Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Complete GDPR/CCPA Compliance in Months! even with Petabytes of data, eCommerce websites, big data & numerous file types sept

156 views

Published on

Reach a complete 360% GDPR / CCPA Compliance solution in a few months! Even if you have Petabytes of Data, eCommerce/Websites, Big Data & numerous Data & File Types! Use BDR’s Compliance App’s & Proxy Server. Below we explain how to accomplish Automated Compliance.

Let’s begin with what we feel should be the primary objective of every Regulatory Compliancy, compelling companies to encrypt, or otherwise protect Personal Information in their databases & File Systems so that hackers gain almost nothing from a successful intrusion. Encryption is thought to be the most secure method of protecting sensitive data; and once completed your company will be protected from the more significant Regulatory Fines, marketing and customers losses and damages and your customers from Identity Theft.

BigDataRevealed Discovers and Encrypts massive amounts of Personal Information with its Automated Spark Application Engine to start the Compliance process in motion. If your data Compliance needs are only a million rows or Billions of rows a day, BigDataRevealed can be architected and scaled to meet your needs.

What disheartens companies is they don’t understand how their Customer Service, eCommerce, Analytics, and Operational systems can continue to function once their data has been encrypted. However, with the BDR Proxy, we can show you how this is no longer an issue.

https://youtu.be/VOPY2CZ0UtM https://youtu.be/12QQs8n2qH4

Call 847-440-4439
www.bigdatarevealed.com
#CCPA #GDPR #MySQL #Oracle #Proxy #Spark #Apache #WordPress #Privacy #PII #Compliance #Hackers #Breaches #Data

Published in: Data & Analytics
  • Be the first to comment

  • Be the first to like this

Complete GDPR/CCPA Compliance in Months! even with Petabytes of data, eCommerce websites, big data & numerous file types sept

  1. 1. Reach a complete 360% GDPR / CCPA Compliance solution in a few months! Even if you have Petabytes of Data, eCommerce/Websites, Big Data & numerous Data & File Types! Use BDR’s Compliance App’s & Proxy Server. Below we explain how to accomplish Automated Compliance. Let’s begin with what we feel should be the primary objective of every Regulatory Compliancy, compelling companies to encrypt, or otherwise protect Personal Information in their databases & File Systems so that hackers gain almost nothing from a successful intrusion. Encryption is thought to be the most secure method of protecting sensitive data; and once completed your company will be protected from the more significant Regulatory Fines, marketing and customers losses and damages and your customers from Identity Theft. BigDataRevealed Discovers and Encrypts massive amounts of Personal Information with its Automated Spark Application Engine to start the Compliance process in motion. If your data Compliance needs are only a million rows or Billions of rows a day, BigDataRevealed can be architected and scaled to meet your needs. What disheartens companies is they don’t understand how their Customer Service, eCommerce, Analytics, and Operational systems can continue to function once their data has been encrypted. However, with the BDR Proxy, we can show you how this is no longer an issue. BDR’s Proxy Server will eliminate your concerns! BDR’s Proxy will accept unencrypted requests for data from most any of your applications or websites, modify the request by encrypting the data fields contained in the request, call the RDBMS (and soon non SQL file systems) and access the encrypted data. BDR Proxy then decrypts the data from your files and returns it to your application or web screen in a human readable format, business as usual. No Alterations to your existing systems code are required, your data is Protected and your applications function as always. Your company has experienced nearly zero impact in order to become compliant. BDR Proxy is so efficient that it adds almost no extra processing time to your systems. The BDR Proxy Server can be installed and ready for use in just one day once the Administrator changes a Port setting for the database or file system. Below we explain how BDR gets you compliant so easily.
  2. 2. Below are a series of steps that consultants should have told you are necessary before beginning a Compliancy Project. 1. Comprise a list of all company personnel from the CEO and other C levels, Legal Staff, DPO, Department Heads, Data Governance, most all levels of Information Technology including production, eCommerce/Websites, Big Data, Data Science, and any third party consultancies involved. a. Call for an initial meeting and ongoing status meetings to discuss and agree upon the priorities, must haves, can waits and how ;long until needed, ramifications of delays and waiting for deliveries, buy, build or a combination that will also determine time to Compliancy and again the risks if breached before project completion. 2. Complete a Data Protection Impact Assessment (DPIA) that searches for Personal Information patterns in all possible Data Assets. Begin with Structured data but continue with (S/A, Office Docs, PDF, OCR, Biometric, XML, Email …). Don’t take randomized samples of your data for analysis, all rows must be processed or Personal Information will be missed. 3. The BigDataRevealed’s Suite and Proxy can be loaded and delivering in a day. BDR will not degrade production systems performance as it is read into Spark memory then processed. BDR simultaneously builds extensive metadata catalog files that can be extracted for analysis and will become the base to support all other Compliance efforts such as Encryption, Right of Erasure, and Right of Information. 4. At first a company will want to process their traditional stores of information, but eventually other forms of corporate data will need to be included. Again, BDR is already capable of performing Discovery and completing the DPIA steps against Office Docs, PDF Files, XML, Jason, OCR, Email (PST Files & Attachments), Biometrics, JDBC/RDBMS Direct to memory with Spark, Apache Hadoop HDFS, Hbase, IoT and most all Streams, and many more … 5. DPIA’s are not a once a year or even a weekly task, there should be a process in place to discover and encrypt newly ingested data that flows into your data files on a continuous basis. BDR provides this type of processing to protect your data before in becomes data at rest. 6. After a DPIA, a company will know which files should be protected by encrypting sensitive fields contained in the files. BDR can deliver Encryption after a DPIA/Data Discovery is run with a simple push of a button and has the ability to Encrypt Personal Information as it is identified in real-time during the Discovery or DPIA Process. Metadata created by our DPIA process can be used to better understand existing systems and to provide detailed information for more in-depth analytics and marketing. Our 5 years of developing BigDataRevealed’s Data Governance and Security Solutions that also lead to our recent breakthrough that resulted in the BDR Proxy, makes the communications between decrypted and encrypted information possible, hence making Compliance possible in weeks and months, versus years. 1. BDR Proxy will know which files and which fields the calling system is requesting and will encrypt and decrypt the data accordingly. 2. No application or eCommerce Web sites need to be touched (just two properties), unless Port settings were hard coded in the applications. 3. All technical development for Complete CCPA and GDPR Compliance has been completed by us, so that your staff only needs to know how to interact through our GUI interface to ask BDR to do its job. Other areas of concern affecting Compliance, especially in the Ad-Tech sector, is Consent, usage of data and the right of erasure.
  3. 3. BigDataRevealed Handles these in the following ways through its BDR Consent GUI Module which allows for: 1. The User to create a secured account and receive an encryption login key. 2. The ability to check one or multiple PII boxes, or select individual Personal Information values for which they grant Consent to use; a. The ability to Confirm their current intentions in a free format text box. b. Upload a signed consent document that becomes downloadable by the Company c. A means to click ‘Revoke Consent’ and repeat steps a and b 3. Selection of allowable requests from lists organized by Regulatory Agencies. BDR captures the following requests and others. a. Right of Erasure i. When the Company views requests by Citizens, their Personal Information can be automatically loaded into the BDR Application and, with the push of a button, accurately act upon their request and deliver results. ii. Metadata Catalogs will be created and maintained for each request processed and can be sent to the Citizen for their verification and use. 1. The metadata can also be matched against new data being ingested from various sources and discarded unless there is valid reason such as the Citizen made a new purchase. In this way the Citizens Right of Erasure is maintained. b. What Data do you possess on a Citizen? c. To Whom have you sold or transferred the Citizens Data? d. Opt out of Marketing and so on … 4. BDR’s Consent Module allows ongoing bi-lateral communications, up and downloading of documents between Company and Customer/Citizen, and provides an auditable record of activity. The BigDataRevealed Eco-System was built on a flexible Architecture using the latest technologies such as Apache Spark (2.4.3/JDBC), Java, Big Data Hadoop as desired, the popular and secure Spring Framework for the API’s that will support adoption of new regulations from other Regulatory Agencies in just days, keeping Compliance nearly 100% automated, scalable, accurate and affordable as possible.

×