Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Upcoming SlideShare
What to Upload to SlideShare
Next
Download to read offline and view in fullscreen.

0

Share

Download to read offline

Gdpr ccpa automated compliance - spark java application features and functions of -- big datarevealed april version 3.5

Download to read offline

GDPR – CCPA Automated Technology, 16 Page PowerPoint with Features, Functions, Architecture and our reasons for choosing them. Be on your way to compliance with Technology created with compliance as its goal. Expect to add years of development without technology built specifically for compliances, such as GDPR, CCPA, HIPAA and others.

After scrolling through this PowerPoint you will realize just what is required and be able to better estimate the efforts it will take for your company to meet these regulatory requirements with technology and then without technology.

Spend just 5-10 minutes that might save your company, and your Customers, all the negative ramifications of the inevitable 2 breaches a year a company can expect to suffer.

This PowerPoint covers the critical aspects and needs that are present in any project designed to meet regulatory requirements for GDPR, CCPA and many others.
Complete Channel of Videos on BigDataRevealed

https://www.youtube.com/watch?v=3rLcQF5Wsgc&list=UU3F-qrvOIOwDj4ZKBMmoTWA

847-440-4439

#CCPA #GDPR #Big Data #Data Compliance #PII #Facebook #Hadoop #AWS #Spark #IoT #California

  • Be the first to like this

Gdpr ccpa automated compliance - spark java application features and functions of -- big datarevealed april version 3.5

  1. 1. FEATURES, FUNCTIONS, ARCHITECTURE OF BIGDATAREVEALED FOR DATA PROTECTION, COMPLIANCE AND DATA MANAGEMENT ESPECIALLY FOR GDPR AND CCPA - A SINGLE BIG DATA APPLICATION, (APACHE/HDFS, AMAZON HDFS AND AWS S3, AND MICROSOFT AZURE) BUILT TO MANAGE BIG DATA AND ALL DATA. - DELIVERING REPEATABLE, COLLABORATIVE, AUTOMATED, AND ACCURATE RESULTS FOR ALL INDUSTRIES TO MEET REGULATORY COMPLIANCES SUCH AS GDPR, CCPA, HIPAA, AND OTHERS, NOW AND THOSE THAT WILL APPEAR IN THE NEAR FUTURE. - DATA PRIVACY AND PROTECTION USING THE LATEST TECHNOLOGIES & LANGUAGES.
  2. 2. DATA PROTECTION IMPACT ASSESSMENTS – THE ABILITY TO FIRST UNDERSTAND YOUR CORPORATE DATA ASSETS, CREATE META DATA CATALOGS TO NAVIGATE AND REMEDIATE A COMPANIES DATA ASSETS, CREATE A CORE FOUNDATION FOR THE REST OF DATA COMPLIANCE INCLUDING REMEDIATION AND AS NEEDED FOR COMPLIANCE AND ANALYTICS TO AVOID REGULATORY HEADACHES. HERE IS HOW BIGDATAREVEALED DELIVERS: • BigDataRevealed (BDR) is delivered with an extensive pattern recognition engine and library that users are able to augment. Contains patterns of Personal information, Regulated Information or any pattern the company desires to search. BDR will also search for static values such as an individual’s name, email, phone … • Once this process has completed, BDR will display results allowing staff to collaborate and select Remediation measures for legacy and Big Data environments via Encryption and other security measures. • This Information will become the core nucleus for most of the following features, functions, and ability to deliver the mass requirements of the Regulatory world.
  3. 3. OUR MANY YEARS OF EXPERIENCE HAVE TAUGHT US TO NEVER INTERFERE OR RUN LABOR INTENSIVE PROCESSES AGAINST OPERATIONAL SYSTEMS, ESPECIALLY IF IT NEGATIVELY EFFECTS THE CUSTOMERS EXPERIENCE WITH YOUR COMPANY. TO MINIMIZE THE IMPACT ON YOUR OPERATING SYSTEMS, AND TO FACILITATE CERTAIN DIFFICULT REGULATORY REQUIREMENTS THAT CANNOT BE MET ACROSS VARYING DATABASES AND OPERATING SYSTEMS, BDR HAS ARCHITECTED AN ECOSYSTEM BUILT IN APACHE HADOOP THAT IS QUICK TO INGEST DATA, ABLE TO ACCURATELY STORE FOLDERS AND GROUP THEM IF DESIRED, PROTECT THE DATA WHILE INGESTING DATA STREAMS, AND MOST IMPORTANTLY, ABLE TO DELIVER ON THE MORE DIFFICULT REGULATORY REQUIREMENTS AND DO SO WITH MUCH GREATER ACCURACY AND TIMELINESS. • Metadata created above will be used to deliver Compliance results that your Company and its Customers need. • BDR can become the new Central Repository for your Companies complete Data Assets including; • Legacy Data • OCR • Office, PDF and .pst email Data • Biometrics Data • And most any other forms of data
  4. 4. DATA PROTECTION IMPACT ASSESSMENTS – RESULTS FOR EVALUATION OF REMEDIATIONS SUCH AS: • Determine, by viewing Metadata, which exposed Personal Data columns should be immediately Encrypted, Sequestered, or even eliminated. • Allow collaboration and communication between stakeholders, data management team members, Executive levels, DPO, ETL and others regarding their opinions and reasons for the data to be; • Available for production, point of sale or ongoing analytics • If Point of Sale or Customer Service applications need to access encrypted consumers PII, BigDataRevealed offers APIs (Spring framework) to decrypt a single customer’s data for display and then re-encrypt any additions or changes made before updating the databases. Your production applications are never interrupted or degraded and your database is secure. • Only a single customer’s data is exposed during this process. • Share and integrate the BigDataRevealed MetaData Catalog with your Companies existing metadata systems.
  5. 5. OTHER IMPORTANT VALUES OF THE BIGDATAREVEALED METADATA CATALOGS FOR THE PROTECTION OF PII IN YOUR LEGACY SYSTEMS. • The ability of BDR Metadata to store all Files, Columns and Rows coupled with the type of run and action performed allows for: • The ETL, Data Management, DPO, Compliance team and others to determine what legacy data may need to be: • Deleted • Encrypted • Sequestered • Evaluated in more detail • Reported to Consumers that requested how their data is being used and what data of theirs you have stored and why • BigDataRevealed then allows these processes to be performed using its library of 200 Spring Framework API’s. These API’s can be stand alone, within operational and production applications, or most anywhere they are needed. They are all written in Spark / Java for flexibility, speed, scalability and again ease of use through the Spring Framework.
  6. 6. OTHER IMPORTANT VALUES OF THE BIGDATAREVEALED INGESTION OF LEGACY DATA AS WELL AS IOT AND STREAMING DATA. • The ability of the BDR Spark Java Ingestion API, it also reads and processes IoT, Social Media and other forms of streaming data and can: • Determine PII Data, on the fly • Process or notify other systems of the PII • Determine PII through its pattern recognition and NLP Engines and based on earlier user parameters and requests; • Encrypt this PII data before it resides in data at rest or in other systems • Delete this PII data if it matches a Customer that has Opted-Out • Creates the metadata of its findings for later use • Best determine file folder names for the files and … • Do not allow re-inclusions of PII data into your data ecosystem for a customer that has ‘Opted-Out’. While you process IoT, Third Party data streams, or any other streams of data assets, BDR can isolate information for these customers and keep their data from re-entering your environment, which would be a compliance violation.
  7. 7. THE REASON BIGDATAREVEALED USES HBASE IS PRIMARILY FOR CONTINUAL IOT AND STREAMING DATA TO ALLOW CONTINUAL READING OF THE RESULTS. HDFS DOES NOT ALLOW READING OF SUCH RESULTS TILL A JOB IS COMPLETED. WE ALSO USE HBASE FOR QUICK RESPONSE TO OUR SUMMARIZED CHARTS, GRAPHS AND GAUGES. • HBase adds speed and flexibility for BDR queries and drills into data for a more granulated view. • Hbase along with MySQL is easier for storing various summaries of our processes and provides faster and easier retrieval, especially from third party applications that may not read HDFS efficiently or at all.
  8. 8. THE ‘SEARCH CUSTOMER FEATURE’ SHOWS HOW BIGDATAREVEALED CALLS THE SPRING FRAMEWORK API’S TO FIRST SEARCH FOR CUSTOMER DATA STORED IN NON ENCRYPTED FORMAT. IF IT DOES NOT FIND A MATCH IT WILL THEN FIND THE SECURED ENCRYPTION KEY, ENCRYPT THE INPUT DATA AND SEARCH FOR THE CUSTOMER DATA USING ENCRYPTED VALUES. IF IT THEN FINDS THE DATA, IT WILL TEMPORARILY DECRYPT THE DATA, PASS IT TO THE OPERATIONAL SYSTEMS FOR NORMAL UNINTERRUPTED PROCESSING AND THEN MAKE SURE THE DATA IS RE-ENCRYPTED ONCE AGAIN AND DELETE ALL UNENCRYPTED DATA FROM MEMORY. THIS IS USEFUL AND IN MOST CASES NECESSARY FOR CONTINUAL UNINTERRUPTED POINT OF SALE, CUSTOMER SERVICE AND OTHER CUSTOMER RELATED OPERATIONS, PRODUCTION SYSTEMS AND FOR DATA SCIENTISTS AND DATA MANAGEMENT PEOPLE TO GET TEMPORARY ACCESS TO ENCRYPTED DATA AS NEEDED AND AS THEY HAVE AUTHORITY TOO. POINT OF SALE – WE CAN ACCEPT NON-ENCRYPTED DATA FROM A CUSTOMER AND SEARCH FOR IT’S ENCRYPTED VALUE IN DATABASES. WE THEN ARE ABLE TO DECRYPT THE RECORDS FOUND AND RETURN THE INFORMATION TO THE POINT OF SALE OR CUSTOMER SERVICE APPLICATION.
  9. 9. AFTER VARIOUS PROCESSES HAVE BEEN RUN, SUCH AS THE DISCOVERY OF PII, DETERMINING WHICH DATA FIELDS NEED REMEDIATION, SETTING UP PROCESSES FOR INGESTION OF IOT AND SOCIAL MEDIA STREAMS, BIGDATAREVEALED HAS A SYSTEM TO ASSIGN TASKS TO INDIVIDUALS AND TO MONITOR THE PROGRESS OF THOSE TASKS VIA INTERACTIVE NOTE GENERATION. • The results of these tasks can be shared at the file levels within the BigDataRevealed Metadata Catalog interface to support collaborative efforts. • The assignee’s can request additional assistance, reject the task and even assign the task to another individual.
  10. 10. BIGDATAREVEALED PROVIDES MANY TYPES OF PROCESSES THAT RUN AGAINST A VARIETY OF DATA ASSETS AND DATA TYPES. LETS LOOK AT SOME OF THESE. • BigDataRevealed runs its Discovery of PII Patterns, fixed values, indirect identifiers, encrypted data for these and many other file types of data: • Hadoop HDFS, Hbase • Amazon AWS S3 • Data At Rest • Semi-Structured Data • Streaming Data from Company, Social Media, Third parties and … • Office Documents, PDF’s, OCR, Text, .PST email files and many others ,,, • BigDataRevealed has it’s own OCR capability for PII Discovery and other processes. • BigDataRevealed has its own Biometrics Engine to search for Facial Recognition, Object Recognition, Finger Prints and much more …. Using the same open source OpenCV as Google.
  11. 11. BIGDATAREVEALED PROVIDES A VARIETY OF PROCESSES THAT RUN AGAINST A VARIETY OF DATA AND DATA TYPES. LET’S LOOK AT SOME OF THESE RUN PROCESSES: • BigDataRevealed runs its Discovery of PII Patterns and fixed values • BigDataRevealed run a process called Quick Business Classification that: • Identifies all User Selected PII Patterns and lists for each Column in the File: • How may times and what percentage of a file’s columns contained each of the Discovered Patterns. • Allows the User to Drill down into the data to the HDFS system Single source of record to view the surrounding data to identify the context of the PII and how it is used and if it is a false positive or not • Data Discovery Delivers • See Next Page
  12. 12. BIGDATAREVEALED PROVIDES A VARIETY OF PROCESSES THAT RUN AGAINST A VARIETY OF DATA AND DATA TYPES. LET’S LOOK AT SOME OF THESE RUN PROCESSES: • Data Discovery Delivers: • Stores a list of all the unique data patterns and values in a file • Allows for the other processes to have the information needed to accurately drill to the system source of record • Show various data profiling stats such as; • Duplicates • Zeros/nulls • Percentage of the file containing each pattern • Minimum, Maximum and average of numeric values and … • Outlier Discovery • Based on the mean and average values of numeric data: • Find within the user selected ranges what values are considered Outliers for: • Anti Money Laundering • Parts about to break down • …. • Indirect identifiers – See next page
  13. 13. BIGDATAREVEALED PROVIDES A VARIETY OF PROCESSES THAT RUN AGAINST A VARIETY OF DATA AND DATA TYPES. LET’S LOOK AT SOME OF THESE RUN PROCESSES: • Indirect identifiers: • BDR discovers groups of fields that by themselves do not identify an individual, or very small group of individuals, but when grouped together will identify a person or small group of people. Such as Zip Code, Date of Birth and Gender… • Processing, Discovery and Searching of .PST Outlook email files: • Drill and search the results after Pattern or Value discovery • Search the same for and view the same for email attachments • ….
  14. 14. BIGDATAREVEALED ALLOWS FOR THE USERS TO EASILY SETUP AND RUN ALL THE AVAILABLE PROCESSES THAT HAVE BEEN DISCUSSED IN THIS POWERPOINT. THE USERS CAN ALSO; • Add to, or modify the pattern search library • Add any values they desire to be searched for, particularly to process a Citizens Right of Erasure request (Right to be forgotten). • The ability to download and view the BigDataRevealed Metadata Catalogues, or to disseminate to others and integrate into other metadata tools. • Use the Data Scientists Workbench or the new more executive style dashboard • …
  15. 15. BIGDATAREVEALED OFFERS A MEANS FOR CITIZENS TO CREATE THEIR OWN NEW AND UNIQUE IDENTITIES FOR THE PURPOSE OF INTERACTIVE REQUEST PROCESSING: • Request to delete, add or modify Consent of the use of the Citizens PII • Request the Citizens Right of Erasure • Request one of the many Regulatory Rights of Citizens found in both GDPR and CCPA such as; • What data of mine do you have • How are you using my data • To whom have you disclosed my data • Allow for bilateral communications between the Citizen and the Company • Using the Citizens PII submitted with their request, BDR automates the Discovery process of their PII and thereby expedites the entire process. • …
  16. 16. BIGDATAREVEALED OFFERS A MEANS FOR CITIZENS TO CREATE THEIR OWN NEW AND UNIQUE IDENTITIES FOR THE PURPOSE OF INTERACTIVE REQUEST PROCESSING: • Allow a Company to build a central processing site for all Citizens and companies to communicate and fulfill required Regulations. Thereby making it easier for the Citizen to make requests of many companies, and for many companies to have one location to pick up all their Citizen requests. • Reach us at 847-440-4439

GDPR – CCPA Automated Technology, 16 Page PowerPoint with Features, Functions, Architecture and our reasons for choosing them. Be on your way to compliance with Technology created with compliance as its goal. Expect to add years of development without technology built specifically for compliances, such as GDPR, CCPA, HIPAA and others. After scrolling through this PowerPoint you will realize just what is required and be able to better estimate the efforts it will take for your company to meet these regulatory requirements with technology and then without technology. Spend just 5-10 minutes that might save your company, and your Customers, all the negative ramifications of the inevitable 2 breaches a year a company can expect to suffer. This PowerPoint covers the critical aspects and needs that are present in any project designed to meet regulatory requirements for GDPR, CCPA and many others. Complete Channel of Videos on BigDataRevealed https://www.youtube.com/watch?v=3rLcQF5Wsgc&list=UU3F-qrvOIOwDj4ZKBMmoTWA 847-440-4439 #CCPA #GDPR #Big Data #Data Compliance #PII #Facebook #Hadoop #AWS #Spark #IoT #California

Views

Total views

305

On Slideshare

0

From embeds

0

Number of embeds

1

Actions

Downloads

9

Shares

0

Comments

0

Likes

0

×