Example implementations relate to hiding sensitive data. For example, a device according to the present disclosure may include a scanning portion to receive a scan of a document, and a graphical user interface to receive a command with respect to the sensitive data. The device may also include a processor to analyze the scan of the document, process the command via the graphical user interface, determine the document contains sensitive data in response to the command, and perform an action to hide the sensitive data.
展开▼