Tag Archives: #GDPR #CCPA  #AWS #Compliance #Breach #WAWA #Facebook #Hackers #Data Breach #DoorDash #CapitalOne #Equifax

GDPR, CCPA  How to protect data via encryption and use a Proxy Server to allow eCommerce, website, back-end Apps and Iot (data in motion) to continue operating. Don’t let what happened to Facebook happen to you.

GDPR, CCPA  How to protect data via encryption and use a Proxy Server to allow eCommerce, website, back-end Apps and Iot (data in motion) to continue operating. Don’t let what happened to Facebook happen to you.

Facebook said on December 12, 2019 they were ready for the new California privacy law!

https://news.yahoo.com/facebook-says-ready-california-privacy-law-175713433.html

But just a few weeks later, on December 20, 2019, 267 million more Facebook Users were Breached. Confused???

https://www.cjr.org/tow_center_reports/facebook-merges-encrypted-messages.php

77% of Facebook users surveyed have little or no confidence that their data will remain private on Facebook.

https://watchdogreviews.com/state-online-privacy-2018/

 General Compliance Steps everyone must navigate to avoid what has occurred at other companies;

  1. Discover Personal data that is either at rest, in motion, or in temporary staging areas. There are a number of products that should be able to perform this task. However, keep in mind that the discovery process is really much more than locating personal information! Discovery must also build quality metadata from which the encryption process can be completed and from which Data Scientist can verify the discovery was complete and accurate to the Row and Column Level. If your Discovery software only ‘samples’ data from your files it won’t be able to support the complete encryption process as required. You are now at a dead end.
  2. Just as a ‘Proper’ Discovery Process supports encryption, a proper Encryption Process is necessary for the most important phase of Compliance, and that is making the encrypted data usable by your eCommerce Systems, Business Apps and Marketing Reports. If your Compliance software can’t use the encrypted data or your vendor or in-house development team doesn’t have a plan to offer, then you are again at a dead end.
  3. Now that you have technology that will Discoverer Personal Data, Encrypt that data while creating Master Encryption Keys at various levels, you will still need a product to interact between your applications and the encrypted data. What are your choices for software to accomplish this?
  4. You could modify all your applications and Websites to perform this function, but you would need to find every line of code where a data request was initiated or where a data update was attempted. Your staff will be busy for a very long time (years).
  5. For 3rd party software you would need to contact the vendor and ask them if they have a version of their product that can interact with encrypted data, or would be willing to make their products able to interact with encrypted data. Hopefully they are still in business and willing to work with you.                                               OR
  6. You could use a Proxy Server!  This software intercepts every request for data made to a database or data file system with encrypted data, by any Website, an Application, or by 3rd Party software in your environment and performs all the necessary encryption and decryption processes so that your applications can match, convert and present unencrypted data to customers or employees performing Customer Centric functions.  In sounds like Magic, but DPIAComply has built what are perhaps the only functioning Proxy Servers on the market today. Compliance efforts are now dramatically reduced to weeks / months rather than years as the DPIAComply Proxy Servers are already built for all three components of the compliancy project.

– As new data or data modifications appear, our Proxy Server will update the metadata created

in Step 1 and properly update the encrypted data files so that both are never out of date.

– Our Metadata supports other Compliance tasks such as Right of Information and Right of

  Use our Technology on your Premises, on Amazon’s AWS (AMI) or even a VM on a

  departmental Desktop or Laptop (for small companies) to see for yourself this is real, that it  

  works as we claim that it scales to handle most any data volumes and that your eCommerce,

  websites and most all back-end processes will run as usual.

Contact us 847-440-4439   www.dpiacomply.com

https://lnkd.in/d-urTNZ    https://lnkd.in/eZaDs5C  #GDPR #CCPA  #AWS #Compliance #Breach #WAWA #Facebook #Hackers #Data Breach #DoorDash #CapitalOne #Equifax

https://www.linkedin.com/pulse/gdpr-ccpa-how-protect-data-via-encryption-use-proxy-server-meister

How to protect data via encryption and use a Proxy Server to allow eCommerce

GDPR, CCPA were not enacted to stop hacking, but to demand that companies either encrypt or otherwise pseudonymize customers’ Personal Information

GDPR, CCPA and GRC were not enacted to stop hacking, but to demand that companies either encrypt or otherwise pseudonymize customers’ Personal Information so that the data becomes useless to hackers. Hackers can breach most any system no matter what Cyber Security or Firewall Software is installed. Even the largest tech Companies have not been able to stop the hackers and because their data is not encrypted, many of their customers are now at risk.  It is like wrapping paper on a package, it meets industry guidelines, but doesn’t keep anyone out.

As yet Companies have failed to follow Compliance Regulations because they feel the solution is just too complicated to figure out. Why else would they risk public disdain and backlash every time they are hacked? And soon, CCPA can use their legal power to levy heavy fines to compel companies to comply. Even with the potential for severe penalties for non-compliance we see very little progress toward data protection, and many companies are planning to use the argument in court that it is impossible to achieve compliance.

We at DPIAComply are disappointed that companies have fallen victim to vendors making claims that they have software to make them Compliant, only to find out a few months later that all their software could do was tell them where Personal Data existed in your data files. Most of your technical staff could have told you the same information if you had just asked them. These vendors don’t offer data encryption services, or more importantly a plan to have your eCommerce and Business Apps use the data once encrypted. They also do not offer a communication portal for Consent and Request Documents.

We at DPIAComply are not marketers, we are Software Developers, and only know how to state the facts on what our technology delivers. Our Application and Proxy Server will Discover and Encrypt Personal Data AND PROVIDE A MECHANISM TO USE THE ENCRYPTED DATA with minimal to no modifications to your Websites and Applications!

An added benefit of our product is that it will take only a week to demonstrate, in your environment, what we say we deliver, TRUE!

 

We stand by our contentions that data encryption and proxy servers to allow safe communication between non-encrypted and encrypted data, is the ONLY means to remain in business as usual and stop Hackers from stealing your customers’ Personal Information. Facebook, WAWA, CapitalOne, Equifax, DoorDash, Marriott and so many others have proven this point.  Why not invest a small fraction of your revenue in protecting your data against the negatives of a successful beach, such as GDPR fines of 4% of last year’s intake or CCPA fines that could be over $2 billion for exposing personal data of just 250k California Citizens.

Use our Technology on your Premises, on Amazon’s AWS (AMI) or even a VM on a departmental Desktop or Laptop to see for yourself this is real, that it works as we claim, that it scales to handle most any data volumes and that your eCommerce, websites and most all back-end processes will run as usual. If you are disappointed in any way just show us the door, and you owe us nothing.

The clock is striking midnight and the hackers know this, yet with DPIAComply you still have time!

WordPress users, you are the most vulnerable, comprising 86% of the 90,000 daily website hacks. DPIAComply offers a NON Plugin Solution that can be implemented in as little as minutes to hours and have you CCPA ready. And by the way, we are the only WP solution on the market today for true CCPA or GDPR Delivery.

Full Story – https://www.linkedin.com/pulse/gdpr-ccpa-were-enacted-stop-hacking-demand-companies-either-meister

Contact us 847-440-4439   www.dpiacomply.com

https://lnkd.in/d-urTNZ    https://lnkd.in/eZaDs5C  #GDPR #CCPA  #AWS #Compliance #Breach #WAWA #Facebook #Hackers #Data Breach #DoorDash #CapitalOne #Equifax

encryption or bust