Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Data Security PII Gazzaang
1. πWhat is PII (Personal Identifying Information), who manages it, and is it protected? Read the whitepaper now >> June 15, 2011
2. Have you ever asked yourself… What regulations are my company subject to? Who is the regulatory body that I must pay attention to? What information do I have to protect? 6/15/2011 Gazzang - All rights reserved 2011 2
3. Overview As commerce becomes more prevalent on the internet, examples of data security breaches are becoming abundant. This has led to more rules and regulations detailing definitions as to what constitutes Personal Identifying Information (PII) and who is in charge of managing and protecting that data. Will eventually lead to more scrutiny of IT systems, infrastructure and security BE PROACTIVE!!!! 6/15/2011 Gazzang - All rights reserved 2011 3
4. The Facts All client information is sensitive and should be encrypted as early in the process as possible, ideally before it is written to the disk Simply complying with existing standards has proven insufficient The following is not a comprehensive list by any means, but it provides good sample set of different industry standards from the US, Canada, and UK. 6/15/2011 Gazzang - All rights reserved 2011 4
5. Data Protection Act of 1998 (UK) 6/15/2011 Gazzang - All rights reserved 2011 5 Family Educational Rights and Privacy Act (FERPA) Heath Insurance Portability and Accountability Act (HIPAA)
6. 6/15/2011 Gazzang - All rights reserved 2011 6 Gramm-Leach-Bliley Act (GLB) Payment Card Industry Data Security Standards (PCI DSS) Personal Information Protection and Electronics Document Act (PIPEDA)
7. What does it all mean? Each of these regulations is designed to protect the consumer’s personal information Each one has a different definition Each one has a different application Each one is equally vague Each one has ambiguous, catch all language in case something comes up that was missed 6/15/2011 Gazzang - All rights reserved 2011 7
8. The Bottom Line Your company needs to be able to stand up after a security breach and say, with confidence, “While the system was hacked, we employed a sophisticated data encryption package and the thieves will be unable to read any data they were able to steal.” And that is where Gazzang’sezEncrypt can help. 6/15/2011 Gazzang - All rights reserved 2011 8
9. Want more? White Paper - http://www.gazzang.com/downloads/ More about Gazzang - www.gazzang.com For more information - info@gazzang.com 6/15/2011 Gazzang - All rights reserved 2011 9
10. About Gazzang Gazzangmakes cloud computing enterprise-ready. Our Platform-as-a-Service (PaaS) solutions help organizations address the inherent risk associated with open source software tools, beginning with data encryption of databases and ultimately migrating all the way up the LAMP stack (Linux, Apache, MySQL, PHP). With customers in financial services, healthcare, higher education and technology, we know what it takes to deliver secure, compliant business services in today’s uncertain cloud environments. Gazzang is backed by Austin Ventures, with offices in Houston and Austin, Texas. For more info, visit www.gazzang.com. 6/15/2011 Gazzang - All rights reserved 2011 10