SlideShare a Scribd company logo
www.bigid.com • info@bigid.com • @bigidsecure
Your Customers' Privacy, Protected!
A Data Driven Approach for CCPA Preparedness
CCPA
Data Rights
Automation
When it comes into effect in July 1, 2020, the California
Consumer Privacy Act (“CCPA”) will set the stage for a
fundamental realignment in how covered companies interact
with customer data. Under the law, California residents will,
for the first time, be afforded the right to know what data
is being collected about them, as well as how it’s being
processed, shared and sold. BigID delivers the data
intelligence foundation to discover personal information
across an enterprise, index whose data it is and seamlessly
operationalize privacy management processes.
ML Driven Personal Data Discovery
& Classification
Unlike PCI DSS, or similar mandates which focus on Personally Identifiable
Information only (such as Social Security Numbers or credit card details), the
CCPA covers any data that “identifies, relates to, describes, is capable of being
associated with, or could reasonably be linked” to a person or household is
deemed personal data. BigID uses innovative correlation and identity
intelligence to establish how identifiable data relates to a consumer identity,
helping to uncover “dark data” and infer via correlation which attributes are
associated with California consumers for inventorying and potential
de-identification. Existing discovery and classification approaches cannot
address the new requirement to understand whose data is being collected,
processed and shared - and typically cannot scan and discover personal data
across the modern data landscape spanning databases, file shares, logs, big
data and cloud services.
Your Customers' Privacy, Protected!
What truly distinguishes the CCPA from an operations perspective is that the Act
requires companies to account for how they collect and sell individual customer’s
information and support the consumer’s right to access of all the personal collected,
processed and shared. BigID’s correlation and machine learning technology uniquely
finds personal information across the enterprise that is linked or linkable to an
individual California consumer and automatically assigns state residency without
having to move any data. Support teams can generate consumer access
request reports through a single click, and natural language queries enable them to
match the consumer request to their data graph. The BigID product further enables
enterprises to make individualized processing decisions, with the ability to match
opt-out requests to a specific consumer and his or her associated data.
Operationalize and Automate Consumer Data Rights
www.bigid.com • info@bigid.com • @bigidsecure
Your Customers' Privacy, Protected!
Inventory Processing and Data Flow Maps
As a direct consequence of the of consumer data rights that the CCPA introduces -
including the Right to Know, the Right to Access and the Right to Delete - covered
companies will be required to maintain an inventory of processing activities.
For enterprises with complex data collection and processing, it will be important
to get a picture of what personal information is collected and how it is used in a
verifiable, data-driven way. The BigID product compiles an index of all personal
information and confidential data that points to where specific data values are
stored, and it facilitates the automated and collaborative building of an inventory
of processing activities.
BigID is redefining personal data protection and privacy in the enterprise. Organizations
are facing record breaches of personal information and proliferating global privacy
regulations, with fines reaching 4% of annual revenue.
BigID gives enterprises software to automate the security and management of structured
and unstructured PI across datacenters and cloud. Using BigID, enterprises can better
steward their most vital assets: their customer, employee and client data.
For more information, email info@bigid.com or schedule a demo at bigid.com/demo
How BigID Can Help
Your Customers' Privacy, Protected!
Along with potential penalties and fines levied by the California Attorney General
for violations, the CCPA introduces a “right to private action”, and in particular
to sue if a breach is the result of the company not taking “reasonable security
procedures and practices.” Based on BigID’s mapping of personal data, security
teams can better understand their data breach risk and orchestrate security
controls through APIs such as encryption or de-identification. In the event of
an incident or data breach, Security and IT can quickly scope the impact and
understand which consumer identities and attributes have been impacted by
a breach based on BigID’s inventory of personal data and consumer identity by
data source.
Risk Analysis and Breach Assessment
A Data Driven Approach for CCPA Preparedness

More Related Content

What's hot

BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data Sheet
Dimitri Sirota
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
Dimitri Sirota
 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data Sheet
Dimitri Sirota
 
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID Inc
 
BigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and TaggingBigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and Tagging
Dimitri Sirota
 
BigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetBigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data Sheet
Dimitri Sirota
 
BigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data SheetBigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data Sheet
Dimitri Sirota
 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment (SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
Priyanka Aash
 
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
BigID Inc
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
Dimitri Sirota
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
Priyanka Aash
 
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
Priyanka Aash
 
GDPR Seminar Slides
GDPR Seminar SlidesGDPR Seminar Slides
GDPR Seminar Slides
Hannah Donnison
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data Sheet
Gigya
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
Sarah Fox
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
Omo Osagiede
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA Compliance
Precisely
 

What's hot (17)

BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data Sheet
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data Sheet
 
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
 
BigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and TaggingBigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and Tagging
 
BigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetBigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data Sheet
 
BigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data SheetBigID PII & PI Discovery for GDPR Data Sheet
BigID PII & PI Discovery for GDPR Data Sheet
 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment (SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
(SACON) Nandan Nilekani - Identity Payments and Data Empowerment 
 
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
 
BigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar SlidesBigID GDPR Compliance Automation Webinar Slides
BigID GDPR Compliance Automation Webinar Slides
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
 
GDPR Seminar Slides
GDPR Seminar SlidesGDPR Seminar Slides
GDPR Seminar Slides
 
Gigya's China Data Center - Data Sheet
Gigya's China Data Center - Data SheetGigya's China Data Center - Data Sheet
Gigya's China Data Center - Data Sheet
 
Checklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR complianceChecklist for SMEs for GDPR compliance
Checklist for SMEs for GDPR compliance
 
Beyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal AuditBeyond GDPR Compliance - Role of Internal Audit
Beyond GDPR Compliance - Role of Internal Audit
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA Compliance
 

Similar to BigID Datasheet: CCPA Data Rights Automation

BigID Data Sheet: Enterprise Privacy Management
BigID Data Sheet: Enterprise Privacy ManagementBigID Data Sheet: Enterprise Privacy Management
BigID Data Sheet: Enterprise Privacy Management
BigID Inc
 
BigID Consent Governance
BigID Consent Governance  BigID Consent Governance
BigID Consent Governance
BigID Inc
 
BigID Data Sheet: Data subject rights
BigID Data Sheet: Data subject rightsBigID Data Sheet: Data subject rights
BigID Data Sheet: Data subject rights
BigID Inc
 
BigID Data Sheet: Master Your Customer Data Without MDM
BigID Data Sheet: Master Your Customer Data Without MDMBigID Data Sheet: Master Your Customer Data Without MDM
BigID Data Sheet: Master Your Customer Data Without MDM
BigID Inc
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access management
Tatiana Grisham
 
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
Gigya
 
BigId GDPRcompliance
BigId   GDPRcomplianceBigId   GDPRcompliance
BigId GDPRcompliance
Fatime Traoré
 
BigID PII Protection GDPR
BigID PII Protection GDPR BigID PII Protection GDPR
BigID PII Protection GDPR
Fatime Traoré
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final project
Kelly Giambra
 
data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...
data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...
data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...
Data & Analytics Magazin
 
The GDPR - A data revolution
The GDPR - A data revolutionThe GDPR - A data revolution
The GDPR - A data revolution
Dan Brookman
 
Rethinking Trust in Data
Rethinking Trust in Data Rethinking Trust in Data
Rethinking Trust in Data
DATAVERSITY
 
Three big questions about AI in financial services
Three big questions about AI in financial servicesThree big questions about AI in financial services
Three big questions about AI in financial services
White & Case
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
Gigya
 
GDPR: the IBM journey to compliance
GDPR: the IBM journey to complianceGDPR: the IBM journey to compliance
GDPR: the IBM journey to compliance
DataWorks Summit
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
Grant Thornton LLP
 
General Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMGeneral Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAM
Ubisecure
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
FIDO Alliance
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
caniceconsulting
 

Similar to BigID Datasheet: CCPA Data Rights Automation (20)

BigID Data Sheet: Enterprise Privacy Management
BigID Data Sheet: Enterprise Privacy ManagementBigID Data Sheet: Enterprise Privacy Management
BigID Data Sheet: Enterprise Privacy Management
 
BigID Consent Governance
BigID Consent Governance  BigID Consent Governance
BigID Consent Governance
 
BigID Data Sheet: Data subject rights
BigID Data Sheet: Data subject rightsBigID Data Sheet: Data subject rights
BigID Data Sheet: Data subject rights
 
BigID Data Sheet: Master Your Customer Data Without MDM
BigID Data Sheet: Master Your Customer Data Without MDMBigID Data Sheet: Master Your Customer Data Without MDM
BigID Data Sheet: Master Your Customer Data Without MDM
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access management
 
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
 
BigId GDPRcompliance
BigId   GDPRcomplianceBigId   GDPRcompliance
BigId GDPRcompliance
 
BigID PII Protection GDPR
BigID PII Protection GDPR BigID PII Protection GDPR
BigID PII Protection GDPR
 
Acc 675 control audit final project
Acc 675 control audit final projectAcc 675 control audit final project
Acc 675 control audit final project
 
data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...
data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...
data-dilemma-navigating-the-legal-and-ethical-maze-of-big-data-2023-5-25-7-18...
 
Ekwensi ACC article
Ekwensi ACC articleEkwensi ACC article
Ekwensi ACC article
 
The GDPR - A data revolution
The GDPR - A data revolutionThe GDPR - A data revolution
The GDPR - A data revolution
 
Rethinking Trust in Data
Rethinking Trust in Data Rethinking Trust in Data
Rethinking Trust in Data
 
Three big questions about AI in financial services
Three big questions about AI in financial servicesThree big questions about AI in financial services
Three big questions about AI in financial services
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
 
GDPR: the IBM journey to compliance
GDPR: the IBM journey to complianceGDPR: the IBM journey to compliance
GDPR: the IBM journey to compliance
 
For digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a mustFor digital media companies, effective cybersecurity programs a must
For digital media companies, effective cybersecurity programs a must
 
General Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAMGeneral Data Protection Regulation & Customer IAM
General Data Protection Regulation & Customer IAM
 
FIDO Authentication and GDPR
FIDO Authentication and GDPRFIDO Authentication and GDPR
FIDO Authentication and GDPR
 
Smart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislationSmart Data Module 5 d drive_legislation
Smart Data Module 5 d drive_legislation
 

Recently uploaded

Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
abdulrafaychaudhry
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
Juraj Vysvader
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
varshanayak241
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
Georgi Kodinov
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Globus
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 

Recently uploaded (20)

Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Lecture 1 Introduction to games development
Lecture 1 Introduction to games developmentLecture 1 Introduction to games development
Lecture 1 Introduction to games development
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Strategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptxStrategies for Successful Data Migration Tools.pptx
Strategies for Successful Data Migration Tools.pptx
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx2024 RoOUG Security model for the cloud.pptx
2024 RoOUG Security model for the cloud.pptx
 
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
Innovating Inference - Remote Triggering of Large Language Models on HPC Clus...
 
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 

BigID Datasheet: CCPA Data Rights Automation

  • 1. www.bigid.com • info@bigid.com • @bigidsecure Your Customers' Privacy, Protected! A Data Driven Approach for CCPA Preparedness CCPA Data Rights Automation When it comes into effect in July 1, 2020, the California Consumer Privacy Act (“CCPA”) will set the stage for a fundamental realignment in how covered companies interact with customer data. Under the law, California residents will, for the first time, be afforded the right to know what data is being collected about them, as well as how it’s being processed, shared and sold. BigID delivers the data intelligence foundation to discover personal information across an enterprise, index whose data it is and seamlessly operationalize privacy management processes. ML Driven Personal Data Discovery & Classification Unlike PCI DSS, or similar mandates which focus on Personally Identifiable Information only (such as Social Security Numbers or credit card details), the CCPA covers any data that “identifies, relates to, describes, is capable of being associated with, or could reasonably be linked” to a person or household is deemed personal data. BigID uses innovative correlation and identity intelligence to establish how identifiable data relates to a consumer identity, helping to uncover “dark data” and infer via correlation which attributes are associated with California consumers for inventorying and potential de-identification. Existing discovery and classification approaches cannot address the new requirement to understand whose data is being collected, processed and shared - and typically cannot scan and discover personal data across the modern data landscape spanning databases, file shares, logs, big data and cloud services. Your Customers' Privacy, Protected! What truly distinguishes the CCPA from an operations perspective is that the Act requires companies to account for how they collect and sell individual customer’s information and support the consumer’s right to access of all the personal collected, processed and shared. BigID’s correlation and machine learning technology uniquely finds personal information across the enterprise that is linked or linkable to an individual California consumer and automatically assigns state residency without having to move any data. Support teams can generate consumer access request reports through a single click, and natural language queries enable them to match the consumer request to their data graph. The BigID product further enables enterprises to make individualized processing decisions, with the ability to match opt-out requests to a specific consumer and his or her associated data. Operationalize and Automate Consumer Data Rights
  • 2. www.bigid.com • info@bigid.com • @bigidsecure Your Customers' Privacy, Protected! Inventory Processing and Data Flow Maps As a direct consequence of the of consumer data rights that the CCPA introduces - including the Right to Know, the Right to Access and the Right to Delete - covered companies will be required to maintain an inventory of processing activities. For enterprises with complex data collection and processing, it will be important to get a picture of what personal information is collected and how it is used in a verifiable, data-driven way. The BigID product compiles an index of all personal information and confidential data that points to where specific data values are stored, and it facilitates the automated and collaborative building of an inventory of processing activities. BigID is redefining personal data protection and privacy in the enterprise. Organizations are facing record breaches of personal information and proliferating global privacy regulations, with fines reaching 4% of annual revenue. BigID gives enterprises software to automate the security and management of structured and unstructured PI across datacenters and cloud. Using BigID, enterprises can better steward their most vital assets: their customer, employee and client data. For more information, email info@bigid.com or schedule a demo at bigid.com/demo How BigID Can Help Your Customers' Privacy, Protected! Along with potential penalties and fines levied by the California Attorney General for violations, the CCPA introduces a “right to private action”, and in particular to sue if a breach is the result of the company not taking “reasonable security procedures and practices.” Based on BigID’s mapping of personal data, security teams can better understand their data breach risk and orchestrate security controls through APIs such as encryption or de-identification. In the event of an incident or data breach, Security and IT can quickly scope the impact and understand which consumer identities and attributes have been impacted by a breach based on BigID’s inventory of personal data and consumer identity by data source. Risk Analysis and Breach Assessment A Data Driven Approach for CCPA Preparedness