Search

1 to 10 of 13
Sort by

Blog Entry
Identifying Personally Identifiable Information

the second highest year since the Identity Theft Resource Center began tracking them in 2005. [1] Between this influx of breaches and rapidly evolving and emerging privacy laws, it is no wonder enterprises are struggling to protect and effectively manage personally identifiable information (PII)

Megan Mohrmann's profile image

Blog Entry
What are the implications of the provisions of the new EU General Data Protection Regulation (GDPR) on U.S. Businesses?

These enhanced data breach notifications require that data processors and controllers institute “appropriate technical and organizational measures” to protect “the rights and freedoms of individuals,” including encryption, confidentiality, integrity and accessibility of personally identifiable information

Andrew Pery's profile image

Blog Entry
Bringing the Cloud Down to Earth

This means it’s vital to comply with personally identifiable information (PII) mandates, including jurisdiction-specific requirements, no matter where your information is stored

Megan Mohrmann's profile image



Blog Entry
Assessing Risk: Is Your Compliance Plan up to the Test?

With highly sensitive data (personally identifiable information, protected health information), limited and appropriate access is always critically important

Matthew Bretzius's profile image

Blog Entry
Protecting privacy essential to protect your organization!

It has never been a secret that the data set that was originally made available by the Federal Energy Regulatory Commission (FERC) contained a high level of personally identifiable information (PII) and even Protected Health Information (PHI) about the company’s former employees

Johannes Scholtes's profile image

Blog Entry
Stealing Your Content for Fame and Fortune

Companies such as MaxxSafe, KPMG, and Corporate Combat have emerging practices with a primary focus on records that deal with personally identifiable information (PII) and other corporate information theft

Dan Elam's profile image

Blog Entry
SharePoint Governance: What You Need to Know to Put a Plan Together

Appropriateness: There is some content, like personally identifiable information such as social security numbers, which should not be on SharePoint

Matthew Bretzius's profile image

Blog Entry
WikiLeaks Makes the Case for Intelligent and Automatic Redaction

Apart from this example of the unauthorized release of confidential information, there are many other use cases for data redaction and examples of where it is critical for operations: Government agencies censor sensitive material when responding to Freedom of Information Act (FOIA) requests Employers and eCommerce providers remove personally identifiable information (PII) that could be intercepted by identify thieves Legal professionals remove PII that is not germane to litigation; privilege, etc

Johannes Scholtes's profile image