SlideShare a Scribd company logo
Eight principles of
Consumer Data
Privacy
Overview
Consumer data privacy is experiencing a wave of concern
and coverage over the last few years as nation-states and
judicial entities continue to roll out new regulations to
protect the privacy rights of Internet users. Numerous
regulations are now in place across different geographies
including the General Data Protection Regulation (GDPR) in
the EU, California Consumer Privacy Act (CCPA), Virginia’s
Consumer Data Privacy Act (CDPA), New York’s Department
of Financial Services Cybersecurity Regulation (NYDFS),
Brazil’s Lei Geral de Proteção de Dados Pessoais and
others.
2
1. Right to be Forgotten
Businesses that manage PII must respond to consumer requests
to remove unfavorable information. This seemingly
straightforward requirement is in fact not straightforward at all, as
organizations must first be able to find the data requested within
silos of enterprise data or even hidden as orphaned objects
within database tables. Through Sensitive Data Discovery,
SOLIXCloud Consumer Data Privacy scans and locates any
and all requested data instances to be deleted.
3
2. Right to Object
The right to object empowers consumers to stop or prevent
processing of their personal data at any time. SOLIXCloud Sensitive
Data Discovery enables controllers and processors of consumer data
to search multi-cloud landscapes for all instances of the data so it
may be removed from processing. Subject Rights Requests (SRR)
forms can be submitted as part of the Data Compliance module to
obtain reports on all data associated with the consumer.
4
3. Right to Rectification
A consumer’s rights over their data includes the right to have
inaccurate personal data rectified, or completed if it is incomplete.
SolixCloud Sensitive Data Discovery locates all instances of the
requested data and stages the request for edit by data admins. A
comprehensive search and discovery capability is once again an
essential capability for data processors, but since the rectification
process also requires that data be updated, processors require role
based access control to limit privileged access to sensitive personal
information.
5
4. Right not to be profiled
Personal data about individuals is collected from a variety of sources and
may be analyzed to classify people into different groups or categories
using algorithms such as machine learning. SOLIXCloud Common Data
Platform (CDP) provides robust metadata management, data lineage,
data catalogue, business glossary and data profiling features that enable
you to explore and understand your data better, so you may be equipped
to target and promote your products successfully without infringing on
consumer rights.
6
5. Right of Access
Subject access gives individuals the right to obtain a copy of their
personal data from you, as well as other supplementary information. Solix
Data Compliance enables Subject Rights Requests (SRR) forms to be
submitted to obtain the personal data. Solix Metadata Management
provides a centralized approach to not only locate specific data objects,
but to identify related objects as well.
7
6. Right to Data Portability
The right to data portability involves individuals being able to obtain and
reuse their own personal data for their own purposes. This obligation
necessitates that processors be able to move, copy or transfer personal
data easily from one IT environment to another in a safe and secure way
without affecting its usability. Solix Data Compliance & Solix Search
enable Subject Rights Request forms and data query results to be
exported in a PDF format. Audit reports including logs of all personal data
activities are also available.
8
7. Right to Data Minimization
Metadata management and data catalogs help administrators explore
their data landscape to confirm the scope of data to be processed and
Information Lifecycle Management (ILM) provides data retention policies
to ensure that the data is purged (deleted) once it is no longer needed.
Solix Data Masking obfuscates data not relevant to a specific purpose,
and Solix Data Governance deploys data retention policies that ensure
erasure after a specific purpose is met. SOLIXCloud Enterprise Archiving
moves personally identifiable information through ‘legal hold’ or other
regulatory purposes into a centralized nearline archive repository.
9
8. Right to be Informed
When organizations collect personal data directly from the individual, they
are able to inform the individual directly regarding the collection and use
of their personal data. When organizations collect data from third-party
sources, they still need to take the ownership to inform individuals when
the data is collected. Informing the individual can be done through
layering, dashboards and just-in-time notices (emails / smart devices), no
later than one month from when the data is collected. Solix Data
Compliance provides management tools to inform data subjects how
their information is used with preference controls to manage what data
they allow the organization to process.
10
The Solution - SOLIXCloud
Consumer Data Privacy
Data privacy by design is an architected approach to cloud data
management that ensures all data privacy regulations globally are met
instead of requiring different solutions for different geographies and
jurisdictions.
SOLIXCloud Consumer Data Privacy is a suite of three powerful tools
that complement the W3C open standards based security, SOLIXCloud
Common Data Platform (CDP) and the Eight Principles of Consumer
Data Privacy.
SOLIXCloud data management solutions support the eight principles of
consumer data privacy. Through privacy by design, W3C industry
standard architecture and the SOLIXCloud Consumer Data privacy
solution suite, controllers and data processors are better able to
achieve regulatory compliance.
11
Copyright ©2020, Solix Technologies and/or its affiliates. All rights reserved.This document is provided for information purposes only
and the contents hereof are subject to change without notice.This document is not warranted to be error-free, nor subject to any other
warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchant- ability or
fitness for a particular purpose.We specially disclaim any liability with respect to this document and no contractual obligations are
formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any
means, electronic or mechanical, for any purpose, without our prior written permission.Solix is a registered trademark of Solix
Technologies and/or its affiliates. Other names may be trademarks of their respectively
SOLIX TECHNOLOGIES, INC.
4701 Patrick Henry Dr., Bldg 20, Santa Clara, CA 95054
Toll Free:+1.888.GO.SOLIX(+1.888.467.6549)
Telephone: +1.408.654.6400
Fax: +1.408.562.0048
URL:https://www.solix.com

More Related Content

What's hot

Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
himanshu jain
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
Steven Meister
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
David Strom
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
Maganathin Veeraragaloo
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
rajab ssemwogerere
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
Priyanka Aash
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights Management
Rahul Neel Mani
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
Uc Man
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
Shahbaz Khan
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Gohsuke Takama
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
Gosia Fraser
 
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018
Codemotion
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
PECB
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Khaled El Emam
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
Ishay Tentser
 
Seclore for Forcepoint DLP
Seclore for Forcepoint DLPSeclore for Forcepoint DLP
Seclore for Forcepoint DLP
Seclore
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
Prof. Jacques Folon (Ph.D)
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
Robert Ambrogi
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
Nováccent
 

What's hot (20)

Data protection and privacy
Data protection and privacyData protection and privacy
Data protection and privacy
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
Security v. Privacy: the great debate
Security v. Privacy: the great debateSecurity v. Privacy: the great debate
Security v. Privacy: the great debate
 
Ss
SsSs
Ss
 
Cloud and Data Privacy
Cloud and Data PrivacyCloud and Data Privacy
Cloud and Data Privacy
 
Data security and privacy
Data security and privacyData security and privacy
Data security and privacy
 
India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law India'a Proposed Privacy & Personal Data Protection Law
India'a Proposed Privacy & Personal Data Protection Law
 
Seclore: Information Rights Management
Seclore: Information Rights ManagementSeclore: Information Rights Management
Seclore: Information Rights Management
 
Privacy and personal information
Privacy and personal informationPrivacy and personal information
Privacy and personal information
 
what is data security full ppt
what is data security full pptwhat is data security full ppt
what is data security full ppt
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Internet of Things With Privacy in Mind
Internet of Things With Privacy in MindInternet of Things With Privacy in Mind
Internet of Things With Privacy in Mind
 
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018
dev.privacy: GDPR in a nutshell - Evan Tedeschi - Codemotion Rome 2018
 
Personally Identifiable Information Protection
Personally Identifiable Information ProtectionPersonally Identifiable Information Protection
Personally Identifiable Information Protection
 
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
 
Privacy by design for peerlyst meetup
Privacy by design for peerlyst meetupPrivacy by design for peerlyst meetup
Privacy by design for peerlyst meetup
 
Seclore for Forcepoint DLP
Seclore for Forcepoint DLPSeclore for Forcepoint DLP
Seclore for Forcepoint DLP
 
Data privacy & social media
Data privacy & social mediaData privacy & social media
Data privacy & social media
 
Ethics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for LawyersEthics and Security of Cloud Computing for Lawyers
Ethics and Security of Cloud Computing for Lawyers
 
Seclore File Secure Introduction Brief
Seclore File Secure Introduction   BriefSeclore File Secure Introduction   Brief
Seclore File Secure Introduction Brief
 

Similar to Eight principles of consumer data privacy

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
BigID Inc
 
dcVAST GDPR Compliance One Pager
dcVAST GDPR Compliance One PagerdcVAST GDPR Compliance One Pager
dcVAST GDPR Compliance One Pager
dcVAST
 
Mastering Data Compliance in a Dynamic Business Landscape
Mastering Data Compliance in a Dynamic Business LandscapeMastering Data Compliance in a Dynamic Business Landscape
Mastering Data Compliance in a Dynamic Business Landscape
Denodo
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore
Seclore
 
GDPR and Analytics
GDPR and AnalyticsGDPR and Analytics
GDPR and Analytics
brunomase
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
Cloudera, Inc.
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
Caroline Boscher
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
ALI ANWAR, OCP®
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
Kim Cook
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
Morris Dorfer
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
Ulf Mattsson
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
ProductNation/iSPIRT
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
Cor Ranzijn
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
zayadeen2003
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
CIOWomenMagazine
 
Data Privacy in the Work From Home Era
Data Privacy in the Work From Home EraData Privacy in the Work From Home Era
Data Privacy in the Work From Home Era
Neo4j
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
Eryk Budi Pratama
 
Big data security
Big data securityBig data security
Big data security
Anne ndolo
 
Big data security
Big data securityBig data security
Big data security
Anne ndolo
 

Similar to Eight principles of consumer data privacy (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
BigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance AutomatedBigID Data Sheet: LGPD Compliance Automated
BigID Data Sheet: LGPD Compliance Automated
 
dcVAST GDPR Compliance One Pager
dcVAST GDPR Compliance One PagerdcVAST GDPR Compliance One Pager
dcVAST GDPR Compliance One Pager
 
Mastering Data Compliance in a Dynamic Business Landscape
Mastering Data Compliance in a Dynamic Business LandscapeMastering Data Compliance in a Dynamic Business Landscape
Mastering Data Compliance in a Dynamic Business Landscape
 
Data-Centric Security | Seclore
Data-Centric Security | Seclore Data-Centric Security | Seclore
Data-Centric Security | Seclore
 
GDPR and Analytics
GDPR and AnalyticsGDPR and Analytics
GDPR and Analytics
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
GDPR for Dummies
GDPR for DummiesGDPR for Dummies
GDPR for Dummies
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
GDPR: how IT works
GDPR: how IT worksGDPR: how IT works
GDPR: how IT works
 
GDPR and evolving international privacy regulations
GDPR and evolving international privacy regulationsGDPR and evolving international privacy regulations
GDPR and evolving international privacy regulations
 
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
iSPIRT's Response on Digital Information Security in Healthcare Act (DISHA)
 
Protecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of RecordProtecting Data Privacy Beyond the Trusted System of Record
Protecting Data Privacy Beyond the Trusted System of Record
 
My presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPRMy presentation- Ala about privacy and GDPR
My presentation- Ala about privacy and GDPR
 
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdfData Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
Data Privacy Compliance Navigating the Evolving Regulatory Landscape.pdf
 
Data Privacy in the Work From Home Era
Data Privacy in the Work From Home EraData Privacy in the Work From Home Era
Data Privacy in the Work From Home Era
 
The Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI WebinarThe Rise of Data Ethics and Security - AIDI Webinar
The Rise of Data Ethics and Security - AIDI Webinar
 
Big data security
Big data securityBig data security
Big data security
 
Big data security
Big data securityBig data security
Big data security
 

Recently uploaded

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 

Recently uploaded (20)

GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 

Eight principles of consumer data privacy

  • 2. Overview Consumer data privacy is experiencing a wave of concern and coverage over the last few years as nation-states and judicial entities continue to roll out new regulations to protect the privacy rights of Internet users. Numerous regulations are now in place across different geographies including the General Data Protection Regulation (GDPR) in the EU, California Consumer Privacy Act (CCPA), Virginia’s Consumer Data Privacy Act (CDPA), New York’s Department of Financial Services Cybersecurity Regulation (NYDFS), Brazil’s Lei Geral de Proteção de Dados Pessoais and others. 2
  • 3. 1. Right to be Forgotten Businesses that manage PII must respond to consumer requests to remove unfavorable information. This seemingly straightforward requirement is in fact not straightforward at all, as organizations must first be able to find the data requested within silos of enterprise data or even hidden as orphaned objects within database tables. Through Sensitive Data Discovery, SOLIXCloud Consumer Data Privacy scans and locates any and all requested data instances to be deleted. 3
  • 4. 2. Right to Object The right to object empowers consumers to stop or prevent processing of their personal data at any time. SOLIXCloud Sensitive Data Discovery enables controllers and processors of consumer data to search multi-cloud landscapes for all instances of the data so it may be removed from processing. Subject Rights Requests (SRR) forms can be submitted as part of the Data Compliance module to obtain reports on all data associated with the consumer. 4
  • 5. 3. Right to Rectification A consumer’s rights over their data includes the right to have inaccurate personal data rectified, or completed if it is incomplete. SolixCloud Sensitive Data Discovery locates all instances of the requested data and stages the request for edit by data admins. A comprehensive search and discovery capability is once again an essential capability for data processors, but since the rectification process also requires that data be updated, processors require role based access control to limit privileged access to sensitive personal information. 5
  • 6. 4. Right not to be profiled Personal data about individuals is collected from a variety of sources and may be analyzed to classify people into different groups or categories using algorithms such as machine learning. SOLIXCloud Common Data Platform (CDP) provides robust metadata management, data lineage, data catalogue, business glossary and data profiling features that enable you to explore and understand your data better, so you may be equipped to target and promote your products successfully without infringing on consumer rights. 6
  • 7. 5. Right of Access Subject access gives individuals the right to obtain a copy of their personal data from you, as well as other supplementary information. Solix Data Compliance enables Subject Rights Requests (SRR) forms to be submitted to obtain the personal data. Solix Metadata Management provides a centralized approach to not only locate specific data objects, but to identify related objects as well. 7
  • 8. 6. Right to Data Portability The right to data portability involves individuals being able to obtain and reuse their own personal data for their own purposes. This obligation necessitates that processors be able to move, copy or transfer personal data easily from one IT environment to another in a safe and secure way without affecting its usability. Solix Data Compliance & Solix Search enable Subject Rights Request forms and data query results to be exported in a PDF format. Audit reports including logs of all personal data activities are also available. 8
  • 9. 7. Right to Data Minimization Metadata management and data catalogs help administrators explore their data landscape to confirm the scope of data to be processed and Information Lifecycle Management (ILM) provides data retention policies to ensure that the data is purged (deleted) once it is no longer needed. Solix Data Masking obfuscates data not relevant to a specific purpose, and Solix Data Governance deploys data retention policies that ensure erasure after a specific purpose is met. SOLIXCloud Enterprise Archiving moves personally identifiable information through ‘legal hold’ or other regulatory purposes into a centralized nearline archive repository. 9
  • 10. 8. Right to be Informed When organizations collect personal data directly from the individual, they are able to inform the individual directly regarding the collection and use of their personal data. When organizations collect data from third-party sources, they still need to take the ownership to inform individuals when the data is collected. Informing the individual can be done through layering, dashboards and just-in-time notices (emails / smart devices), no later than one month from when the data is collected. Solix Data Compliance provides management tools to inform data subjects how their information is used with preference controls to manage what data they allow the organization to process. 10
  • 11. The Solution - SOLIXCloud Consumer Data Privacy Data privacy by design is an architected approach to cloud data management that ensures all data privacy regulations globally are met instead of requiring different solutions for different geographies and jurisdictions. SOLIXCloud Consumer Data Privacy is a suite of three powerful tools that complement the W3C open standards based security, SOLIXCloud Common Data Platform (CDP) and the Eight Principles of Consumer Data Privacy. SOLIXCloud data management solutions support the eight principles of consumer data privacy. Through privacy by design, W3C industry standard architecture and the SOLIXCloud Consumer Data privacy solution suite, controllers and data processors are better able to achieve regulatory compliance. 11
  • 12. Copyright ©2020, Solix Technologies and/or its affiliates. All rights reserved.This document is provided for information purposes only and the contents hereof are subject to change without notice.This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchant- ability or fitness for a particular purpose.We specially disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission.Solix is a registered trademark of Solix Technologies and/or its affiliates. Other names may be trademarks of their respectively SOLIX TECHNOLOGIES, INC. 4701 Patrick Henry Dr., Bldg 20, Santa Clara, CA 95054 Toll Free:+1.888.GO.SOLIX(+1.888.467.6549) Telephone: +1.408.654.6400 Fax: +1.408.562.0048 URL:https://www.solix.com