data security pii gazzaang
TRANSCRIPT
πWhat is PII (Personal Identifying Information), who manages it, and is it protected? Read the whitepaper now >>
April 12, 2023
Have you ever asked yourself…
• What regulations are my company subject to?
• Who is the regulatory body that I must pay attention to?
• What information do I have to protect?
04/12/2023 Gazzang - All rights reserved 2011 2
OverviewAs commerce becomes more prevalent on the internet, examples of data security breaches are becoming abundant. • This has led to more rules and regulations detailing definitions as
to what constitutes Personal Identifying Information (PII) and who is in charge of managing and protecting that data.
• Will eventually lead to more scrutiny of IT systems, infrastructure and security
BE PROACTIVE!!!!
04/12/2023 Gazzang - All rights reserved 2011 3
The Facts• All client information is sensitive and should be encrypted as
early in the process as possible, ideally before it is written to the disk
• Simply complying with existing standards has proven insufficient• The following is not a comprehensive list by any means, but it
provides good sample set of different industry standards from the US, Canada, and UK.
04/12/2023 Gazzang - All rights reserved 2011 4
Data Protection Act of 1998 (UK)
04/12/2023 Gazzang - All rights reserved 2011 5
Family Educational Rights and Privacy Act (FERPA)
Heath Insurance Portability and Accountability Act (HIPAA)
04/12/2023
6Gazzang - All rights reserved 2011
Gramm-Leach-Bliley Act (GLB)
Payment Card Industry Data Security Standards (PCI DSS)
Personal Information Protection and Electronics Document Act (PIPEDA)
What does it all mean?• Each of these regulations is designed to protect the consumer’s
personal information• Each one has a different definition• Each one has a different application• Each one is equally vague • Each one has ambiguous, catch all language in case something
comes up that was missed
04/12/2023 Gazzang - All rights reserved 2011 7
The Bottom Line
Your company needs to be able to stand up after a security breach and say, with confidence, “While the system was hacked, we employed a sophisticated data encryption package and the thieves will be unable to read any data they were able to steal.”
And that is where Gazzang’s ezEncrypt can help.
04/12/2023 Gazzang - All rights reserved 2011 8
Want more?White Paper - http://www.gazzang.com/downloads/
More about Gazzang - www.gazzang.com
For more information - [email protected]
04/12/2023 Gazzang - All rights reserved 2011 9
04/12/2023
10
About Gazzang
Gazzang makes cloud computing enterprise-ready. Our Platform-as-a-Service (PaaS) solutions help organizations address the inherent risk associated with open source software tools, beginning with data encryption of databases and ultimately migrating all the way up the LAMP stack (Linux, Apache, MySQL, PHP). With customers in financial services, healthcare, higher education and technology, we know what it takes to deliver secure, compliant business services in today’s uncertain cloud environments. Gazzang is backed by Austin Ventures, with offices in Houston and Austin, Texas. For more info, visit www.gazzang.com.
Gazzang - All rights reserved 2011