SlideShare a Scribd company logo
DATA SHEET
As businesses expand into new markets to
grow their customer bases through digital
initiatives, compliance with widely variable
data protection and privacy regulations
is now one of the key competitive
differentiators between industry leaders
and losers.
Nowhere is this more relevant than when collecting,
managing and driving revenue with customers’ personal
information. Gigya, as the leader in customer identity
management, is committed to helping our global clients achieve and maintain data privacy
compliance as privacy regulations continue to evolve and change around the globe.
Serving The World’s Largest Retail Market
By 2021, it has been forecasted that 80% of enterprises worldwide will sell their products and
services in China via digital channels. Responding to this trend, The China National People’s
Congress in November 2016 published a revision of its existing Cybersecurity Law, with a tight
enforcement deadline of June 2017.
The law applies to any organizations defined as having “critical information infrastructure” (CII)
that collect personal data from Chinese citizens. It stipulates that these organizations securely
store and manage these customers’ data within the borders of mainland China, as long as they
are current residents. The law does make exceptions for companies that can prove the necessity
to transfer customer data overseas, but they must seek government approval prior to doing so.
The new Chinese law impacts any businesses wanting to grow their customer base through
the collection and processing of Chinese citizens’ personal data. Why? For one, many large
enterprises need to re-architect entire applications to meet compliance, with a deadline only
seven months out from the law’s enactment. Then, there are the penalties for non-compliance,
which range from financial fines to operational suspension and even criminal liability. This is why
Gigya is offering our clients access to a new primary data center in Shanghai, China.
New Data Center Helps Gigya’s
Clients Manage Compliance with
New Chinese Cybersecurity Law
© 2017 Gigya, Inc.  |  2513 Charleston Road #200, Mountain View, CA 94043  |  T : (650) 353.7230  |  www.gigya.com
Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other
trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya’s services available
to our clients and their end users. Gigya acts as an agent or back-end vendor of its client’s website or mobile application, to which the end user of our client granted permissions (if applicable).
Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients’ direction. For more information, please see Gigya’s Privacy Policy, available at
http://www.gigya.com/privacy-policy/.
Gigya_DS_New Data Center Helps Gigya’s Clients Manage Compliance with New Chinese Cybersecurity Law_201705
About Our New Data Center
Gigya’s China data center marks the fifth regional
data center in our arsenal, which also includes
sites in the U.S., Western Europe, Russia and
Australia. Clients using this new, cloud-based data
center can specify that Chinese customers’ data will
be stored only in our mainland China-based repository
and that all offline backups also physically remain
within the country. Since this new data center is primary,
not secondary, Chinese customer information will remain
discrete from data stored in our other data centers.
Gigya offers full redundancy as customer data is replicated in real-time between two separate data centers
located in Shanghai, and every server role operates in a cluster so there is never a single point of failure.
Gigya’s China data center complies with high-level international certifications to guarantee data security,
including ISO 27001, ISO 27018, SOC1 and SOC2. The requirements for these certifications are consistently
met by Gigya to ensure that the regulatory requirements imposed by China are met and that the data of
both Chinese and international customer bases for all of our global clients remain secure.
How Does Your Business Benefit?
The challenge global enterprises face in China is to find ways to minimize the impact this new law has
on their business, which itself is only one of many new regulatory changes around the world intended to
shore up security and improve privacy for customers’ private data.
Gigya built our Customer Identity Management platform to enable our clients to collect, manage and
secure customer identities at massive scale, while also helping companies comply with these types
of local and regional data laws and regulations. The following three components of Gigya’s Customer
Identity Management platform specifically help mitigate risks associated with the new Chinese
privacy requirements.
1.	 Security practice – Gigya protects all sensitive information such as personally identifiable
information (PII) with industry-standard encryption before it is stored.
2.	Architecture of key systems supporting our clients’ digital applications – Gigya supports full data
backup and retention for PII and other sensitive captured data.
3.	Secure cloud-based data centers in China – Gigya manages discrete local data centers in China to
support the legal collection of PII for secure customer interactions.
In addition, Gigya keeps pace with the privacy policies of more than 25 social networks and other
third-party identity providers including the Chinese networks WeChat, RenRen and Sina Weibo. This
enables Gigya’s 700+ global clients to drive new business value in international markets with minimal
risk, while building trust with their customers.
North
America
Europe Russia
Australia
China

More Related Content

What's hot

BigId GDPRcompliance
BigId   GDPRcomplianceBigId   GDPRcompliance
BigId GDPRcompliance
Fatime Traoré
 
BigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and TaggingBigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and Tagging
Dimitri Sirota
 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data Sheet
Dimitri Sirota
 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data Sheet
Dimitri Sirota
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
BigID Inc
 
BigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetBigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data Sheet
Dimitri Sirota
 
BigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data SheetBigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data Sheet
Dimitri Sirota
 
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID Inc
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy
BigID Inc
 
Presentation by Laila Medina, Ministry of Justice, Latvia
Presentation by Laila Medina, Ministry of Justice, LatviaPresentation by Laila Medina, Ministry of Justice, Latvia
Presentation by Laila Medina, Ministry of Justice, Latvia
OECD Governance
 
BigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetBigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data Sheet
Dimitri Sirota
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
Dimitri Sirota
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
TrustArc
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA Compliance
Precisely
 
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
Priyanka Aash
 
International Business Registers Report 2018
International Business Registers Report 2018 International Business Registers Report 2018
International Business Registers Report 2018
Corporate Registers Forum
 
GDPR - what you need to know
GDPR -  what you need to know GDPR -  what you need to know
GDPR - what you need to know
Maddie Malling-May
 
Webianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection frameworkWebianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection framework
Leigh Hill
 

What's hot (18)

BigId GDPRcompliance
BigId   GDPRcomplianceBigId   GDPRcompliance
BigId GDPRcompliance
 
BigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and TaggingBigID's Smart Data Labeling and Tagging
BigID's Smart Data Labeling and Tagging
 
BigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data SheetBigID GDPR Privacy Automation Data Sheet
BigID GDPR Privacy Automation Data Sheet
 
BigID Virtual MDM Data Sheet
BigID Virtual MDM Data SheetBigID Virtual MDM Data Sheet
BigID Virtual MDM Data Sheet
 
BigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access IntelligenceBigID DataSheet: Data Access Intelligence
BigID DataSheet: Data Access Intelligence
 
BigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data SheetBigID GDPR RoPA / Article 30 Automation Data Sheet
BigID GDPR RoPA / Article 30 Automation Data Sheet
 
BigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data SheetBigID Data Inventory & Data Mapping Data Sheet
BigID Data Inventory & Data Mapping Data Sheet
 
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data  Discovery to...
BigID & Collibra Joint Deck: Using BigID’s Privacy-centric Data Discovery to...
 
BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy BigID Data Sheet HIPAA Data Security & Privacy
BigID Data Sheet HIPAA Data Security & Privacy
 
Presentation by Laila Medina, Ministry of Justice, Latvia
Presentation by Laila Medina, Ministry of Justice, LatviaPresentation by Laila Medina, Ministry of Justice, Latvia
Presentation by Laila Medina, Ministry of Justice, Latvia
 
BigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data SheetBigID Enterprise Privacy Management Data Sheet
BigID Enterprise Privacy Management Data Sheet
 
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data SheetBigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
BigID Data Subject Rights Automation for GDPR & Privacy Data Sheet
 
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
2020 Global Privacy Survey: Emerging Trends, Benchmarking Research and Best P...
 
Finding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA ComplianceFinding Data at Risk for CCPA Compliance
Finding Data at Risk for CCPA Compliance
 
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy(SACON) Shivangi Nadkarni & Sandeep Rao -  An introduction to Data Privacy
(SACON) Shivangi Nadkarni & Sandeep Rao - An introduction to Data Privacy
 
International Business Registers Report 2018
International Business Registers Report 2018 International Business Registers Report 2018
International Business Registers Report 2018
 
GDPR - what you need to know
GDPR -  what you need to know GDPR -  what you need to know
GDPR - what you need to know
 
Webianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection frameworkWebianr: GDPR: How to build a data protection framework
Webianr: GDPR: How to build a data protection framework
 

Similar to Gigya's China Data Center - Data Sheet

White Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertWhite Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertIan Gilbert
 
Connect, Collect, Convert
Connect, Collect, ConvertConnect, Collect, Convert
Connect, Collect, Convert
Gigya
 
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
Gigya
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access management
Tatiana Grisham
 
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
Gigya
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
Gigya
 
Data Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT BuyerData Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT Buyer
Gigya
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media Company
Gigya
 
Data Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceData Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory Compliance
Gigya
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
Gigya
 
Data Sheet: Why Gigya's IDX Marketplace
Data Sheet: Why Gigya's IDX MarketplaceData Sheet: Why Gigya's IDX Marketplace
Data Sheet: Why Gigya's IDX MarketplaceGigya
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
Search Engine Journal
 
Data Sheet: Gigya Company Overview
Data Sheet: Gigya Company OverviewData Sheet: Gigya Company Overview
Data Sheet: Gigya Company Overview
Gigya
 
GDPR: the IBM journey to compliance
GDPR: the IBM journey to complianceGDPR: the IBM journey to compliance
GDPR: the IBM journey to compliance
DataWorks Summit
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
ForgeRock
 
Data Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAMData Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAM
Gigya
 
Data Sheet: Gigya Customer Identity Management Platform Tiers
Data Sheet: Gigya Customer Identity Management Platform TiersData Sheet: Gigya Customer Identity Management Platform Tiers
Data Sheet: Gigya Customer Identity Management Platform Tiers
Gigya
 
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Gigya
 
Case Study: International CPG Company
Case Study: International CPG CompanyCase Study: International CPG Company
Case Study: International CPG Company
Gigya
 
Case Study: Frontier Communications
Case Study: Frontier CommunicationsCase Study: Frontier Communications
Case Study: Frontier Communications
Gigya
 

Similar to Gigya's China Data Center - Data Sheet (20)

White Paper - Connect, Collect, Convert
White Paper - Connect, Collect, ConvertWhite Paper - Connect, Collect, Convert
White Paper - Connect, Collect, Convert
 
Connect, Collect, Convert
Connect, Collect, ConvertConnect, Collect, Convert
Connect, Collect, Convert
 
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
Case Study: Multi-Billion Dollar Enterprise - Managing Millions of Identities...
 
Internal vs. external identity access management
Internal vs. external identity access managementInternal vs. external identity access management
Internal vs. external identity access management
 
White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management White Paper: Internal vs. External Identity Access Management
White Paper: Internal vs. External Identity Access Management
 
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
White Paper: ​The Evolution of Consumer Identity - Five Predictions for 2016​
 
Data Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT BuyerData Sheet: Gigya for the IT Buyer
Data Sheet: Gigya for the IT Buyer
 
Case Study: Enterprise Media Company
Case Study: Enterprise Media CompanyCase Study: Enterprise Media Company
Case Study: Enterprise Media Company
 
Data Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory ComplianceData Sheet: Gigya and Global Regulatory Compliance
Data Sheet: Gigya and Global Regulatory Compliance
 
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT StrategyWhite Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
White Paper: Don't Let Your Corporate Strategy be Hostage to Your IT Strategy
 
Data Sheet: Why Gigya's IDX Marketplace
Data Sheet: Why Gigya's IDX MarketplaceData Sheet: Why Gigya's IDX Marketplace
Data Sheet: Why Gigya's IDX Marketplace
 
How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023How To Build A Winning MarTech Stack In 2023
How To Build A Winning MarTech Stack In 2023
 
Data Sheet: Gigya Company Overview
Data Sheet: Gigya Company OverviewData Sheet: Gigya Company Overview
Data Sheet: Gigya Company Overview
 
GDPR: the IBM journey to compliance
GDPR: the IBM journey to complianceGDPR: the IBM journey to compliance
GDPR: the IBM journey to compliance
 
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - DusseldorfGartner - ForgeRock Identity Live 2017 - Dusseldorf
Gartner - ForgeRock Identity Live 2017 - Dusseldorf
 
Data Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAMData Sheet: Why CPG Companies Need CIAM
Data Sheet: Why CPG Companies Need CIAM
 
Data Sheet: Gigya Customer Identity Management Platform Tiers
Data Sheet: Gigya Customer Identity Management Platform TiersData Sheet: Gigya Customer Identity Management Platform Tiers
Data Sheet: Gigya Customer Identity Management Platform Tiers
 
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
Case Study: DC Thomson Media Creates a Single Customer View Across Multiple D...
 
Case Study: International CPG Company
Case Study: International CPG CompanyCase Study: International CPG Company
Case Study: International CPG Company
 
Case Study: Frontier Communications
Case Study: Frontier CommunicationsCase Study: Frontier Communications
Case Study: Frontier Communications
 

More from Gigya

Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaCase Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Gigya
 
White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy Practices
Gigya
 
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer Identity
Gigya
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
Gigya
 
White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchWhite Paper: 2017 Predictions - French
White Paper: 2017 Predictions - French
Gigya
 
White Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanWhite Paper: 2017 Predictions - German
White Paper: 2017 Predictions - German
Gigya
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel Club
Gigya
 
Data Sheet: Corporate Overview
Data Sheet: Corporate OverviewData Sheet: Corporate Overview
Data Sheet: Corporate Overview
Gigya
 
Gigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya Infographic - Death Of A Password
Gigya Infographic - Death Of A Password
Gigya
 
GDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - German
Gigya
 
White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)
Gigya
 
White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)
Gigya
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality Company
Gigya
 
Case Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyCase Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce Company
Gigya
 
Gigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya Corporate Overview - French Edition
Gigya Corporate Overview - French Edition
Gigya
 
Gigya and Marketo
Gigya and MarketoGigya and Marketo
Gigya and Marketo
Gigya
 
White Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
White Paper: 5 Ways Airports Can Drive Non-Aviation RevenueWhite Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
White Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
Gigya
 
Case Study: Unibail-Rodamco Creates a Connected, Personalized Shopping Experi...
Case Study: Unibail-Rodamco Creates a Connected, Personalized Shopping Experi...Case Study: Unibail-Rodamco Creates a Connected, Personalized Shopping Experi...
Case Study: Unibail-Rodamco Creates a Connected, Personalized Shopping Experi...
Gigya
 
Case Study: American Cancer Society Adopts a 360 Degree Constituent View with...
Case Study: American Cancer Society Adopts a 360 Degree Constituent View with...Case Study: American Cancer Society Adopts a 360 Degree Constituent View with...
Case Study: American Cancer Society Adopts a 360 Degree Constituent View with...
Gigya
 

More from Gigya (20)

Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with GigyaCase Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
Case Study: STV Boosts Viewer Engagement and Campaign Yields with Gigya
 
White Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy PracticesWhite Paper: Gigya's Information Security and Data Privacy Practices
White Paper: Gigya's Information Security and Data Privacy Practices
 
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
Gigya und die Erfüllung globaler behördlicher Auflagen (Global Regulatory Com...
 
The Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer IdentityThe Chutes and Ladders of Customer Identity
The Chutes and Ladders of Customer Identity
 
White Paper: DIY vs CIAM
White Paper: DIY vs CIAMWhite Paper: DIY vs CIAM
White Paper: DIY vs CIAM
 
White Paper: 2017 Predictions - French
White Paper: 2017 Predictions - FrenchWhite Paper: 2017 Predictions - French
White Paper: 2017 Predictions - French
 
White Paper: 2017 Predictions - German
White Paper: 2017 Predictions - GermanWhite Paper: 2017 Predictions - German
White Paper: 2017 Predictions - German
 
Case study - American Kennel Club
Case study - American Kennel ClubCase study - American Kennel Club
Case study - American Kennel Club
 
Data Sheet: Corporate Overview
Data Sheet: Corporate OverviewData Sheet: Corporate Overview
Data Sheet: Corporate Overview
 
Gigya Infographic - Death Of A Password
Gigya Infographic - Death Of A PasswordGigya Infographic - Death Of A Password
Gigya Infographic - Death Of A Password
 
GDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - GermanGDPR Implications Customer Identity Management - German
GDPR Implications Customer Identity Management - German
 
White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)White Paper: Managing consumer data privacy with Gigya (German)
White Paper: Managing consumer data privacy with Gigya (German)
 
White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)White Paper: Managing consumer data privacy with Gigya (French)
White Paper: Managing consumer data privacy with Gigya (French)
 
Case Study: Travel and Hospitality Company
Case Study: Travel and Hospitality CompanyCase Study: Travel and Hospitality Company
Case Study: Travel and Hospitality Company
 
Case Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce CompanyCase Study: Large Enterprise eCommerce Company
Case Study: Large Enterprise eCommerce Company
 
Gigya Corporate Overview - French Edition
Gigya Corporate Overview - French EditionGigya Corporate Overview - French Edition
Gigya Corporate Overview - French Edition
 
Gigya and Marketo
Gigya and MarketoGigya and Marketo
Gigya and Marketo
 
White Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
White Paper: 5 Ways Airports Can Drive Non-Aviation RevenueWhite Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
White Paper: 5 Ways Airports Can Drive Non-Aviation Revenue
 
Case Study: Unibail-Rodamco Creates a Connected, Personalized Shopping Experi...
Case Study: Unibail-Rodamco Creates a Connected, Personalized Shopping Experi...Case Study: Unibail-Rodamco Creates a Connected, Personalized Shopping Experi...
Case Study: Unibail-Rodamco Creates a Connected, Personalized Shopping Experi...
 
Case Study: American Cancer Society Adopts a 360 Degree Constituent View with...
Case Study: American Cancer Society Adopts a 360 Degree Constituent View with...Case Study: American Cancer Society Adopts a 360 Degree Constituent View with...
Case Study: American Cancer Society Adopts a 360 Degree Constituent View with...
 

Recently uploaded

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 

Recently uploaded (20)

Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 

Gigya's China Data Center - Data Sheet

  • 1. DATA SHEET As businesses expand into new markets to grow their customer bases through digital initiatives, compliance with widely variable data protection and privacy regulations is now one of the key competitive differentiators between industry leaders and losers. Nowhere is this more relevant than when collecting, managing and driving revenue with customers’ personal information. Gigya, as the leader in customer identity management, is committed to helping our global clients achieve and maintain data privacy compliance as privacy regulations continue to evolve and change around the globe. Serving The World’s Largest Retail Market By 2021, it has been forecasted that 80% of enterprises worldwide will sell their products and services in China via digital channels. Responding to this trend, The China National People’s Congress in November 2016 published a revision of its existing Cybersecurity Law, with a tight enforcement deadline of June 2017. The law applies to any organizations defined as having “critical information infrastructure” (CII) that collect personal data from Chinese citizens. It stipulates that these organizations securely store and manage these customers’ data within the borders of mainland China, as long as they are current residents. The law does make exceptions for companies that can prove the necessity to transfer customer data overseas, but they must seek government approval prior to doing so. The new Chinese law impacts any businesses wanting to grow their customer base through the collection and processing of Chinese citizens’ personal data. Why? For one, many large enterprises need to re-architect entire applications to meet compliance, with a deadline only seven months out from the law’s enactment. Then, there are the penalties for non-compliance, which range from financial fines to operational suspension and even criminal liability. This is why Gigya is offering our clients access to a new primary data center in Shanghai, China. New Data Center Helps Gigya’s Clients Manage Compliance with New Chinese Cybersecurity Law
  • 2. © 2017 Gigya, Inc.  |  2513 Charleston Road #200, Mountain View, CA 94043  |  T : (650) 353.7230  |  www.gigya.com Gigya, the Gigya logo, and Customer Identity Management Platform are either registered trademarks or trademarks of Gigya Incorporated in the United States and/or other countries. All other trademarks are the property of their respective owners. Gigya does not own any end user data or maintain any other rights to this data, other than utilizing it to make Gigya’s services available to our clients and their end users. Gigya acts as an agent or back-end vendor of its client’s website or mobile application, to which the end user of our client granted permissions (if applicable). Gigya facilitates the collection, transfer and storage of end user data solely on behalf of its clients and at its clients’ direction. For more information, please see Gigya’s Privacy Policy, available at http://www.gigya.com/privacy-policy/. Gigya_DS_New Data Center Helps Gigya’s Clients Manage Compliance with New Chinese Cybersecurity Law_201705 About Our New Data Center Gigya’s China data center marks the fifth regional data center in our arsenal, which also includes sites in the U.S., Western Europe, Russia and Australia. Clients using this new, cloud-based data center can specify that Chinese customers’ data will be stored only in our mainland China-based repository and that all offline backups also physically remain within the country. Since this new data center is primary, not secondary, Chinese customer information will remain discrete from data stored in our other data centers. Gigya offers full redundancy as customer data is replicated in real-time between two separate data centers located in Shanghai, and every server role operates in a cluster so there is never a single point of failure. Gigya’s China data center complies with high-level international certifications to guarantee data security, including ISO 27001, ISO 27018, SOC1 and SOC2. The requirements for these certifications are consistently met by Gigya to ensure that the regulatory requirements imposed by China are met and that the data of both Chinese and international customer bases for all of our global clients remain secure. How Does Your Business Benefit? The challenge global enterprises face in China is to find ways to minimize the impact this new law has on their business, which itself is only one of many new regulatory changes around the world intended to shore up security and improve privacy for customers’ private data. Gigya built our Customer Identity Management platform to enable our clients to collect, manage and secure customer identities at massive scale, while also helping companies comply with these types of local and regional data laws and regulations. The following three components of Gigya’s Customer Identity Management platform specifically help mitigate risks associated with the new Chinese privacy requirements. 1. Security practice – Gigya protects all sensitive information such as personally identifiable information (PII) with industry-standard encryption before it is stored. 2. Architecture of key systems supporting our clients’ digital applications – Gigya supports full data backup and retention for PII and other sensitive captured data. 3. Secure cloud-based data centers in China – Gigya manages discrete local data centers in China to support the legal collection of PII for secure customer interactions. In addition, Gigya keeps pace with the privacy policies of more than 25 social networks and other third-party identity providers including the Chinese networks WeChat, RenRen and Sina Weibo. This enables Gigya’s 700+ global clients to drive new business value in international markets with minimal risk, while building trust with their customers. North America Europe Russia Australia China