This document proposes improving data leak prevention performance using a white-list approach and Bloom filters. It summarizes previous related work using blacklists and keywords to detect leaks. The authors then improve upon prior work by Fang Hao et al. that used CRC to create fingerprints, by using hash functions with Bloom filters instead to generate fingerprints faster while maintaining accuracy. Experiments test five hash functions on a 9.3GB dataset to evaluate system throughput and percentage of leaked files.