10
π What is PII (Personal Identifying Information), who manages it, and is it protected? Read the whitepaper now >> 6/20/22

Data Security PII Gazzaang

  • Upload
    gazzang

  • View
    286

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Data Security  PII Gazzaang

πWhat is PII (Personal Identifying Information), who manages it, and is it protected? Read the whitepaper now >>

April 12, 2023

Page 2: Data Security  PII Gazzaang

Have you ever asked yourself…

• What regulations are my company subject to?

• Who is the regulatory body that I must pay attention to?

• What information do I have to protect?

04/12/2023 Gazzang - All rights reserved 2011 2

Page 3: Data Security  PII Gazzaang

OverviewAs commerce becomes more prevalent on the internet, examples of data security breaches are becoming abundant. • This has led to more rules and regulations detailing definitions as

to what constitutes Personal Identifying Information (PII) and who is in charge of managing and protecting that data.

• Will eventually lead to more scrutiny of IT systems, infrastructure and security

BE PROACTIVE!!!!

04/12/2023 Gazzang - All rights reserved 2011 3

Page 4: Data Security  PII Gazzaang

The Facts• All client information is sensitive and should be encrypted as

early in the process as possible, ideally before it is written to the disk

• Simply complying with existing standards has proven insufficient• The following is not a comprehensive list by any means, but it

provides good sample set of different industry standards from the US, Canada, and UK.

04/12/2023 Gazzang - All rights reserved 2011 4

Page 5: Data Security  PII Gazzaang

Data Protection Act of 1998 (UK)

04/12/2023 Gazzang - All rights reserved 2011 5

Family Educational Rights and Privacy Act (FERPA)

Heath Insurance Portability and Accountability Act (HIPAA)

Page 7: Data Security  PII Gazzaang

What does it all mean?• Each of these regulations is designed to protect the consumer’s

personal information• Each one has a different definition• Each one has a different application• Each one is equally vague • Each one has ambiguous, catch all language in case something

comes up that was missed

04/12/2023 Gazzang - All rights reserved 2011 7

Page 8: Data Security  PII Gazzaang

The Bottom Line

Your company needs to be able to stand up after a security breach and say, with confidence, “While the system was hacked, we employed a sophisticated data encryption package and the thieves will be unable to read any data they were able to steal.”

And that is where Gazzang’s ezEncrypt can help.

04/12/2023 Gazzang - All rights reserved 2011 8

Page 9: Data Security  PII Gazzaang

Want more?White Paper - http://www.gazzang.com/downloads/

More about Gazzang - www.gazzang.com

For more information - [email protected]

04/12/2023 Gazzang - All rights reserved 2011 9

Page 10: Data Security  PII Gazzaang

04/12/2023

10

About Gazzang

Gazzang makes cloud computing enterprise-ready. Our Platform-as-a-Service (PaaS) solutions help organizations address the inherent risk associated with open source software tools, beginning with data encryption of databases and ultimately migrating all the way up the LAMP stack (Linux, Apache, MySQL, PHP). With customers in financial services, healthcare, higher education and technology, we know what it takes to deliver secure, compliant business services in today’s uncertain cloud environments. Gazzang is backed by Austin Ventures, with offices in Houston and Austin, Texas. For more info, visit www.gazzang.com.

Gazzang - All rights reserved 2011