal, Co-Founder and Chief Technology Officer at Egnyte. “The AEC industry relies heavily on complex, content-intensive documents to make informed decisions throughout the project lifecycle, and a single error in a spec sheet or misinterpretation of a building code can lead to significant project delays and cost overruns. These AEC AI agents fundamentally reduce project risk and help firms to deliver better, more profitable outcomes.”

Egnyte’s Specifications Analyst allows users to transform any size specification document or multiple documents into source data that delivers fast and useful answers. Users can apply smart filters, including table of contents and materials, to quickly locate key sections and aggregate extracted spec data across the spec divisions.

The Building Code Analyst consolidates disparate codebooks (i.e., state, county, and municipality) into a unified source of truth. This agent enables users to quickly find, compare, and check code requirements across relevant codebooks and produce consistent, useful AI-powered answers. The agent instantly surfaces key passages with links to the relevant source text and automatically flags overlapping or contradictory code provisions, even providing the ability to include previous clarifications to speed up the resolution of such issues.

All of Egnyte’s AI agents have access to content in the Egnyte repository while preserving its security, compliance, and data governance. The agents also have access to data sources on the internet to ensure their outputs reflect the latest updates and amendments to building codes and other relevant information without compromising data saved in Egnyte repositories.

For more information on Egnyte’s Specifications Analyst, click here, and to learn more about the Building Code Analyst, click here. And for a more general overview of Egnyte’s AI agents, click here.

ABOUT EGNYTE

Egnyte combines the power of cloud content management, data security, and AI into one intelligent content platform. More than 22,000 customers trust Egnyte to improve employee productivity, automate business processes, and safeguard critical data, in addition to offering specialized content intelligence and automation solutions across industries, including architecture, engineering, and construction (AEC), life sciences, and financial services. For more information, visit www.egnyte.com.


Global Press & Media Contact

What is Data Governance?

Every day, critical business data is created, moved, and stored across disconnected systems. Customer insights, financial records, and proprietary assets often end up fragmented, leaving organizations exposed to risk.  

This is where a strong data governance strategy becomes essential. It forms the foundation for operational agility, regulatory compliance, and long-term growth. A compelling example is the Harvard Law Library Innovation Lab’s preservation of over 311,000 vulnerable government datasets, demonstrating the urgency and value of proactive data stewardship. 

When organizations embed enterprise data governance into their core operations, they  make faster decisions by 20-40% on  average, improve transparency, and sustain trust. But those that treat governance as a checkbox, rather than a business enabler, risk falling behind in a marketplace where data-driven agility determines who leads and who’s left behind. 

Why Is Data Governance Important?

Understanding what data governance is and why it is important begins with recognizing the risks of its absence. Without a structured framework, organizations face inconsistent data, regulatory exposure, and poor decision-making. Effective data governance ensures that information is accurate, reliable, and accessible, enabling teams to drive innovation, improve outcomes, and meet compliance standards with confidence. 

Benefits of Data Governance

Data Governance and Compliance

Modern regulations require more than basic security measures. Enterprise data governance offers a structured approach to meet complex compliance demands such as GDPR, CPRA, HIPAA, and industry-specific standards. It enables organizations to maintain detailed audit trails, enforce access control, and document data lineage with precision.

Data Governance Goals

Strategic governance is more than maintaining control. It ensures data actively supports business goals. When information governance aligns with core objectives, it improves data quality, strengthens security, supports compliance, and accelerates decision-making while maintaining the right balance between accessibility and protection.

Modern data governance solutions provide integrated platforms that automate these essential elements while maintaining comprehensive oversight and control capabilities.

Roles in Data Governance 

Effective governance starts with clear roles and accountability. Each player brings focused expertise, creating a system of checks, balances, and smart oversight that keeps data strategy on course. 

  • The chief data officer provides executive leadership and strategic direction for enterprise-wide initiatives. 
  • Data owners establish policies and approve access within their domains. 
  • Data stewards implement daily governance activities, including quality monitoring and policy enforcement. 
  • Data governance committees review policies, resolve conflicts, and guide strategic decisions. 

Data Governance Frameworks: Key Components and Best Practices

Data governance principles rely on structured frameworks that guide policy creation, implementation, and continuous improvement. These frameworks provide the foundation for effective programs by defining governance policies, roles and responsibilities, supporting technologies, operational processes, and performance measurement standards.

Data Governance Framework | Egnyte

Three Pillars of a Successful Data Governance Program 

Successful programs rest on three foundational pillars, ensuring sustainable capabilities. 

  • People bring the leadership, expertise, and support needed to drive implementation forward. 
  • Process translates requirements into action through defined policies, procedures, and workflow. 
  • Technology delivers the tools and automation that make governance scalable, consistent, and sustainable. 

How to Use a Data Governance Framework?

How to use Data Governance Framework | Egnyte

Data Governance for Establishing Acceptable Data Terms

Governance frameworks create a shared vocabulary that ensures consistent understanding across teams and systems. Data management governance supports this by establishing business glossaries, data dictionaries, and semantic standards that guide  system design and user engagement with critical information assets. 

Data Governance Best Practices

  • Secure executive sponsorship to ensure leadership team’s backing and resource allocation. 
  • Engage stakeholders across departments to build cross-functional alignment. 
  • Roll out governance in phases to deliver early wins and demonstrate value. 
  • Define roles clearly to avoid confusion and ensure accountability. 
  • Standardize data policies and procedures across the organization. 
  • Monitor data quality continuously to maintain accuracy and consistency. 
  • Align governance efforts with regulatory compliance requirements. 
  • Provide regular training to build awareness and reinforce best practices. 
  • Measure performance and refine the strategy based on evolving needs. 

Data Governance Challenges

  • Data silos limit visibility and hinder enterprise-wide consistency. 
  • Lack of ownership causes ambiguity in data accountability. 
  • Poor data quality leads to flawed insights and decision-making. 
  • Resistance to change slows the adoption of governance frameworks. 
  • Insufficient leadership support stalls progress and impairs funding. 
  • Inconsistent standards create confusion across systems and teams. 
  • Manual processes increase errors and reduce scalability. 
  • Regulatory complexity makes compliance difficult to maintain. 
  • Lack of clear KPIs impedes measurement of governance success. 
  • Tool overload creates fragmented governance efforts. 

Data Governance Tools

Data Governance Tools | Egnyte

 

Questions to Consider When Selecting a Tool 

  • Does it support automated data discovery and classification? 
  • Can it enforce policies across multiple systems and formats? 
  • Does it offer real-time alerts and reporting? 
  • How well does it integrate with your existing tech stack? 
  • Is it scalable for future growth? 

Capabilities Checklist for Selecting a Tool 

  • Data Cataloging & Metadata Management – Discover, classify, and organize assets with rich metadata. 
  • Data Lineage & Quality – Track data flow and ensure accuracy through built-in quality checks. 
  • Access Control & Policy Enforcement – Role-based permissions and automated policy governance. 
  • Compliance Monitoring – Tools to manage GDPR, CPRA, HIPAA, and other regulations. 
  • Collaboration & Stewardship – Business glossaries, workflows, and audit trails for transparency. 
  • Integration & Scalability – Works across cloud, hybrid, and legacy systems with pre-built connectors. 
  • AI-Powered Automation – Optional Machine Learning-based tagging, anomaly detection, and smart suggestions. 
  • User Experience & Support – Intuitive UI with training, documentation, and vendor support. 

Why Should You Opt for Cloud Data Governance?

Cloud data governance offers scalable, real-time oversight of data across distributed systems. It ensures consistent data quality, privacy, and compliance, even in hybrid or multi-cloud environments. With automated policy enforcement, centralized visibility, and agile controls, cloud-based governance empowers teams to manage growing data volume without compromising on security or performance. It’s essential for modern enterprises that prioritize speed, resilience, and regulatory alignment in today’s digital ecosystem.

Steps to Achieve Effective Cloud Data Governance

As cloud adoption accelerates, so does the complexity of managing data securely and compliantly. Fragmented environments, growing regulatory demands, and the sheer volume of unstructured data make traditional governance models insufficient. 

Here’s a step-by-step approach to getting it right: 

  1. Define Clear Governance Goals: Align objectives with business strategy, compliance needs, and operational efficiency. 
  2. Establish a Governance Framework: Set policies, roles, and processes for accountability and data stewardship. 
  3. Identify and Classify Critical Data: Use intelligent tools to locate sensitive or regulated data across systems. 
  4. Apply Access and Usage Controls: Enforce role-based access, encryption, and retention policies. 
  5. Monitor, Audit, and Adapt: Continuously track data movement, usage patterns, and policy effectiveness. 

Industry leaders like Egnyte provide purpose-built cloud governance solutions that unify visibility, automate compliance, and support secure collaboration at scale. Their platform is designed to simplify data governance and control data without slowing down innovation. 

Moreover, with Egnyte Intelligence, organizations gain AI-powered visibility, risk identification, and automated classification, transforming governance from a static process into a dynamic, adaptive capability. 

Conclusion

The longer organizations delay cloud data governance, the more exposed and reactive they become. Regulatory requirements are tightening. Stakeholder expectations are rising. And in this environment, being unprepared is no longer an option. 

Egnyte helps businesses take control before the chaos takes over. With built-in compliance automation, granular policy enforcement, and Egnyte Intelligence for AI-powered visibility, it equips teams to govern smarter, scale faster, and move with confidence. 

Frequently Asked Questions

What Are Some Basic Data Governance Principles? 

Data governance principles include accountability, transparency, quality assurance, security protection, and regulatory compliance through systematic policies and controls. 

What is at the Core of Data Governance? 

Quality, security, and accessibility form the core, ensuring information assets support business objectives while maintaining appropriate protection measures. 

What is Data Governance in ETL (Extract Transform Load)? 

Data governance in ETL ensures data quality, lineage tracking, and security controls throughout the extraction, transformation, and loading processes. 

How is Data Governance Different from Data Management? 

Data governance establishes policies and standards while data management implements technical processes and systems for information handling and storage. 

What is Data Governance in SQL? 

Data governance in SQL includes access controls, query auditing, data classification, and security policies for database environments and operations. 

Last Updated: 25th November 2025
Start streamlining your compliance, security, and efficiency now!

Controlled Unclassified Information (CUI)

Sensitive data flows across emails, shared drives, and cloud folders are prevalent in critical business operations. The information might not be “top secret,” but if it gets into the wrong hands, the consequences can be serious: Operational disruption, reputational damage, or even national security concerns.  

For organizations working with the U.S. Department of Defense, a large chunk of this sensitive data falls under a category known as Controlled Unclassified Information (CUI). This includes all information that isn’t classified, from engineering drawings and technical manuals to supply chain details. 

To make sure CUI is properly protected for DoD contractors and subcontractors, the DoD introduced CMMC 2.0, a framework that helps contractors prove they can secure sensitive data throughout their supply chain. Meeting the framework’s requirements involves building trust with federal agencies like the DoD and showing that your organization takes data protection seriously. 

Designed for hybrid and cloud-first environments, Egnyte’s Content Security & Governance platform and our EgnyteGov U.S. Federal Agency solutions gives you the tools to answer those questions confidently. 

What is CUI specified?

CUI is sensitive information that is not classified but must be safeguarded. However, neither  Executive Order 13526 nor the Atomic Energy Act classify this information. The CUI program aims to standardize the handling, marking, and dissemination of sensitive but unclassified information across federal agencies.

Understanding CUI Classification: Basic vs Specified

Understanding CUI Classification: Basic vs Specified 

Within the CUI framework, there are two key categories every executive leader should understand: CUI Basic and CUI Specified. 

CUI Basic 

CUI Basic refers to information that requires protection but does not have additional handling requirements beyond the standard controls outlined in the federal CUI regulations (32 CFR Part 2002). This category is governed by a uniform set of rules that apply across all agencies. 

For example, internal reports, draft policy documents, or general personally identifiable information may fall under CUI Basic. While such information isn’t highly sensitive, mishandling it could still result in reputational or operational risk. Standard access control processes, proper marking, and responsible dissemination are required. 

CUI Specified 

CUI Specified includes information that is subject to additional safeguarding or dissemination controls, as mandated by specific laws, regulations, or government-wide policies. In other words, there are defined legal authorities that dictate exactly how this data must be handled. 

Examples include export-controlled data (like, under ITAR), health records protected by HIPAA, or federal tax information under IRS codes. This category often requires stricter controls, such as limited user access, enhanced encryption, or storage in controlled environments, based on the governing policy. 

Key Distinction for Decision-Makers 

The primary difference lies in compliance complexity: 

  • CUI Basic follows a standard baseline of protection. 
     
  • CUI Specified demands additional compliance tied to specific legal or regulatory frameworks.  

As an executive, it’s important to ensure that your teams understand these distinctions, implement the correct controls, and remain compliant with the relevant authorities, especially during audits, data-sharing agreements, or cross-agency collaboration. 

Types of Controlled Unclassified Information  

Every single category of CUI is crucial for different reasons. So, mishandling any of them could expose one to legal, financial, or security risk. Here’s a look at some of the most common types of CUI:  

Privacy Information 

Any personal details that are protected under privacy laws like the Privacy Act of 1974 or the Health Insurance Portability and Accountability Act (HIPAA) are included. Examples are included below: 

  • One’s full name, Social Security number, and date of birth 
  • Medical records, Insurance information 
  • Passport numbers or driver’s license data 
  • Employment history or personnel files 

Safeguarding personal information is crucial for maintaining privacy, complying with legal requirements, and preventing serious consequences, such as identity theft, financial fraud, or reputational damage. It not only harms individuals but can also result in significant penalties and loss of trust for organizations. 

Financial Information 

Applicable laws, such as the Gramm-Leach-bliley Act (GLBA) and various federal financial regulations, typically protect financial information. Below are the common data types included under the category: 

  • Bank account numbers 
  • Credit card information 
  • Tax returns and audit data 
  • Financial aid applications 
  • Payroll information 

Protecting financial information is critical, as it’s often a prime target for fraud, identity theft, and cyberattacks. Exposure can lead to severe monetary losses, legal consequences, and damaged reputations for individuals and organizations alike. Strong security measures ensure this sensitive data remains confidential, accurate, and available only to authorized parties. 

Proprietary Business Information 

Sometimes referred to as “trade secrets” or “confidential business information,” this type of CUI protects competitive business data. This is especially relevant when private companies work on government contracts. Examples include: 

  • Product designs or schematics 
  • Manufacturing processes 
  • Marketing strategies 
  • Contract proposals 
  • Internal reports or analysis 

Protecting proprietary business information is critical to maintaining a competitive edge, preserving innovation, and fulfilling contractual obligations. A leak, whether intentional or accidental, can result in financial loss, erode client trust, and compromise a company's reputation in government partnerships. Strong data governance enables this sensitive content to remain secure throughout its lifecycle.  

Law Enforcement Information 

Data related to criminal investigations, police operations, or any other law enforcement-related activities is listed in this category. The information types are listed as follows: 

  • Witness statements or evidence logs 
  • Surveillance reports 
  • Arrest records, especially in ongoing cases 
  • Sensitive communications between crucial agencies 

Protecting law enforcement information is crucial to maintaining the integrity of investigations, safeguarding the identities of individuals involved, and ensuring public safety. Unauthorized access or disclosure can hinder active cases, compromise operational tactics, and put the lives of officers, witnesses, and victims at risk.  

Critical Infrastructure Information 

This category includes CUI deals with the systems and services vital to the country’s functioning, like energy, water, transportation, and communications. The Critical Infrastructure Information Act protects data related to: 

  • Utility systems and layouts 
  • Security plans for transportation hubs 
  • Emergency response strategies 
  • Technical data about dams, pipelines, and power grids 

Protecting critical infrastructure information is essential to national security and public safety. If compromised, this data could be exploited to disable power grids, disrupt water supply, or paralyze transportation systems.  

Export Control Information 

This category includes information related to defense items or technology subject to export controls. The International Traffic in Arms Regulations and Export Administration Regulations help protect data, including: 

  • Military equipment specifications 
  • Satellite or space technology 
  • Software with encryption functions 
  • Research data related to weapons or defense 

Information governed by export control laws is highly sensitive and as it has direct implications for national defense and global stability. Unauthorized access or leaks can result in severe legal penalties, compromise military operations, and put lives in danger.  

Legal Information 

This refers to sensitive legal documents that are not public but are still important to protect. Such legal information includes: 

  • Pre-decisional legal opinions or drafts 
  • Attorney-client communications 
  • Court filings under seal 
  • Settlement negotiations 

Legal information often contains confidential advice, ongoing case details, or sensitive negotiations. Unauthorized access or premature disclosure can compromise legal strategy, breach client privilege, and impact judicial outcomes or policy decisions.  

Procurement and Acquisition Information 

This type of CUI includes details about government purchasing, bids, and contracts. The following types of data are protected to ensure a fair and competitive process. 

  • Bid proposals 
  • Pricing estimates 
  • Contract negotiations 
  • Technical evaluation data 

Protecting procurement and acquisition data is critical to maintaining the integrity of government contracting. Exposure of bids, pricing, or evaluation details can lead to unfair advantages, legal disputes, and compromised vendor trust. 

Intelligence and Defense-Related Information (Unclassified) 

This defense-related unclassified data includes military strategies, logistics plans, or partner agreements. Some examples are included below: 

  • Deployment schedules 
  • Non-classified military research 
  • Joint exercises with allies 
  • Defense supply chain data 

Exposure of deployment plans, research data, or supply chain details could compromise operational readiness and national security. Protecting this data helps prevent adversaries from exploiting gaps in coordination, logistics, or partnerships. 

Immigration and Border Protection Data 

This information applies to individuals entering or leaving the country, visa applications, and border patrol strategies. It preserves data integrity for: 

  • Visa interview transcripts 
  • Immigration case files 
  • Travel surveillance reports 

Protecting immigration and border protection data is critical to national security and individual privacy. Mishandling this information can lead to identity theft, legal disputes, or compromised enforcement strategies. Following the confidentiality protocols upholds compliance with regulatory standards and safeguards the integrity of immigration processes and border operations. 

Where to Find the Full List?

Where to Find the Full List? 

A CUI Registry from the U.S government is listed with all the recognized CUI categories and the applicable laws and regulations, as well. The National Archives and Records Administration shares this online database. One can visit the registry to explore every CUI category, its definition, and the handling instructions. 

Visit the CUI Registry website here: https://www.archives.gov/cui 

CUI Compliance and System Requirements

Companies that deal with Federal regulations that CUI must abide by include 

  • The CUI program is established by Executive Order 13556. 
  • 32 CFR Part 2002 offers comprehensive instructions for managing CUI 

Organizations must also follow the guidance below regarding safeguarding CUI: 

  • NIST SP 800-171: The standard focuses on strengthening cybersecurity across the government supply chain by defining clear security requirements for contractors handling CUI. It is essential to national security and mission success. 

  • NIST SP 800-53: It helps manage risk and protect operations, assets, and individuals from cyber threats. The framework supports compliance with federal mandates while promoting a flexible, outcome-based security approach. 

  • FIPS Publication 199: It requires agencies to evaluate and label systems as low, moderate, or high impact, helping prioritize security efforts. These categories guide the selection of appropriate safeguards across federal IT environments 

  • FIPS Publication 200: The purpose is to set mandatory, minimum security requirements for all federal information and systems, excluding national security systems. It specifies 17 key control areas such as access control, incident response, and contingency planning. 

Protecting Managed Unclassified Information

Strong security measures must be implemented to protect Controlled Unclassified Information (CUI). The suggested practices are given below: 

Protecting Managed Unclassified Information | Egnyte

How Microsoft 365 Supports Controlled Unclassified Information (CUI) Protection

Microsoft 365 offers a suite of integrated security and compliance tools designed to help organizations identify, protect, and manage Controlled Unclassified Information (CUI) across their digital environments. These solutions integrate with Egnyte’s Governance solutions.  

Here's how each feature contributes to a more secure and compliant workflow: 

Data Loss Prevention (DLP) 

Microsoft 365’s DLP policies help organizations automatically detect and prevent the unintentional sharing of CUI. By scanning emails, documents, and chat messages in real-time, DLP ensures that sensitive content doesn’t leave the organization without proper authorization, reducing the risk of data leaks and compliance violations. Additional information about Egnyte’s integration with Microsoft’s DLP solutions can be found here 

Information Rights Management (IRM) 

IRM enables organizations to restrict access to emails and documents that contain CUI. It applies usage rights such as “read-only,” prevents forwarding or printing, and allows access only to authorized individuals. This ensures sensitive data remains controlled, even if it’s accidentally sent to the wrong person. 

Azure Information Protection (AIP): 

AIP provides automated classification and labeling for documents and emails, based on content sensitivity. This means CUI is consistently marked, tracked, and protected, even as it moves between users, devices, or cloud services. Labels can also trigger encryption and access control policies, enhancing security throughout the data lifecycle. 

Compliance Manager 

Microsoft’s Compliance Manager helps organizations assess, monitor, and improve their compliance posture. It maps controls to frameworks like NIST SP 800-171, offering actionable insights and risk-based scoring. For teams handling CUI, this tool adds measurable visibility into how well internal practices align with federal compliance requirements. 

Best Practices for CUI Management

In order to effectively handle CUI, organizations need  to: 

  • Create a CUI Program: Assign a CUI Program Manager to supervise compliance with the initiative 
  • Create policies and processes: Establish precise rules for managing, identifying, and protecting Controlled Unclassified Information 
  • Implement Security Controls: To safeguard CUI, implement administrative and technical controls 
  • Provide Training: Employees should receive regular training on CUI best practices and requirements, and management should make the training compulsory for users who manage CUI 
  • Monitor and Audit: To guarantee compliance, examine CUI handling and access on a continual basis 

CUI Labeling and Managing

For compliance, CUI must be handled and marked correctly. Included are guidelines: 

  • Document Marking: Clearly mark documents that contain CUI with the appropriate markings 
  • Portion Marking: Show which sections of a document contain CUI 
  • Handling Guidelines: Adhere to the precise guidelines for handling various types of CUI 
  • Decontrolling: When the data is no longer protected, remove the CUI markings 
  • Destruction: When CUI is no longer needed, just securely destroy the data 

Conclusion

CUI is crucial for protecting sensitive but unclassified data. The CUI program promotes information integrity by establishing consistent standards for file sharing, handling, and safeguarding. It facilitates  compliance with relevant federal laws and fortifies national security. To maintain trust, lower risk, and facilitate the seamless operation of government partnerships and operations, strict adherence to CUI guidelines is still crucial. 

Egnyte enables organizations to manage Controlled Unclassified Information (CUI) more intelligently by automatically identifying and classifying data across cloud and on-premise environments. It helps reduce the risk of data leaks through granular access control and secure sharing features, supporting data security and compliance. With real-time threat detection and pre-built compliance reports aligned with NIST SP 800-171, our EgnyteGov U.S. Federal Agency solutions make your CMMC journey easier.  

Frequently Asked Questions

What is CUI specified? 

CUI Specified refers to a type of Controlled Unclassified Information that comes with very specific rules for how it must be handled and protected. Ensuring organizational compliance with these rules is required by laws, regulations, or government-wide policies. The goal is to ensure that this sensitive information is kept safe and secure at all times. 

What are the types of CUI? 

CUI is diverse in categories such as Privacy Information, Financial Information, Proprietary Business Information, Law Enforcement Information, Critical Infrastructure Information, Export Control Information, Legal Information, Procurement and Acquisition Information, Intelligence and Defense-Related Information (Unclassified), and Immigration and Border Protection Data 

What are the CUI system requirements? 

Organizations must follow the security requirements specified in NIST SP 800-171, NIST SP 80-53, FIPS Publication 199, and FIPS Publication 200. 

How do I protect Controlled Unclassified Information (CUI)? 

Securing controlled unclassified information from improper access, use, or disclosure, the protection of CUI includes installing physical and electronic safeguards, implementing access control, providing recurring training, and establishing incident response measures. Content Security & Governance service providers like Egnyte can help you protect CUI. 

Last Updated: 18th November 2025
Subscribe to