Data Security PII Gazzaang

348
-1

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
348
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
11
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Data Security PII Gazzaang

  1. 1. πWhat is PII (Personal Identifying Information), who manages it, and is it protected? Read the whitepaper now >><br />June 15, 2011<br />
  2. 2. Have you ever asked yourself… <br />What regulations are my company subject to?<br />Who is the regulatory body that I must pay attention to?<br />What information do I have to protect?<br />6/15/2011<br />Gazzang - All rights reserved 2011<br />2<br />
  3. 3. Overview<br />As commerce becomes more prevalent on the internet, examples of data security breaches are becoming abundant. <br />This has led to more rules and regulations detailing definitions as to what constitutes Personal Identifying Information (PII) and who is in charge of managing and protecting that data.<br />Will eventually lead to more scrutiny of IT systems, infrastructure and security<br />BE PROACTIVE!!!!<br />6/15/2011<br />Gazzang - All rights reserved 2011<br />3<br />
  4. 4. The Facts<br />All client information is sensitive and should be encrypted as early in the process as possible, ideally before it is written to the disk<br />Simply complying with existing standards has proven insufficient<br />The following is not a comprehensive list by any means, but it provides good sample set of different industry standards from the US, Canada, and UK. <br />6/15/2011<br />Gazzang - All rights reserved 2011<br />4<br />
  5. 5. Data Protection Act of 1998 (UK)<br />6/15/2011<br />Gazzang - All rights reserved 2011<br />5<br />Family Educational Rights and Privacy Act (FERPA)<br />Heath Insurance Portability and Accountability Act (HIPAA)<br />
  6. 6. 6/15/2011<br />Gazzang - All rights reserved 2011<br />6<br />Gramm-Leach-Bliley Act (GLB)<br />Payment Card Industry Data Security Standards (PCI DSS)<br />Personal Information Protection and Electronics Document Act (PIPEDA)<br />
  7. 7. What does it all mean?<br />Each of these regulations is designed to protect the consumer’s personal information<br />Each one has a different definition<br />Each one has a different application<br />Each one is equally vague <br />Each one has ambiguous, catch all language in case something comes up that was missed <br />6/15/2011<br />Gazzang - All rights reserved 2011<br />7<br />
  8. 8. The Bottom Line<br />Your company needs to be able to stand up after a security breach and say, with confidence, “While the system was hacked, we employed a sophisticated data encryption package and the thieves will be unable to read any data they were able to steal.” <br />And that is where Gazzang’sezEncrypt can help.<br />6/15/2011<br />Gazzang - All rights reserved 2011<br />8<br />
  9. 9. Want more?<br />White Paper - http://www.gazzang.com/downloads/<br />More about Gazzang - www.gazzang.com<br />For more information - info@gazzang.com<br />6/15/2011<br />Gazzang - All rights reserved 2011<br />9<br />
  10. 10. About Gazzang<br />Gazzangmakes cloud computing enterprise-ready. Our Platform-as-a-Service (PaaS) solutions help organizations address the inherent risk associated with open source software tools, beginning with data encryption of databases and ultimately migrating all the way up the LAMP stack (Linux, Apache, MySQL, PHP). With customers in financial services, healthcare, higher education and technology, we know what it takes to deliver secure, compliant business services in today’s uncertain cloud environments. Gazzang is backed by Austin Ventures, with offices in Houston and Austin, Texas. For more info, visit www.gazzang.com. <br />6/15/2011<br />Gazzang - All rights reserved 2011<br />10<br />

×