Click to learn more about author Stephan Kessler. Today’s information technology allows many organizations to generate, integrate, store, and analyze data of unprecedented size and complexity. In many cases, this is personal data, and its usage is restricted according to privacy laws and regulations. In 2018, the European Union introduced the General Data Protection Regulation […]
How Personally Identifiable Information (PII) Is Evolving
Click to learn more about author Beth Shulkin. Personally identifiable information (PII) is any data used to identify an individual, such as social security number, phone number, or physical address. For years, merchants, banks, government agencies, and countless other organizations have relied on PII to service their customers, for processing transactions of online shoppers, approving […]
Why the CCPA Is Important for Marketers in 2020
Click to learn more about author Rohail Abrahani. The official authorities implemented the California Consumer Privacy Act (CCPA) on January 1, 2020. Without a doubt, this act is a revelation in terms of consumer data protection that compels companies or organizations to take proactive measures related to the collection, sharing, and usage of consumer data. […]
Data Governance: Balancing Security and Availability
When Maria Voreh started at the Federal Bureau of Investigation (FBI), her first assignment was working on the Integrated Automated Fingerprint System (IAFS), technology often seen in police movies and television shows such as “CSI.” “They take a print and the machine does this magic work, and sub-seconds later the suspect is found.” Voreh is […]
From Steam to SaaS: Now DMaaS
Click to learn more about author Dean Gonsowski. We’re in the midst of the Fourth Industrial Revolution. This revolution, also referred to as 4IR or Industry 4.0, is changing how we live, work, and relate to each other. According to Bernard Marr, a strategic technology advisor, this revolution “represents the combination of cyber-physical systems, the Internet of Things, […]
Tackling Data Breaches Through Information Security Systems
Click to learn more about author Sowmya Tejha Kandregula. While the terms “Data Security” and “Data Breach” have been around for a long time, they acquired a lot of traction a few years ago with the proposed implementation of data privacy regulations like the General Data Privacy Regulation (GDPR) and California Customer Protection Act (CCPA). By […]
Steering Clear of the Data Compliance Scavenger Hunt
Click to learn more about author Balaji Ganesan. As the song goes, “…the more things change, the more they stay the same;” the same holds true for the IT industry. Data warehouses began to appear on the IT scene in the late 1980s as a decision support system used for reporting and data analysis. These […]
Why Federated Networks Are Key to Powering Today’s Global Supply Chains
Click to learn more about author Gene Trousil. Countries are increasingly flexing their regulatory muscles and controlling the way data is collected and used within their borders. This has led to variations in regulations across regions that cover security, privacy, and trade, all of which impact the global supply chain. Some countries even have the […]
Why CDOs Need a Bigger Budget Now for Data Governance
Click to learn more about author Amar Kanagaraj. The cybersecurity landscape has been undergoing a sea change, driven by growing data privacy concerns, ever-increasing security threats, regulations, and geopolitical factors. Recently, COVID-19 has fundamentally changed many definitions and structures for businesses. The current health crisis has brought data privacy and security vulnerabilities more sharply into […]
Privacy Laws and Regulations: Where Does Encryption Apply?
Click to learn more about author Muhammad Hamza Shahid. The importance of data is increasing on scales never seen before, becoming one of the most precious assets for organizations worldwide. Various privacy laws and regulations have compelled companies to store and keep their consumers’ data secure as much as possible. The latest research by IDC […]