With the help of our Data Analyst team, we identify extra copies of data and delete them. We run through data and tag all new data. Removes multiple copies and replaces them with flags pointing to the original data. The system has to constantly fingerprint incoming data and then quickly identify whether or not the new fingerprint already matches something in the system. If it does, a pointer to the existing fingerprint is written. If it does not, the info is saved as-is.