SlideShare a Scribd company logo
1 of 8
Download to read offline
Based on mcloudoc
Protect
Customer’s
Personal
Information
Personal information protection based on mcloudoc
Function to protect personal information
Intranet
01
computer room
logical network
separation
Internet
Personal Information
Security Statistics
No saving to Local Disk
(Centralize documents)
LOG A
Personal Information
Document Processing Log
Document Security Level
Personal Information
Processing System
Personal information protection based on mcloudoc
Unify Personal Information Management Points
Many personal information documents are scattered over many PCs in your company.
We will unify the management points so that your cost can be down.
02
Don't Save Local PC mcloudoc Server
personal information document
Personal information protection based on mcloudoc
Setting permissions for personal information documents
Control the handling of personal information documents by granting them
the right to handle documents according to the role of the administrator
03
Permission to view
the document
Permission to move
document
Permission to print
a document
Screen capture
rights
Clipboard copy right
Customer
personal
Information
Identity
Information
Contact
Information
Other
identification
Information
Document
security level
Document
handling privileges
Personal information protection based on mcloudoc
Hidden personal information detection
and management
04
Control and manage documents by reporting to the administrator the documents
whose personal information is detected among the documents created by users
Documents containing personal information
[Retention], [containment], [deletion] etc.
04
123456-7890123
010-9846-5432
Create personal
information document
01
Personal information
pattern detection
02
employee
Detection result report03
mcloudoc Server
Personal information manager
Personal information protection based on mcloudoc
Recording personal information processing logs
When handling personal information documents in the central document drives,
we record processing logs for administrators.
Download customer
personal information
maliciously
05
Read/Write RenameCreate File
Tracking logs
Caught!
Copy/Move
Personal information protection based on mcloudoc
Logical network separation for preventing
external leakage of personal information documents
Prevent external leakage of personal information by strictly controlling
the network through internal and external network separation settings
06
Internal network mode / External network mode
Internal network mode External network mode
Groupware
Personal information processing system
mcloudoc archive
Personal Information
Processing System
Personal Information
Processing System
INVEST LESS AND GET MORE!
TEL
FAX
Email
Web
+82.2.588.0708
+82.2.588.1012
sales@mcloudoc.com
www.mcloudoc.com
Check personal information protection
through video!
Meet mcloudoc, the #1 market share in
document centralization, on

More Related Content

What's hot

Mindtree agile offering.
Mindtree agile offering.Mindtree agile offering.
Mindtree agile offering.Mindtree Ltd.
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recoverySameeu Imad
 
Mindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree Ltd.
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss preventionssuser1eca7d
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefingtechnext1
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Syed Sabhi Haider
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security IssuesHTS Hosting
 
Practice case legal for data professional
Practice case legal for data professionalPractice case legal for data professional
Practice case legal for data professionalNovita Sari
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your CloudthinkASG
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Microsoft Österreich
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfYounesChafi1
 
Arbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsArbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsMicrosoft Österreich
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information ProtectionMicrosoft Österreich
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computingMd. Hasibur Rashid
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksAkram Qureshi
 

What's hot (20)

Mindtree agile offering.
Mindtree agile offering.Mindtree agile offering.
Mindtree agile offering.
 
Disaster recovery
Disaster recoveryDisaster recovery
Disaster recovery
 
Mindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principlesMindtree distributed agile journey and guiding principles
Mindtree distributed agile journey and guiding principles
 
Office 365 data loss prevention
Office 365 data loss preventionOffice 365 data loss prevention
Office 365 data loss prevention
 
Microsoft Platform Security Briefing
Microsoft Platform Security BriefingMicrosoft Platform Security Briefing
Microsoft Platform Security Briefing
 
Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview Microsoft Cloud Application Security Overview
Microsoft Cloud Application Security Overview
 
The Top Cloud Security Issues
The Top Cloud Security IssuesThe Top Cloud Security Issues
The Top Cloud Security Issues
 
Practice case legal for data professional
Practice case legal for data professionalPractice case legal for data professional
Practice case legal for data professional
 
Cyber security infotech pvt ltd
Cyber security infotech pvt ltdCyber security infotech pvt ltd
Cyber security infotech pvt ltd
 
Cloud Security Governance
Cloud Security GovernanceCloud Security Governance
Cloud Security Governance
 
White Paper: Protecting Your Cloud
White Paper: Protecting Your CloudWhite Paper: Protecting Your Cloud
White Paper: Protecting Your Cloud
 
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
Harald Leitenmüller | DSGVO - globaler, zeitgemäßer Datenschutzstandard für M...
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Cloud security
Cloud securityCloud security
Cloud security
 
Arbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat AnalyticsArbel Zinger | Microsoft Advanced Threat Analytics
Arbel Zinger | Microsoft Advanced Threat Analytics
 
Emma Aubert | Information Protection
Emma Aubert | Information ProtectionEmma Aubert | Information Protection
Emma Aubert | Information Protection
 
cloud Resilience
cloud Resilience cloud Resilience
cloud Resilience
 
Cloud security (domain11 14)
Cloud security (domain11 14)Cloud security (domain11 14)
Cloud security (domain11 14)
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
 
Msft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacksMsft cloud architecture_security_commonattacks
Msft cloud architecture_security_commonattacks
 

Similar to Protect customer's personal information eng 191018

Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and ComplianceDavid J Rosenthal
 
mcloudoc brochure eng
mcloudoc brochure engmcloudoc brochure eng
mcloudoc brochure engsang yoo
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptxkovec2684
 
Secure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxSecure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxjeffreye3
 
Cloudoc brochure eng_20170823
Cloudoc brochure eng_20170823Cloudoc brochure eng_20170823
Cloudoc brochure eng_20170823sang yoo
 
[Cloudoc] application document_centralization_for_financial_industry
[Cloudoc] application document_centralization_for_financial_industry[Cloudoc] application document_centralization_for_financial_industry
[Cloudoc] application document_centralization_for_financial_industrysang yoo
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issuesJyoti Srivastava
 
Dr. ritu soni
Dr. ritu soniDr. ritu soni
Dr. ritu soniijcite
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishekEr. rahul abhishek
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and RetrievalIOSR Journals
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataProcore Technologies
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayDATAVERSITY
 
ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708sang yoo
 

Similar to Protect customer's personal information eng 191018 (20)

Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
mcloudoc brochure eng
mcloudoc brochure engmcloudoc brochure eng
mcloudoc brochure eng
 
Primend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisusPrimend praktiline konverents - Office 365 turvalisus
Primend praktiline konverents - Office 365 turvalisus
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
SMB Security Product Overview.pptx
SMB Security Product Overview.pptxSMB Security Product Overview.pptx
SMB Security Product Overview.pptx
 
Secure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docxSecure File SharingSecure File Sharing Using Access Contro.docx
Secure File SharingSecure File Sharing Using Access Contro.docx
 
Cloudoc brochure eng_20170823
Cloudoc brochure eng_20170823Cloudoc brochure eng_20170823
Cloudoc brochure eng_20170823
 
[Cloudoc] application document_centralization_for_financial_industry
[Cloudoc] application document_centralization_for_financial_industry[Cloudoc] application document_centralization_for_financial_industry
[Cloudoc] application document_centralization_for_financial_industry
 
Practical Security for the Cloud
Practical Security for the CloudPractical Security for the Cloud
Practical Security for the Cloud
 
Cloud computing and its security issues
Cloud computing and its security issuesCloud computing and its security issues
Cloud computing and its security issues
 
Dr. ritu soni
Dr. ritu soniDr. ritu soni
Dr. ritu soni
 
Security Issues in Cloud Computing by rahul abhishek
Security Issues in Cloud Computing  by rahul abhishekSecurity Issues in Cloud Computing  by rahul abhishek
Security Issues in Cloud Computing by rahul abhishek
 
A Secure Model for Cloud Computing Based Storage and Retrieval
A Secure Model for Cloud Computing Based Storage and  RetrievalA Secure Model for Cloud Computing Based Storage and  Retrieval
A Secure Model for Cloud Computing Based Storage and Retrieval
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Comparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptxComparative Analysis of Windows and Linux System.pptx
Comparative Analysis of Windows and Linux System.pptx
 
Importance of DBMS.pptx
Importance of DBMS.pptxImportance of DBMS.pptx
Importance of DBMS.pptx
 
Security in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your DataSecurity in the Cloud: Tips on How to Protect Your Data
Security in the Cloud: Tips on How to Protect Your Data
 
Cloud Security_ Unit 4
Cloud Security_ Unit 4Cloud Security_ Unit 4
Cloud Security_ Unit 4
 
Data Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement TodayData Governance Trends and Best Practices To Implement Today
Data Governance Trends and Best Practices To Implement Today
 
ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708ClouDoc brochure_eng_20160708
ClouDoc brochure_eng_20160708
 

More from sang yoo

Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226sang yoo
 
Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226sang yoo
 
Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226sang yoo
 
Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226sang yoo
 
Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519sang yoo
 
mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823sang yoo
 
mcloudoc brochure chn
mcloudoc brochure chnmcloudoc brochure chn
mcloudoc brochure chnsang yoo
 
mcloudoc brochure jpn
mcloudoc brochure jpnmcloudoc brochure jpn
mcloudoc brochure jpnsang yoo
 
mcloudoc brochure kor
mcloudoc brochure kormcloudoc brochure kor
mcloudoc brochure korsang yoo
 
Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111sang yoo
 
Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112sang yoo
 
Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111sang yoo
 
Telework leaflet eng
Telework leaflet engTelework leaflet eng
Telework leaflet engsang yoo
 
Telework leaflet jpn
Telework leaflet jpnTelework leaflet jpn
Telework leaflet jpnsang yoo
 
Telework leaflet chn
Telework leaflet chnTelework leaflet chn
Telework leaflet chnsang yoo
 
mcloudoc telework leaflet_kor
mcloudoc telework leaflet_kormcloudoc telework leaflet_kor
mcloudoc telework leaflet_korsang yoo
 
Mcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpnMcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpnsang yoo
 
mcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chnmcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chnsang yoo
 
mcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kormcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_korsang yoo
 
Protect customer's personal information chn 191018
Protect customer's personal information chn 191018Protect customer's personal information chn 191018
Protect customer's personal information chn 191018sang yoo
 

More from sang yoo (20)

Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226Mcloudoc based telework_jpn_200226
Mcloudoc based telework_jpn_200226
 
Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226Mcloudoc based telework_chn_200226
Mcloudoc based telework_chn_200226
 
Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226Mcloudoc based telework_eng_200226
Mcloudoc based telework_eng_200226
 
Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226Mcloudoc based telework_kor_200226
Mcloudoc based telework_kor_200226
 
Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519Mcloudoc intro kor_20200519
Mcloudoc intro kor_20200519
 
mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823mcloudoc based telework_chn_20190823
mcloudoc based telework_chn_20190823
 
mcloudoc brochure chn
mcloudoc brochure chnmcloudoc brochure chn
mcloudoc brochure chn
 
mcloudoc brochure jpn
mcloudoc brochure jpnmcloudoc brochure jpn
mcloudoc brochure jpn
 
mcloudoc brochure kor
mcloudoc brochure kormcloudoc brochure kor
mcloudoc brochure kor
 
Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111Clou doc backupdoc_intro_chn_20191111
Clou doc backupdoc_intro_chn_20191111
 
Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112Clou doc backupdoc_intro_jpn_20191112
Clou doc backupdoc_intro_jpn_20191112
 
Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111Clou doc backupdoc_intro_kor_20191111
Clou doc backupdoc_intro_kor_20191111
 
Telework leaflet eng
Telework leaflet engTelework leaflet eng
Telework leaflet eng
 
Telework leaflet jpn
Telework leaflet jpnTelework leaflet jpn
Telework leaflet jpn
 
Telework leaflet chn
Telework leaflet chnTelework leaflet chn
Telework leaflet chn
 
mcloudoc telework leaflet_kor
mcloudoc telework leaflet_kormcloudoc telework leaflet_kor
mcloudoc telework leaflet_kor
 
Mcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpnMcloudoc ransomware leaflet_jpn
Mcloudoc ransomware leaflet_jpn
 
mcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chnmcloudoc ransomware leaflet_chn
mcloudoc ransomware leaflet_chn
 
mcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kormcloudoc ransomware leaflet_kor
mcloudoc ransomware leaflet_kor
 
Protect customer's personal information chn 191018
Protect customer's personal information chn 191018Protect customer's personal information chn 191018
Protect customer's personal information chn 191018
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Protect customer's personal information eng 191018

  • 2. Personal information protection based on mcloudoc Function to protect personal information Intranet 01 computer room logical network separation Internet Personal Information Security Statistics No saving to Local Disk (Centralize documents) LOG A Personal Information Document Processing Log Document Security Level Personal Information Processing System
  • 3. Personal information protection based on mcloudoc Unify Personal Information Management Points Many personal information documents are scattered over many PCs in your company. We will unify the management points so that your cost can be down. 02 Don't Save Local PC mcloudoc Server personal information document
  • 4. Personal information protection based on mcloudoc Setting permissions for personal information documents Control the handling of personal information documents by granting them the right to handle documents according to the role of the administrator 03 Permission to view the document Permission to move document Permission to print a document Screen capture rights Clipboard copy right Customer personal Information Identity Information Contact Information Other identification Information Document security level Document handling privileges
  • 5. Personal information protection based on mcloudoc Hidden personal information detection and management 04 Control and manage documents by reporting to the administrator the documents whose personal information is detected among the documents created by users Documents containing personal information [Retention], [containment], [deletion] etc. 04 123456-7890123 010-9846-5432 Create personal information document 01 Personal information pattern detection 02 employee Detection result report03 mcloudoc Server Personal information manager
  • 6. Personal information protection based on mcloudoc Recording personal information processing logs When handling personal information documents in the central document drives, we record processing logs for administrators. Download customer personal information maliciously 05 Read/Write RenameCreate File Tracking logs Caught! Copy/Move
  • 7. Personal information protection based on mcloudoc Logical network separation for preventing external leakage of personal information documents Prevent external leakage of personal information by strictly controlling the network through internal and external network separation settings 06 Internal network mode / External network mode Internal network mode External network mode Groupware Personal information processing system mcloudoc archive Personal Information Processing System Personal Information Processing System
  • 8. INVEST LESS AND GET MORE! TEL FAX Email Web +82.2.588.0708 +82.2.588.1012 sales@mcloudoc.com www.mcloudoc.com Check personal information protection through video! Meet mcloudoc, the #1 market share in document centralization, on