Professional Documents
Culture Documents
By Lawrence C. Miller
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Data Privacy For Dummies®, Informatica Special Edition
Published by
John Wiley & Sons, Inc.
111 River Street
Hoboken, NJ 07030-5774
www.wiley.com
Copyright © 2019 by John Wiley & Sons, Inc.
No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form
or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as
permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without the prior written
permission of the Publisher. Requests to the Publisher for permission should be addressed to the
Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011,
fax (201) 748-6008, or online at http://www.wiley.com/go/permissions.
Trademarks: Wiley, the Wiley logo, For Dummies, the Dummies Man logo, A Reference for the Rest
of Us!, The Dummies Way, Dummies.com, Making Everything Easier, and related trade dress are
trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the United States
and other countries, and may not be used without written permission. Informatica and the Informatica
logo are registered trademarks of Informatica. All other trademarks are the property of their respective
owners. John Wiley & Sons, Inc., is not associated with any product or vendor mentioned in this book.
For general information on our other products and services, or how to create a custom For Dummies book
for your business or organization, please contact our Business Development Department in the U.S. at
877-409-4177, contact info@dummies.biz, or visit www.wiley.com/go/custompub. For information about
licensing the For Dummies brand for products or services, contact BrandedRights&Licenses@Wiley.com.
10 9 8 7 6 5 4 3 2 1
Publisher’s Acknowledgments
Some of the people who helped bring this book to market include the following:
Project Editor: Special Help from Informatica:
Carrie Burchfield-Leighton Dan Everett, Nathan Turajski,
Acquisitions Editor: Katie Mohr Gary Patterson, Joe Bracken,
Patti Garon Lee, Shino Kizaki
Editorial Manager: Rev Mengle
Business Development
Representative: Karen Hattan
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
INTRODUCTION................................................................................................ 1
About This Book.................................................................................... 1
Foolish Assumptions............................................................................. 1
Icons Used in This Book........................................................................ 2
Beyond the Book................................................................................... 2
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
CHAPTER 4: Exploring Data Privacy Use Cases................................. 31
Privacy Compliance............................................................................. 31
Data Protection.................................................................................... 34
DevOps Privacy.................................................................................... 35
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
G
lobal privacy regulations, personal data growth, escalating
data losses, and new customer expectations demand
organizations to optimize and scale their intelligence and
protection of personal and sensitive data. Security breaches and
regulatory non-compliance have raised enforcement, driving
organizations to develop new data privacy and security govern-
ance policies, and strategically integrate their communication
and enforcement with a comprehensive data protection solution.
Operationalizing data protection requires automated next-
generation tools to define data use and purpose; discover, clas-
sify, and monitor data movement and access; map identities;
continuously analyze and track risk; automate and orchestrate
controls; and effectively demonstrate readiness. Organizations
must also quickly respond to requests on data use, deletion, and
transfers or third-party sales. Error-prone manual processes
won’t scale to meet these new challenges — an automated, relia-
ble approach is needed.
Foolish Assumptions
You are a chief data officer, privacy officer, data protection officer,
information security officer, marketing officer, or similarly, an
executive with “data” in your job title or description, responsible
Introduction 1
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
for security and privacy. This book is primarily for non-technical
readers to learn about innovative solutions to help successfully
implement data privacy policies and processes. If this describes
you, this book is for you with important takeaways that you will
want to share.
This icon points out information you should commit to your non-
volatile memory, your gray matter, or your noggin — along with
anniversaries and birthdays.
These alerts point out the stuff your mother warned you about
(well, probably not), but they do offer practical advice to help you
avoid potentially costly or frustrating mistakes.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Recognizing the growth of data volumes
and uses
Chapter 1
Understanding the Data
Privacy Imperative
I
n this chapter, you take a journey through the evolution of data
privacy, as well discover the opportunities and benefits of an
effective data privacy program and solution for your business.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Today, managing data has never been harder for organizations.
In Data 1.0, from the 1960s to 2000, data was used in specific
business applications, such as payroll automation, airline reser-
vations, and retail transactions. Business solutions like Extract
Transform Load (ETL) and data integration defined this era.
In Data 2.0, during the last 15 to 20 years, data was used to support
enterprise-wide business processes like supply chain, straight-
through processing, and quote to cash. Solutions for data qual-
ity, master data management (MDM), cloud data integration, data
security, data archiving, and other data services evolved during
this era.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» The desire to use data for analytics, process improvements,
and machine learning increases the risk of unintentionally
using, copying, and combining data in ways that violate
contractual and regulatory obligations.
»» Ethical use of data is influencing your customers’ loyalty
decisions on what companies they do business with.
»» The growing sophistication of threat actors and the potential
for malicious activities both inside and outside of your
business are accelerating.
»» The number of data privacy regulations around the world
and the associated fines for non-compliance are growing.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» 62 percent blame the company first in the event of a data
breach, rather than the hacker.
»» 83 percent of United States consumers will stop spending for
several months after a breach or serious incident is made
public.
»» 21 percent of United States consumers will never return to a
brand that has suffered a data breach.
»» Name
»» Social Security Number (SSN)
»» Data and place of birth
»» Mother’s maiden name
»» Email address
»» Physical address
»» Location (such as IP address)
»» Biometric records
»» Medical, educational, financial, or employment information
Some examples of relevant data security and privacy regulations,
standards, and agencies around the world include
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» The European Union (EU) General Data Protection
Regulation (GDPR): The GDPR establishes privacy rights for
EU residents (not just citizens). Learn more at eugdpr.org.
»» U.S. Health Insurance Portability and Accountability Act
(HIPAA): HIPAA establishes data privacy and security
requirements for safeguarding protected health information
(PHI). Learn more at www.hhs.gov/hipaa/index.html.
»» U.S. Health Information Technology for Economic and
Clinical Health (HITECH) Act: The HITECH Act establishes
data breach reporting and notification requirements for
entities subject to HIPAA, and extends HIPAA privacy and
security requirements (including civil and criminal penalties)
to business associates of entities subject to HIPAA. Learn
more at www.hhs.gov/hipaa/for-professionals/
special-topics/hitech-act-enforcement-interim-
final-rule/index.html.
»» U.S. Federal Information Security Management Act
(FISMA): FISMA establishes a mandatory framework for
information security applicable to U.S. Federal Government
agencies. Learn more at www.dhs.gov/fisma.
»» U.S. Sarbanes-Oxley (SOX) Act: SOX establishes new or
expanded governance and auditing requirements for U.S.
public companies. Learn more at www.sec.gov/spotlight/
sarbanes-oxley.htm.
»» U.S. Gramm-Leach-Bliley Act (GLBA): GLBA requires financial
institutions to explain their information sharing practices to
their customers and to safeguard sensitive data. Learn more
at www.ftc.gov/tips-advice/business-center/privacy-
and-security/gramm-leach-bliley-act.
»» U.S. Privacy Act: The Privacy Act establishes information
practices to govern the collection, maintenance, use, and
dissemination of information about individuals. Learn more
at www.justice.gov/opcl/privacy-act-1974.
»» The Personal Information Protection and Electronic
Documents Act (PIPEDA): PIPEDA establishes governance
for private sector organizations that collect, use, and disclose
personal information. Learn more at www.priv.gc.ca/
en/privacy-topics/privacy-laws-in-canada/the-
personal-information-protection-and-electronic-
documents-act-pipeda.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Notifiable Data Breaches (NDB) Act (2017): The NDB
establishes notification requirements in the event of a data
breach that is likely to result in serious harm to affected
individuals. Learn more at www.oaic.gov.au/privacy-
law/privacy-act/notifiable-data-breaches-scheme.
»» China Information Security Technology Personal
Information Security Specification (GB/T 35273-2017):
GB/T 35273-2017 establishes requirements for consent and
the collection, use, and sharing of personal information.
Learn more at http://www.gb688.cn/bzgk/gb/newGbInfo
?hcno=4FFAA51D63BA21B9EE40C51DD3CC40BE.
»» Singapore Personal Data Protection Act (PDPA): The
PDPA establishes data protection requirements in Singapore.
Learn more at www.pdpc.gov.sg/Legislation-and-
Guidelines/Personal-Data-Protection-Act-Overview.
»» Indian Personal Data Protection Bill (2018): The Personal
Data Protection Bill establishes privacy rights for individuals
(referred to as data principals) and obligations for organiza-
tions (referred to as data fiduciaries). Learn more at meity.
gov.in/writereaddata/files/Personal_Data_
Protection_Bill,2018.pdf.
»» New York State Department of Financial Services
(NYDFS): NYDFS provides oversight and advice for various
federal and New York state privacy laws and regulations.
Learn more at www.dfs.ny.gov.
»» Payment Card Industry (PCI) Data Security Standards
(DSS): PCI DSS is a global information security standard
applicable to organizations that process credit and debit
cards. Learn more at www.pcisecuritystandards.org.
»» Financial Industry Regulatory Authority (FINRA): FINRA is
a non-governmental organization that is responsible for
protecting investors and regulating member brokerage firms
and exchange markets. Learn more at www.finra.org.
More than 80 countries have data privacy laws, and Turkey, India,
China, Brazil, Singapore, and other countries are clamping down
on data security malpractice and rigorously enforcing national
and regional laws regarding personal and sensitive informa-
tion. Additionally, 11 states in the United States passed or updated
privacy laws in 2018.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Holistic Approach
Organizations can no longer rely on siloed and legacy approaches
to discovering, analyzing, protecting, and monitoring personal
and sensitive data. With the threat of massive data breaches,
substantial penalties, and the need to maintain customer trust,
organizations today urgently need to shift to a new data-centric
security paradigm that takes a holistic approach with
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
data collected and processed, recipients of personal
data)
»» Right to rectification
»» Right to erasure (“right to be forgotten”)
»» Right to data portability (receive personal data about
yourself in a structured, commonly used, and machine-
readable format)
»» Right to object (for example, profiling and automated
decision-making based on personal data)
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Reducing overall business risk: Organizations can reduce
security, privacy, and compliance risk by discovering,
identifying, cataloging, and protecting their sensitive data.
More importantly, they can reduce risk to brand reputation,
customer purchasing behavior, and business with partners.
»» Accelerating digital transformation: Data privacy and
governance programs give you the opportunity to establish a
data foundation for digital transformation. They help you
discover where data resides across the organization;
understand the processes, systems, and people that use the
data; and create policies and business rules for quality,
protection, and use of the data. These discovery, cataloging,
mapping, and governance activities are beneficial to digital
business initiatives such as
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Creating data privacy policies
Chapter 2
Defining Requirements
for Data Privacy at Scale
I
n this chapter, you explore some important business require-
ments that enable you to scale your data privacy program to
meet your organization’s needs.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Some important data governance policies that need to be docu-
mented and maintained include
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
varies for business users, researchers, testers, customer
service, application testing, and other mission critical roles.
»» Data retention and deletion: Retention policies must
balance the desire to archive and purge unused data to
reduce storage costs and business risk with business and
legal discovery retention management requirements. These
policies will clarify what data needs to be stored for how
long, in what format, applying what rules, with what level of
masking or encryption, and with what access guidelines.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Automating Manual Processes
Manual processes and siloed solutions don’t scale, and consoli-
dation and normalization of their outputs is time-consuming and
error prone. To provide consistent results in a timely manner,
organizations need to automate their data management and pri-
vacy processes. Automation enables businesses to leverage real-
time analytics, machine learning, and artificial intelligence (AI) to
improve consistency and objectivity, and to support standardiza-
tion and scaling across the enterprise.
Monitoring Readiness on a
Continuous Basis
Continuously monitoring readiness and compliance is impera-
tive to ensure organizations don’t run afoul of regulators and
customers. The volume and velocity of data today, as well as
the scale and sophistication of data breaches (I discuss these in
Chapter 1), render point-in-time monitoring solutions ineffective
for ensuring adequate data security and privacy. Organizations
can monitor KRIs such as anomalous use, unexpected data move-
ment, and excessive access by users.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Ensuring Appropriate Data Access
and Usage
To ensure sensitive data isn’t improperly accessed or used,
organizations need to bound data access to identities and provide
access to users on a need-to-know basis. With data security poli-
cies, user access can be controlled by individuals, groups/roles,
and environments. This is potentially the most critical factor in
ensuring the proper use and access of personal data: that is, by
tightly controlling data access based on the validated and autho-
rized business purposes for each user.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Establishing a data governance program
Chapter 3
Implementing an
Intelligent Data
Privacy Solution
O
rganizations today deal with huge volumes of data mov-
ing faster and further than ever before. If you can apply
security controls at an asset level for data privacy, you can
protect data wherever it resides — even when it leaves your
organization.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Define and Manage Governance Policies
Understanding the purpose, use, systems, and people related to
the processing of personal data helps you build privacy policies,
assign accountability, and provide transparency for data subject
rights. The organization can clearly define what business pro-
cesses data supports, who is using the data, and the regulations
that govern it. Data governance programs are often driven by
regulatory compliance requirements.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
To help you define and manage your governance policies, look for
a data privacy solution that can
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Amazon S3; unstructured data on Common Internet File System
(CIFS) Network File System (NFS); and SharePoint traditional
structured data stores.
»» Agentless scanning
»» Ability to schedule scan jobs
»» False positive detection and handling
»» Ability to configure scans to leverage artificial intelligence (AI)
and machine learning, with configurable options to optimize
performance and accuracy
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Data proliferation involves determining and tracking where sen-
sitive data has moved to other data stores in your organization,
and providing drill-down capabilities to understand, monitor,
and protect data wherever it proliferates.
Map Identities
Identity is core to privacy. To support many privacy requirements,
personal and sensitive data must be accurately and holistically
mapped to the individuals it represents in various systems. This
helps you address data subject access rights, and data breach
notification requirements.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Locating an individual’s sensitive data quickly to support
privacy requests, such as “What data do you hold on me?”
and “Please remove all my data!”
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
access to sensitive data by user(s), data store, time of occurrence,
and other criteria, and incorporate this user activity into overall
risk scoring.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Protection: How the data itself is protected.
»» Custom Risk Factor(s): Define, measure, and argue any
other criteria as risks.
»» User Access/Activity: Frequency and volume of user
activity.
»» Liability Cost: Value of data loss to the organization.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
To provide comprehensive data protection, look for these features
in a data privacy solution:
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Measure, Communicate,
and Audit Response
Tracking compliance and risk indicators enables you to align your
privacy strategy and operations. In a data privacy solution, this
capability provides visualizations and reports to support cross-
functional collaboration and satisfy auditors. Moreover, you can
continuously measure your organization’s risk to gauge how well
policies and processes impact data risk.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Accuracy and effectiveness: To maintain a high, reliable
level of accuracy in a constantly changing environment, a
data privacy solution requires data context, subject identity
mapping, user behavior analytics, and risk analysis. Without
them, the organization won’t have the intelligence to effec-
tively prioritize data protection resources and investments
and monitor data use for potential privacy violations.
»» Continuous protection without interruption: A data
privacy solution must be flexible enough to maintain data
protection and compliance insights in an environment where
data, usage, users, and regulations are in constant flux. If a
solution cannot support policy customization and regular
reassessment of risk, it can’t provide truly continuous
protection of private data.
»» Out-of-the-box deployment readiness: Pre-defined data
policies and domains for regulations and common personal
data types help organizations quickly access privacy risks
and map their privacy data. Additionally, with integrations
to popular security solutions and application programming
interfaces (APIs), organizations can rapidly integrate and
leverage existing investments in enterprise security controls,
such as single sign-on (SSO), password management, and
data protection such as masking, encryption, and tokeniza-
tion solutions.
»» Support for hybrid environments: Any solution you
choose must cover all your data sources, whether managed
in traditional on-premises systems, multi-cloud environ-
ments, or big data anywhere — consisting of either struc-
tured or unstructured data formats.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Complying with privacy legislation
Chapter 4
Exploring Data Privacy
Use Cases
I n this chapter, I give you some common data privacy use cases
and real-world customer success stories.
Privacy Compliance
The European Union (EU) General Data Protection Regulation
(GDPR) went into force in May 2018, affording enhanced pro-
tection to the personal data of EU residents. The GDPR applies
to any organization established in the EU and to any organiza-
tion (anywhere in the world) that processes the personal data of
EU data subjects (identified or identifiable natural persons) when
offering them goods or services or when monitoring or tracking
their activities.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The GDPR requires organizations to fully understand how they
use current and future information assets to incorporate these
new data privacy requirements and enhance privacy rights. For
many organizations, the associated changes to information man-
agement practices will require a thorough evaluation of current
and future data capabilities.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
PRIVACY COMPLIANCE
A North American insurance company with more than 2,500 employ-
ees is among the top 100 insurance organizations in the country based
on net written premiums. Maintaining the trust of its clients and policy-
holders is a top priority for the company. In order to keep all data pri-
vate, meet privacy rights requirements, and deploy solutions for data
discovery and data masking, the organization had the following goals:
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
GDPR and CCPA compliance offer new opportunities to implement
best practices through automation that can optimize future data
handling and use.
Data Protection
Beyond regulatory compliance requirements, organizations must
ensure robust data protection programs to reduce risk and earn
customer trust. Data protection must be woven into the fabric of
your organization. It must be applied on an enterprise-wide scale
and it must involve everyone — because everyone uses data and
needs to do so responsibly.
DATA PROTECTION
A major North American healthcare organization is transforming how
it does business, including operations and enterprise architecture.
These changes will enable the organization to have superior agility to
deal with dynamic customer and market conditions. It’s leveraging
this transformation to infuse data protection and privacy across the
hybrid architecture. From the top down, the organization has identi-
fied customer trust as its top goal. For the data protection program, it
had the following goals:
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
• Improve the usability and access of its services
• Protect information to prevent misuse or data loss to maintain
and grow customer trust
• Protect data in operations, DevOps, and analytics
To address these goals and requirements, the organization imple-
mented a data protection solution to accomplish the following:
With data protection across all its personal and sensitive data, the
organization has achieved the following results:
DevOps Privacy
DevOps enables more frequent, timely, higher quality software
delivery by deploying automated tools for test, release, configu-
ration management and continuous integration, while fostering
collaboration across the various teams involved in a release. Ide-
ally, test data used in the DevOps test environment presents a
subset of representative production data. This data must be pro-
tected for data privacy in the same way as other sensitive data in
the organization.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
aging, pseudonymization, and anonymization) to ensure no user
can view or easily deduce the original data. Masking ensures no
user can view or easily deduce the original data, while maintain-
ing the original characteristics of the data and consistency across
related masked data, thus ensuring test data quality.
DEVOPS PRIVACY
A leading global provider of on-demand marketing solutions empow-
ers businesses to market more effectively through email, web, print,
mobile, and social media channels. This provider had the following
business needs:
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Defining how data is used and how to
protect it
»» Measuring progress
Chapter 5
Ten Keys to Successfully
Implementing a Data
Privacy Solution
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Here are key questions for defining your data:
Risk also accounts for the transient nature of data. If one charac-
teristic of a data asset changes — say, its volume, location, usage,
or proliferation, protection, and so on — its risk score can be
adjusted accordingly.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
baseline for the privacy program to measure progress and deter-
mine remediation.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
A phased program makes more sense. Start off with your most
sensitive data, a small group of people, and a clear objective. Then
once you’ve achieved demonstrable results, you can scale your
program to tackle new challenges.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
machine learning to easily and quickly identify unusual user
behavior such as excessive access. Suspicious events are then
more easily detected and more accurately reported, so IT can take
proactive steps and remediate potential threats faster.
As the security team configures and rolls out the data protection
solution, it will need to perform the following activities:
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
the best protection. Personal and sensitive data should always be
encrypted at rest and a combination of data masking and access
controls provide the safeguards to help support the proper access
and use of personal and sensitive data. Data lakes accessed by
multiple users and applications will need to take location, time,
and necessary levels of privileges into account when setting up
access rules.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Lead the Way forward with
Intelligent Automation
A policy-based, intelligent, automated data privacy solution
leverages analytics based on AI and machine learning for com-
pliance reporting, risk analysis, user behavior monitoring, and
security orchestration and remediation ensures that even in a
fast-changing environment, data remains up-to-date and secure.
Discover more about analytics, AI, and automation in Chapters 2
and 3.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
As such, organizations now need to track compliance and risk
indicators continuously to align privacy strategy, investments,
resources, and business operations to ensure ongoing progress
toward established organizational goals and compliance require-
ments. Having a reliable approach to routine audits that enable
privacy control attestation can help avoid future headaches in the
event of a potential breach alert or an investigation that requires
taking quick and decisive action.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2019 John Wiley & Sons, Inc. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.