Handwritten Text Recognition for manuscripts and early printed texts
White paper clape
1. Many companies attempt to implement a security policy involving
encryption of portable data, but the policy has no way to be enforced
unless the portable drive utilizes hardware encryption, or alternatively,
utilizes encryption software installed on the computer to encrypt the data
loaded onto the portable drive.
This simplest method of enforcing encryption is to implement a policy
exclusively allowing only the use of hardware encrypted flash drives that
do not have partitions. This way, if a drive is lost, data stored on the drive
is secure because there is no way to load data on the drive without it being
encrypted. This is often not the case with USB flash drives that utilize
software-based encryption. In these cases, the user has the option
whether to store data in an encrypted partition or a non-encrypted
partition. If the flash drive is lost, the assumption must be that the data is
not secure and it opens the organization up to liability if there was any
chance that personal identifiable information existed on the drive.
Personal Identifiable Information might take the form of employee
information,
Customer records or patient records, and regulations exist to enforce
penalties in these situations.
For example:
• Nearly every U.S. state has implemented data breach reporting laws and
penalties that range from $250 to $750 per record of personal identifiable
information that is lost
• Some states are beginning to enforce the use of encryption and storage
of personal information
• The European Union and Canada have implemented serious mandates
for transmission of personal information, especially in regard to employees
2. • The U.S. Federal Government’s HITECH Act, further strengthens existing
HIPAA regulations in regard to ensuring portable data is using proper
encryption security processes or the healthcare institution or partner risks
up to $1.5 million in fines per violation
• Federal Information Security Act (FISMA) of 2002 established broad
security requirements for U.S. Federal Government agencies and
contractors and the OMB Memorandum M-06-16 requires that agencies
encrypt all data on mobile devices unless the agency has determined that
data to be non-sensitive. FIPS 140-2 establishes cryptographic
requirements and security levels for encrypting data.
• The Federal Trade Commission (FTC) will be implementing Red Flag Rules
for the financial institutions that enforce steps that will prevent identity
theft
Protect your sensitive files and folders with Clape - unique encryption
technology with an abundance of security options. This encryption
program sports a colorful and useful graphical interface, easy to use for
the uninitiated, yet powerful enough for the tech savvy. It provides
complete privacy, protecting your data from loss, theft, or virus attacks.
Incorporated into the software are unexpected security “extras” that
provide peace of mind for those obsessed with protecting their invaluable
data. On the surface these additional elements seem like icing on the cake,
but in reality they are necessary to ensure total security. Clape
Technologies has put a lot of thought into the creation of this program.
Clape is the #1 choice when it comes to protecting your data. No other
security utility provides all the features of high encryption, secure deletion,
stealth mode and speed of conversion in one easy-to-use package for total
secrecy.
Clape is straightforward and installs in less than a minute. No help is
needed when installing the software. Using the program is simple, just
drag and drop files and/or folders to the “FILE /FOLDER LIST” then
encryption starts automatically.
3. Another method the user can apply is click on “Import” Menu Item and
select file/folder to encrypt it.
Should you encounter any difficulty while using the software, a well
illustrated user's guide is incorporated into the program.
Data Security:
Clape's security is robust with 1024 bit encryption. Decryption was
transparent and showed no signs of lag even when playing a 1.7GB video
file. The original files are shredded after encryption, leaving no remains on
the user's PC, and file integrity was maintained after decryption. . Should
the user decide not to create a password, the password generator utility
will securely accomplish the task.
Feature Set:
Features at a glance:
Patent Pending Encryption Technology
1024 Bit Block Encryption
Facility of Recovery of forgotten password
Facility of Recovery of Data
File Search
Drag and Drop File Import (By Default in Encrypted Mode)
Keep a backup copy elsewhere
Auto lock after inactivity period
Change Password / Encryption Key
Quick Text Editor
Facility for selecting Random Password (Most Unique Feature)
4. USAGE:
A folder of files (.docs, videos, .pdfs, .txt, .zip) totaling 4 GB in size was
used to test the encryption and decryption speed of Clape. It took four
minutes to complete the encryption procedure. Decrypting files was
transparent and showed no performance hit. The Export, Import option
allows the user to encrypt, decrypt, or lock without going through the
main program.
Help and Documentation:
Clape has a built in help system with well illustrated graphics. If more help
is needed, the other choices are email (online form), knowledge base
(FAQs - frequently asked questions), how-to’s, on-line blog, tutorials,
postal address and social networking sites (Facebook, YouTube, Twitter,
etc.).
Summary:
USB FLASH DRIVES HAVE BECOME HUGELY POPULAR
They are the most convenient way to transfer large amounts of
data.
They use little power, are long lasting and reusable.
They work with any USB-equipped computer.
THERE IS A DOWNSIDE - “THE USB PROBLEM”
Tens of millions are lost yearly.
When a flash drive is lost, valuable data is exposed.
Loss of confidential data can have a devastating
effect on an organization.
To erase off all this problem Clape has been envisaged and
developed for the users.