Data Privacy & Security

Get Started. It's Free
or sign up with your email address
Data Privacy & Security by Mind Map: Data Privacy & Security

1. Data privacy, also called information privacy, is the aspect of information technology (IT) that deals with the ability an organization or individual has to determine what data in a computer system can be shared with third parties.

2. Children’s Online Privacy Protection Act (COPPA) - gives parents control over what information websites can collect from their kids.

3. Electronic Communications Privacy Act (ECPA) - extends government restrictions on wire taps to include transmissions of electronic data.

4. DPOs are required to be experts in data processing and knowledgeable about the protection required for the type of data handled. A DPO can come from a company’s existing staff, and a single officer may work for a company’s related institutions as well.

5. Protecting data from compromise and ensuring data privacy are other key components of data protection.

6. Data security refers to the process of protecting data from unauthorized access and data corruption throughout its lifecycle. Data security includes data encryption, tokenization, and key management practices that protect data across all applications and platforms.

7. Data encryption – Data-centric and tokenization security solutions that protect data across enterprise, cloud, mobile and big data environments.

8. Enterprise Data Protection – Solution that provides an end-to-end data-centric approach to enterprise data protection.

9. Payments Security – Solution provides complete point-to-point encryption and tokenization for retail payment transactions, enabling PCI scope reduction.

10. Cloud access security – Protection platform that allows you to move to the cloud securely while protecting data in cloud applications.