Building the Governance Ready Enterprise for GDPR ComplianceIndex Engines Inc.
The EU General Data Protection Regulation (GDPR) fundamentally changes how organizations manage personal data. Giving citizens the right to access, rectify, erase, restrict, and migrate their personal content existing in any data center that does business in the European Union.
Index Engines' technology delivers extensive search and management solutions that empower you to find all personal data under management with considerable precision and meet or exceed the requirements of the regulation through implementation of powerful indexing technology. Index Engines supports all classes of data from primary storage to legacy backup data.
Building the Governance Ready Enterprise for GDPR Compliance December 2017Index Engines Inc.
The EU General Data Protection Regulation (GDPR) fundamentally changes how organizations manage personal data. Giving citizens the right to access, rectify, erase, restrict, and migrate their personal content existing in any data center that does business in the European Union.
Index Engines' technology delivers extensive search and management solutions that empower you to find all personal data under management with considerable precision and meet or exceed the requirements of the regulation through implementation of powerful indexing technology. Index Engines supports all classes of data from primary storage to legacy backup data.
A Study on Big Data Privacy Protection Models using Data Masking Methods IJECEIAES
In today’s predictive analytics world, data engineering play a vital role, data acquisition is carried out from various source systems and process as per the business applications and domain. Big Data integrates, governs, and secures big data with repeatable, reliable, and maintainable processes. Through volume, speed, and assortment of information characteristics try to reveal business esteem from enormous information. However, with information that is frequently deficient, conflicting, ungoverned, and unprotected, which is hazardous and enormous information being a risk instead of an advantage. What's more, with conventional methodologies that are manual and unpredictable, huge information ventures take too long to acknowledge business esteem. Reasonably and over and again conveying business esteem from enormous information requires another technique. In this connection, raw data has to be moved between onsite and offshore environment during this course of action, data privacy is a major concern and challenge. A Big Data Privacy platform can make it easier to detect, investigate, assess, and remediate threats from intruders. We tried to do complete study of Big Data Privacy using data masking methods on various data loads and different types. This work will help data quality analyst and big data developers while building the big data applications.
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Steven Meister
How to become GDPR & CCPA Compliant. See the complete 5 page GDPR, CCPA Compliancy Plan
Here is the CCPA / GDPR 3 Day Training PowerPoint - https://www.slideshare.net/StevenMeister/ccpa-and-gdpr-three-day-training-with-actual-deliverables-and-the-whys-and-hows-to-do-so
847-440-4439 https://www.youtube.com/channel/UC3F-qrvOIOwDj4ZKBMmoTWA?view_as=subscriber
GDPR 16 page PPT Plan - https://www.slideshare.net/StevenMeister/gdpr-ccpa-automated-compliance-spark-java-application-features-and-functions-of-big-datarevealed-april-version-35
https://youtu.be/JGoQwoicUxw
Comprehensive Metadata Catalog Video for GDPR / CCPA - https://youtu.be/xryESgfzRcc
The Economic Value of Data: A New Revenue Stream for Global CustodiansCognizant
Global custodians' big data offers myriad opportunities for generating value from analytics solutions; we explore various paths and offer three use cases to illustrate. Data aggregation, risk management, digital experience, operational agility and cross-selling are all covered.
Building the Governance Ready Enterprise for GDPR ComplianceIndex Engines Inc.
The EU General Data Protection Regulation (GDPR) fundamentally changes how organizations manage personal data. Giving citizens the right to access, rectify, erase, restrict, and migrate their personal content existing in any data center that does business in the European Union.
Index Engines' technology delivers extensive search and management solutions that empower you to find all personal data under management with considerable precision and meet or exceed the requirements of the regulation through implementation of powerful indexing technology. Index Engines supports all classes of data from primary storage to legacy backup data.
Building the Governance Ready Enterprise for GDPR Compliance December 2017Index Engines Inc.
The EU General Data Protection Regulation (GDPR) fundamentally changes how organizations manage personal data. Giving citizens the right to access, rectify, erase, restrict, and migrate their personal content existing in any data center that does business in the European Union.
Index Engines' technology delivers extensive search and management solutions that empower you to find all personal data under management with considerable precision and meet or exceed the requirements of the regulation through implementation of powerful indexing technology. Index Engines supports all classes of data from primary storage to legacy backup data.
A Study on Big Data Privacy Protection Models using Data Masking Methods IJECEIAES
In today’s predictive analytics world, data engineering play a vital role, data acquisition is carried out from various source systems and process as per the business applications and domain. Big Data integrates, governs, and secures big data with repeatable, reliable, and maintainable processes. Through volume, speed, and assortment of information characteristics try to reveal business esteem from enormous information. However, with information that is frequently deficient, conflicting, ungoverned, and unprotected, which is hazardous and enormous information being a risk instead of an advantage. What's more, with conventional methodologies that are manual and unpredictable, huge information ventures take too long to acknowledge business esteem. Reasonably and over and again conveying business esteem from enormous information requires another technique. In this connection, raw data has to be moved between onsite and offshore environment during this course of action, data privacy is a major concern and challenge. A Big Data Privacy platform can make it easier to detect, investigate, assess, and remediate threats from intruders. We tried to do complete study of Big Data Privacy using data masking methods on various data loads and different types. This work will help data quality analyst and big data developers while building the big data applications.
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...Steven Meister
How to become GDPR & CCPA Compliant. See the complete 5 page GDPR, CCPA Compliancy Plan
Here is the CCPA / GDPR 3 Day Training PowerPoint - https://www.slideshare.net/StevenMeister/ccpa-and-gdpr-three-day-training-with-actual-deliverables-and-the-whys-and-hows-to-do-so
847-440-4439 https://www.youtube.com/channel/UC3F-qrvOIOwDj4ZKBMmoTWA?view_as=subscriber
GDPR 16 page PPT Plan - https://www.slideshare.net/StevenMeister/gdpr-ccpa-automated-compliance-spark-java-application-features-and-functions-of-big-datarevealed-april-version-35
https://youtu.be/JGoQwoicUxw
Comprehensive Metadata Catalog Video for GDPR / CCPA - https://youtu.be/xryESgfzRcc
The Economic Value of Data: A New Revenue Stream for Global CustodiansCognizant
Global custodians' big data offers myriad opportunities for generating value from analytics solutions; we explore various paths and offer three use cases to illustrate. Data aggregation, risk management, digital experience, operational agility and cross-selling are all covered.
Maturing Your Organization's Information Risk Management StrategyPrivacera
As organizations grow, they face more risks associated with the security and protection of sensitive data. Organizations struggling to navigate the different stages of business need to be sensitive to the increasing maturity necessary to support increasing demands for data governance and information risk management.
Learn about:
▪ Four different stages of the maturity curve
▪ Assessing data sensitivity and classifying data assets
▪ Access controls and data protection
▪ Interpreting policies and determining their impact on information management
▪ Determining the impact of data protection policies on information management practices
▪ Automating policy compliance auditing
▪ Maintaining governance consistency across the hybrid data enterprise
Watch the on-demand webinar here: https://tdwi.org/webcasts/2021/03/arch-all-maturing-your-organizations-information-risk-management-strategy.aspx with TDWI Speaker: David Loshin, President of Knowledge Integrity and guest speaker Bill Brooks, Director of Solutions Engineering, Privacera (www.privacera.com)
Presentation used for the sessie "Get to know the new Office 365 Security & Compliance center" at SharePoint Saturday. It contains a lot of example slides covering the functions of this center.
M365 Records Management Community WebinarDrew Madelung
Information governance is necessary for enterprises. The management of content lifecycles is needed to be compliant and secure. Records management in M365 has many new features and capabilities that we will highlight in this webinar. We will also have real-world conversations on use cases of moving to modern records management in M365 and the challenges, opportunities, and overall guidance for this process. Bring your questions to this exciting webinar!
My keynote speech at the ISACA IIA Belgium software watch day in October 2014 in Brussels on the value of big data and data analytics for auditors and other assurance professionals
A brief introduction to Data Quality rule development and implementation covering:
- What are Data Quality Rules.
- Examples of Data Quality Rules.
- What are the benefits of rules.
- How can I create my own rules?
- What alternate approaches are there to building my own rules?
The presentation also includes a very brief overview of our Data Quality Rule services. For more information on this please contact us.
Big data security challenges and recommendations!cisoplatform
What will you learn:
- Key Insights on Existing Big Data Architecture
- Unique Security Risks and Vulnerabilities of Big Data Technologies
- Top 5 Solutions to mitigate these security challenges
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
There is some really great stuff coming out of the CSA working & research groups these days. I found this particular research paper from the big data working group to be extremely relevant and useful
Knowledge discovery is the process of adding knowledge from a large amount of data. The quality of knowledge generated from the process of knowledge discovery greatly affects the results of the decisions obtained. Existing data must be qualified and tested to ensure knowledge discovery processes can produce knowledge or information that is useful and feasible. It deals with strategic decision making for an organization. Combining multiple operational databases and external data create data warehouse. This treatment is very vulnerable to incomplete, inconsistent, and noisy data. Data mining provides a mechanism to clear this deficiency before finally stored in the data warehouse. This research tries to give technique to improve the quality of information in the data warehouse.
Closing the Governance Gap - Enabling Governed Self-Service AnalyticsPrivacera
Data democratization and data protection are conflicting forces that both need to be addressed through data governance and security by defining, deploying, and auditing data access control policies. Yet there is a latent “governance gap”: the individuals in the organization accountable for articulating and specifying data policies do not have enough knowledge of the systems to understand how policies are to be implemented, and the technologists who understand the system are not familiar enough with data policy drivers to appropriately define and deploy data protection policies.
This webinar is a must for personnel with an analytics and technology mandate to learn about the root causes of this governance gap and consider ideas for closing the gap.
On-Demand here: https://tdwi.org/webcasts/2021/07/arch-all-closing-the-governance-gap-enabling-governed-self-service-analytics.aspx
Learn about:
- Different roles tasked with managing data policies
- Root causes of the governance gap
- Establishing bridges among the different personas - privacy and compliance teams, data stewards, security teams, IT teams, data users
- Simplifying data policy governance
- Governed self-service analytics and data sharing
- Definitions of data sources and data assets and how to enable delegated policy administration
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DevOps.com
We have all seen the press coverage on corporate data breaches and compromises to personal data. You’ve probably heard about the new EU General Data Protection Regulation (GDPR) that came into effect in May last year, which affects any company that manages the personal data of EU residents. There are also some U.S. regulations that cover data privacy, such as HIPAA, HITECH, PCI and the CA Consumer Privacy Act.
Of these, GDPR is considered the most comprehensive when it comes to the needs of the individual and how their personal data should be protected and carries the harshest financial penalties for non-compliance.
The DBA is often the primary responsible party for implementing compliance controls and technical measures for protecting data. But the GDPR first requires an assessment of where PII and sensitive data is across multiple databases and this will be one of the first challenges a DBA will face before applying protection measures.
With many DBAs having to manually trawl through their database tables to identify sensitive data, what is needed is a fast, effective way to automate the discovery process and report on where sensitive data is stored. This would save time and enable companies to determine the most appropriate way to apply protective safeguards in order to minimize data breaches in the future and protect the business.
If you are a DBA responsible for your company’s data and are concerned about how to identify and protect your data, you should attend this webinar to find out how you can simplify and automate this task.
Big Data Expo 2015 - Trillium software Big Data and the Data QualityBigDataExpo
Successful Big Data initiatives rely on accurate, complete data, but the information they draw on is often not validated when it enters an organization. In this session we will look at the challenges big data brings to an organization, and how data quality principles are adapting to ensure business goals and return on investments in big data are realised. We will cover:
- Challenges of big data
- Turning data lakes into reservoirs
- How data quality tools are adapting
- Why data governance disciplines remain crucial
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)Denny Lee
These are the slides on differential privacy case studies I had presented at the MindSwap on Privacy Technology, October 19–20, 2007. Center for Computational Thinking, Carnegie Mellon, Pittsburgh, PA.
Europe’s General Data Protection Regulations (GDPR) will go into effect in less than a year (on 25 May 2018). Achieving data compliance is far from simple and businesses must continuously review how they gather, process and protect personal data. From how data is stored and used to how you secure and even erase information from corporate systems, discover how graph technology can address key challenges relating to Data Quality, Governance and Metadata Management.
Maturing Your Organization's Information Risk Management StrategyPrivacera
As organizations grow, they face more risks associated with the security and protection of sensitive data. Organizations struggling to navigate the different stages of business need to be sensitive to the increasing maturity necessary to support increasing demands for data governance and information risk management.
Learn about:
▪ Four different stages of the maturity curve
▪ Assessing data sensitivity and classifying data assets
▪ Access controls and data protection
▪ Interpreting policies and determining their impact on information management
▪ Determining the impact of data protection policies on information management practices
▪ Automating policy compliance auditing
▪ Maintaining governance consistency across the hybrid data enterprise
Watch the on-demand webinar here: https://tdwi.org/webcasts/2021/03/arch-all-maturing-your-organizations-information-risk-management-strategy.aspx with TDWI Speaker: David Loshin, President of Knowledge Integrity and guest speaker Bill Brooks, Director of Solutions Engineering, Privacera (www.privacera.com)
Presentation used for the sessie "Get to know the new Office 365 Security & Compliance center" at SharePoint Saturday. It contains a lot of example slides covering the functions of this center.
M365 Records Management Community WebinarDrew Madelung
Information governance is necessary for enterprises. The management of content lifecycles is needed to be compliant and secure. Records management in M365 has many new features and capabilities that we will highlight in this webinar. We will also have real-world conversations on use cases of moving to modern records management in M365 and the challenges, opportunities, and overall guidance for this process. Bring your questions to this exciting webinar!
My keynote speech at the ISACA IIA Belgium software watch day in October 2014 in Brussels on the value of big data and data analytics for auditors and other assurance professionals
A brief introduction to Data Quality rule development and implementation covering:
- What are Data Quality Rules.
- Examples of Data Quality Rules.
- What are the benefits of rules.
- How can I create my own rules?
- What alternate approaches are there to building my own rules?
The presentation also includes a very brief overview of our Data Quality Rule services. For more information on this please contact us.
Big data security challenges and recommendations!cisoplatform
What will you learn:
- Key Insights on Existing Big Data Architecture
- Unique Security Risks and Vulnerabilities of Big Data Technologies
- Top 5 Solutions to mitigate these security challenges
Expanded top ten_big_data_security_and_privacy_challengesTom Kirby
There is some really great stuff coming out of the CSA working & research groups these days. I found this particular research paper from the big data working group to be extremely relevant and useful
Knowledge discovery is the process of adding knowledge from a large amount of data. The quality of knowledge generated from the process of knowledge discovery greatly affects the results of the decisions obtained. Existing data must be qualified and tested to ensure knowledge discovery processes can produce knowledge or information that is useful and feasible. It deals with strategic decision making for an organization. Combining multiple operational databases and external data create data warehouse. This treatment is very vulnerable to incomplete, inconsistent, and noisy data. Data mining provides a mechanism to clear this deficiency before finally stored in the data warehouse. This research tries to give technique to improve the quality of information in the data warehouse.
Closing the Governance Gap - Enabling Governed Self-Service AnalyticsPrivacera
Data democratization and data protection are conflicting forces that both need to be addressed through data governance and security by defining, deploying, and auditing data access control policies. Yet there is a latent “governance gap”: the individuals in the organization accountable for articulating and specifying data policies do not have enough knowledge of the systems to understand how policies are to be implemented, and the technologists who understand the system are not familiar enough with data policy drivers to appropriately define and deploy data protection policies.
This webinar is a must for personnel with an analytics and technology mandate to learn about the root causes of this governance gap and consider ideas for closing the gap.
On-Demand here: https://tdwi.org/webcasts/2021/07/arch-all-closing-the-governance-gap-enabling-governed-self-service-analytics.aspx
Learn about:
- Different roles tasked with managing data policies
- Root causes of the governance gap
- Establishing bridges among the different personas - privacy and compliance teams, data stewards, security teams, IT teams, data users
- Simplifying data policy governance
- Governed self-service analytics and data sharing
- Definitions of data sources and data assets and how to enable delegated policy administration
DBAs - Is Your Company’s Personal and Sensitive Data Safe?DevOps.com
We have all seen the press coverage on corporate data breaches and compromises to personal data. You’ve probably heard about the new EU General Data Protection Regulation (GDPR) that came into effect in May last year, which affects any company that manages the personal data of EU residents. There are also some U.S. regulations that cover data privacy, such as HIPAA, HITECH, PCI and the CA Consumer Privacy Act.
Of these, GDPR is considered the most comprehensive when it comes to the needs of the individual and how their personal data should be protected and carries the harshest financial penalties for non-compliance.
The DBA is often the primary responsible party for implementing compliance controls and technical measures for protecting data. But the GDPR first requires an assessment of where PII and sensitive data is across multiple databases and this will be one of the first challenges a DBA will face before applying protection measures.
With many DBAs having to manually trawl through their database tables to identify sensitive data, what is needed is a fast, effective way to automate the discovery process and report on where sensitive data is stored. This would save time and enable companies to determine the most appropriate way to apply protective safeguards in order to minimize data breaches in the future and protect the business.
If you are a DBA responsible for your company’s data and are concerned about how to identify and protect your data, you should attend this webinar to find out how you can simplify and automate this task.
Big Data Expo 2015 - Trillium software Big Data and the Data QualityBigDataExpo
Successful Big Data initiatives rely on accurate, complete data, but the information they draw on is often not validated when it enters an organization. In this session we will look at the challenges big data brings to an organization, and how data quality principles are adapting to ensure business goals and return on investments in big data are realised. We will cover:
- Challenges of big data
- Turning data lakes into reservoirs
- How data quality tools are adapting
- Why data governance disciplines remain crucial
Differential Privacy Case Studies (CMU-MSR Mindswap on Privacy 2007)Denny Lee
These are the slides on differential privacy case studies I had presented at the MindSwap on Privacy Technology, October 19–20, 2007. Center for Computational Thinking, Carnegie Mellon, Pittsburgh, PA.
Europe’s General Data Protection Regulations (GDPR) will go into effect in less than a year (on 25 May 2018). Achieving data compliance is far from simple and businesses must continuously review how they gather, process and protect personal data. From how data is stored and used to how you secure and even erase information from corporate systems, discover how graph technology can address key challenges relating to Data Quality, Governance and Metadata Management.
Date: 15th November 2017
Location: AI Lab Theatre
Time: 16:30 - 17:00
Speaker: Elisabeth Olafsdottir / Santiago Castro
Organisation: Microsoft / Keyrus
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...Denodo
Watch full webinar here: https://bit.ly/43qJKwn
Data-led transformations are becoming more prevalent in recent years, across numerous industries. More and more senior leaders are looking for data to drive their business decisions and impact their bottom line. One key challenge facing such businesses is the ability to pivot to new technologies while maintaining investments in legacy systems they have grown to rely on. In an age where automation, internet-scale search, and advanced analytics are driving many new advances, it is important to understand that this is not only a pivot in terms of technologies, it is a pivot in terms of how we think about and utilize data of different types. Traditional systems since the 1970’s have been built around database concepts where data is physically pipelined, mapped together, statically modeled, and locked away in vaults. The types of vaults have evolved over time from basic databases, to data warehouses, to data lakes, to lake houses, and so on.
The fundamental premise remains: data is placed into sealed containers, such that the critical approach is around storage, instead of being aimed at retrieval. Reversing this approach can, instead, lead to understanding data as transient, on-demand, and immediately available to end users within a certain context. This talk will discuss certain contemporary concepts that are expanding the notion of data storage devices and, instead, are moving to loosely connected data retrieval devices, or in some cases, data generation devices. We will examine this shift in approach and what it means for designing and deploying new types of technologies that can be more flexible and provide improved business value for clients in the fast-paced evolving world of Artificial Intelligence.
Will you be ready to comply with new EU Data Protection Regulation in time?Per Norhammar
No time to lose to comply with the new EU Data Protection Regulation - deadline is May 2018
Soon you will have to find, evaluate and categorize your company’s stored Personal Data (PD) in what may be thousands of databases. In order to be compliant with this new regulation, in due time, new processes have to be in order.
Enterprise Records Management : New challenges & Better Solutions Whitepaper ...Jone Smith
With its efficient records management solutions, Systemware helps many enterprises to capture, classify, store and managed all electronically generated content with one comprehensive solution.
Microsoft Cloud GDPR Compliance Options (SUGUK)Andy Talbot
Recently, Microsoft introduced Microsoft 365, which brings together Office 365, Windows 10, and Enterprise Mobility + Security. We’ll explore what this combination of products means for an organisation looking to ensure GDPR compliance and additional Office 365 products that you can layer to help you meet your obligations.
Rencore Webinar: Understanding EU GDPR from an Office 365 perspective with Pa...Rencore
Starting from May 25, 2018 all European businesses and all worldwide businesses that are trading partners of European businesses will have to adhere to the new General Data Protection Regulation (GDPR). In this session, learn what are the main requirements of GDPR, from an IT perspective, and what are the out-of-the-box capabilities of Microsoft Office 365 and of SharePoint Online that can help you to be compliant with the GDPR rules.
Moreover, see a sample project, based on SharePoint Online, that you can use as a starter kit to satisfy the GDPR basic requirements.
Paolo Pialorsi, Microsoft Certified Master in SharePoint, MVP and SharePoint PnP Core Team Member, joined us in this webinar to talk about how GDPR is affecting your Office 365.
Bio IT World 2019 - AI For Healthcare - Simon Taylor, LucidworksLucidworks
Presentation from Bio IT World, Boston | April 16-18, 2019
Track: AI for Healthcare: Practical Application of AI in Clinical Healthcare
Session Title: To AI or Not to AI, That Is the Question
Speaker: Simon Taylor, Lucidworks
Chatty Kathy - UNC Bootcamp Final Project Presentation - Final Version - 5.23...John Andrews
SlideShare Description for "Chatty Kathy - UNC Bootcamp Final Project Presentation"
Title: Chatty Kathy: Enhancing Physical Activity Among Older Adults
Description:
Discover how Chatty Kathy, an innovative project developed at the UNC Bootcamp, aims to tackle the challenge of low physical activity among older adults. Our AI-driven solution uses peer interaction to boost and sustain exercise levels, significantly improving health outcomes. This presentation covers our problem statement, the rationale behind Chatty Kathy, synthetic data and persona creation, model performance metrics, a visual demonstration of the project, and potential future developments. Join us for an insightful Q&A session to explore the potential of this groundbreaking project.
Project Team: Jay Requarth, Jana Avery, John Andrews, Dr. Dick Davis II, Nee Buntoum, Nam Yeongjin & Mat Nicholas
Explore our comprehensive data analysis project presentation on predicting product ad campaign performance. Learn how data-driven insights can optimize your marketing strategies and enhance campaign effectiveness. Perfect for professionals and students looking to understand the power of data analysis in advertising. for more details visit: https://bostoninstituteofanalytics.org/data-science-and-artificial-intelligence/
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Round table discussion of vector databases, unstructured data, ai, big data, real-time, robots and Milvus.
A lively discussion with NJ Gen AI Meetup Lead, Prasad and Procure.FYI's Co-Found
Opendatabay - Open Data Marketplace.pptxOpendatabay
Opendatabay.com unlocks the power of data for everyone. Open Data Marketplace fosters a collaborative hub for data enthusiasts to explore, share, and contribute to a vast collection of datasets.
First ever open hub for data enthusiasts to collaborate and innovate. A platform to explore, share, and contribute to a vast collection of datasets. Through robust quality control and innovative technologies like blockchain verification, opendatabay ensures the authenticity and reliability of datasets, empowering users to make data-driven decisions with confidence. Leverage cutting-edge AI technologies to enhance the data exploration, analysis, and discovery experience.
From intelligent search and recommendations to automated data productisation and quotation, Opendatabay AI-driven features streamline the data workflow. Finding the data you need shouldn't be a complex. Opendatabay simplifies the data acquisition process with an intuitive interface and robust search tools. Effortlessly explore, discover, and access the data you need, allowing you to focus on extracting valuable insights. Opendatabay breaks new ground with a dedicated, AI-generated, synthetic datasets.
Leverage these privacy-preserving datasets for training and testing AI models without compromising sensitive information. Opendatabay prioritizes transparency by providing detailed metadata, provenance information, and usage guidelines for each dataset, ensuring users have a comprehensive understanding of the data they're working with. By leveraging a powerful combination of distributed ledger technology and rigorous third-party audits Opendatabay ensures the authenticity and reliability of every dataset. Security is at the core of Opendatabay. Marketplace implements stringent security measures, including encryption, access controls, and regular vulnerability assessments, to safeguard your data and protect your privacy.
06-04-2024 - NYC Tech Week - Discussion on Vector Databases, Unstructured Data and AI
Discussion on Vector Databases, Unstructured Data and AI
https://www.meetup.com/unstructured-data-meetup-new-york/
This meetup is for people working in unstructured data. Speakers will come present about related topics such as vector databases, LLMs, and managing data at scale. The intended audience of this group includes roles like machine learning engineers, data scientists, data engineers, software engineers, and PMs.This meetup was formerly Milvus Meetup, and is sponsored by Zilliz maintainers of Milvus.
1. Webinar 30 mins
27th February 2018
Chest announces new partnership with
TermSet to help Universities and Colleges
become GDPR ready at a 50% discount
Stewart Connors
CEO/Co Founder TermSet
2. Agenda
What is the agreement
The Challenge
The Solution
Product demo
Pricing
How to purchase
3. What is the Agreement
Chest has negotiated a 3 year agreement on behalf of all Universities and Colleges
across the United Kingdom to purchase the TermSet ScanR software product at a
50% discount.
ScanR helps organisations comply with the new European General Data Protection
Regulation (GDPR), helping towards avoiding potential security breaches and
substantial fines.
ScanR is a low cost Artificial Intelligence product that understands your
organisations personal sensitive data, which will automate the process and quickly
respond to Right to be forgotten and Subject Access Request's.
4. The Challenge
• GDPR will require all organisations that trade within Europe to focus on identifying and retrieving personal
data of employees, customers such as names, addresses or financial data.
• The “Subject Access Request” response time will decrease from 40 days down to 30 days.
• The new “Right to be Forgotten/Removed” rule will allow employees, customers to request that you identify
and retrieve all the digital information you hold on them and then remove it entirely from your systems.
• 80% of most employees/students information is stored in office structure/unstructured documents.
• Employees/students are storing information in approved & non approved IT systems, such as File Shares,
SharePoint, DropBox, Google Drive.
• 49% of organisations had a document breach in the past 2 years*
• 73% of employees/students are accidentally exposing information stored within documents*
• 63% of organisation’s claim they are unable to locate sensitive data stored in documents*
*Information taken from the Ponemon Institute Research report May 2017.
5. The Solution
ScanR is a ground-breaking software product that discovers GDPR Sensitive and Personal Identifiable
Information within all types of structured and unstructured documents stored within File Shares, SharePoint,
Office 365, OneDrive, Google Drive, DropBox, Databases, email.
• Helps clients automate the process and quickly respond to “Right to be forgotten” and “Subject Access
Request”.
• Reads all versions of Word, Excel, PowerPoint, PDF, Photocopies, Images and emails with attachments.
• Understands all global languages.
• Contains a comprehensive global key word rules engine library.
• Create your own key words.
• Includes Artificial Intelligence with Pattern Matching to ensure key word accuracy.
• Score sensitive words or phrases based on the level of exposure.
• Converts all photocopies, scanned documents into OCR (Optical Character Recognition) to identify all
sensitive key words.
• Identify and remove duplicate files, understand attributes of files by data size and last modified date.
9. To Scan a file share you simply connect the location
10. With SharePoint you can scan whole site collections or sites or a single library
11. Once the configuration has defined where to look, we now need to add rules to define what to look for
within the documents. ScanR ships with over 100 rules and you can easily define your own.
12. Rules can look for words or phrases, patterns or a combination of the two within a given proximity. We
also have rules using AI to find the names of people and companies and addresses.
13. Clicking on Report gives a dashboard of each file that has been scanned. Clicking on a row will show the rules
and data that were discovered in the file.
14. Results can be exported directly into Excel or you can connect directly to the database for analysis
15. Three data
sources read
~19k Documents
read with 79%
containing PII
data
Breakdown of
what PII data is
contained where
Locations of the
sensitive data
Which systems
contain the most
sensitive data
Overview Dashboard
Any BI tool can quickly create dashboards for valuable insights into your data
18. 11 Chapters with 99 Articles
http://www.eugdpr.org/article-summaries.html
ScanR will help you comply with Articles: 5, 15, 16, 17, 18, 20, 24, 30, 32, 35, 42, 44, 45.
• Gain understanding of the where the PII data is located
• Gain an understanding of who has access to it
• Gain an understanding of how long it’s being retained
• Retain personal data for a period of time directly related to the original intended purpose
• Find risky files and take action
• Manage a Subject Access Request
• Request a port of the data
• Request a correction to the data
• Request deletion of the data
Articles Contained in the GDPR
19. Pricing is based on the size of data in the systems where the documents are stored, includes unlimited users and full
product support. Annual subscription with unlimited scans regardless of the size of documents.
Institution Size Student FTE Fee
Small Up to 3,000 £1,500
Medium 3,001 – 10,000 £3,999
Large 10,001 – 20,000 £7,999
Extra Large 20,001 or more £9,999
15% extra discount in place for a 3 year agreement
20. Summary
ScanR
• 3 year agreement to automate the process for discovering PII & Sensitive
information
• Quickly respond to “Subject Access Request” & “Right to be Forgotten”
• Helps towards 2 of the ICO 12 steps
• Comply with 13 of the 99 Articles
TermSet is a UK software company established for 3 years now. Recently launched a software product that helps clients automate the process and quickly respond to “Right to be forgotten/Subject Access Request“.
The challenge slides explains how most organisations are concerned with the new GDPR regulation, with a focus on Subject Access Request & Right to be Forgotten.
A survey last year confirmed that 49% of organisations had a document breach in the past 2 years.
ScanR is a ground-breaking software product that discovers GDPR Sensitive and Personal Identifiable Information within all types of structured and unstructured documents stored within File Shares, SharePoint, Office 365, OneDrive, Google Drive, DropBox, Databases, email.
This slide details the features and benefits of ScanR.
Here is a diagram of how ScanR works.
TermSet’s ground breaking software product ScanR discovers GDPR Sensitive and Personal Identifiable Information within all types of structured and unstructured documents within File Shares, Microsoft SharePoint, Office 365, OneDrive, Google Drive, etc.
Reads all versions of Word, Excel, PowerPoint, PDF, Photocopies, Images and emails with attachments.
Understands all global languages.
Contains a comprehensive global key word rules engine library.
Genreates reports so you can make informed decisions on what to do with the information you have discovered
We will now show a high level product demo
This slide shows the user interface, ScanR has been developed so that non IT people can use it.
We ask ScanR to do 2 x things
1 = What systems do we need to read documents contained within them
2 = What are the key words we need to identify within the documents
This means we need to create a new CONFIGURATION
Here we see ScanR connecting to a File Share
Here we see ScanR connecting to a SharePoint team site collection or a single library
We are asked to enter our security login details, which means only certified people within your company can use ScanR.
Once the configuration has been defined where to look, we now need to add rules to define what are the key words we need to identify within the documents.
ScanR contains a rules engine library with over 100 key words.
You can edit the key words and create your own key words.
Rules can look for words or phrases, patterns or a combination of the two within a given proximity. We also have rules using Artificial Intelligence to find the names of people and companies and addresses.
You can also score key words beads on the sensitivity. You can add a WEIGHT or a SCORE to certain key words.
Here is the ScanR report now completed, you can see it successfully ran a scan, shows the PII info and durations.
We can now click on one for the reports and see that this document found a CREDIT CARD number appeared twice. CVV NUMBER appeared twice. CREDIT CARD EXPIERY DATE appeared twice.
We can see they each have a 10 SCORE/WEIGHT against them.
Results can be exported directly into Excel or you can connect directly to the database for analysis.
Or we can ingest reports into Business Intelligence products such as Microsoft Power BI or Qlik, so we can really visualize and drill into the data.
Here is an example of this.
SharePoint documents can have metadata marking the GDPR data in place.
ScanR creates 3 x new columns in SharePoint.
This slides is taken from the ICO 12 steps to take for GDR readiness.
ScanR helps you achieve Steps 2 and 5.
There are 11 Chapters with 99 Articles contained within the GDPR regulation documentation.
ScanR will help you comply with Articles: 5, 15, 16, 17, 18, 20, 24, 30, 32, 35, 42, 44, 45.
Here is our pricing information, which we hope is clear and easy to understand.
Pricing is based on the size of data in the systems where the documents are stored, includes unlimited users and full product support. Annual subscription with unlimited scans regardless of the size of documents. No hardware or infrastructure needed.
This is the final summary slide.
ScanR is a low priced product that automate the process for discovering PII & Sensitive information contained within unstructured documents.
Helps clients quickly respond to “Subject Access Request” & “Right to be Forgotten”
Helps towards 2 of the ICO 12 steps
Comply with 13 of the 99 Articles
Thank you
Any questions
For more information and product demo video please visit www.termset.com
Or email us at hello@termset.com