Data Protection and Privacy- Technologies in Focus. Rashmi Chandrashekar, Accenture



Similar documents
A Bayesian Based Search and Classification System for Product. Information of Agricultural Logistics Information Technology

Introduction to Statistical Analysis of Time Series Richard A. Davis Department of Statistics

Fuzzy Task Assignment Model of Web Services Supplier

Managing Learning and Turnover in Employee Staffing*

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

Karoshi Linux. Documentation. By Paul Sharrad and Jo Harris. nc sa/3.0/

FEBRUARY 2015 STOXX CALCULATION GUIDE

A formulation for measuring the bullwhip effect with spreadsheets Una formulación para medir el efecto bullwhip con hojas de cálculo

How to calculate effect sizes from published research: A simplified methodology

Task is a schedulable entity, i.e., a thread

UNDERWRITING AND EXTRA RISKS IN LIFE INSURANCE Katarína Sakálová

Using Live Chat in your Call Centre

The Complete VoIP Telecom Service Provider. Myth: SIP Trunks are Hard to Configure

GUIDE GOVERNING SMI RISK CONTROL INDICES

Bullwhip Effect Measure When Supply Chain Demand is Forecasting

Experience and Innovation

Título: A decision support tool to optimize scheduling of IT changes Autores: Rodrigo Rebouças, Jacques Sauvé, Antão Moura, Claudio Bartolini, David

The Application of Multi Shifts and Break Windows in Employees Scheduling

Research Data Management ANONYMISATION

Combining Adaptive Filtering and IF Flows to Detect DDoS Attacks within a Router

CHAPTER 22 ASSET BASED FINANCING: LEASE, HIRE PURCHASE AND PROJECT FINANCING

Account Contract for Card Acceptance

For individuals, we provide peace-of-mind by physically recovering stolen computers and remotely deleting sensitive files from them.

4. Levered and Unlevered Cost of Capital. Tax Shield. Capital Structure

PolicyCore. Putting Innovation and Customer Service at the Core of Your Policy Administration and Underwriting

Nikkei Stock Average Volatility Index Real-time Version Index Guidebook

Circularity and the Undervaluation of Privatised Companies

Private Cloud Computing for Enterprises: Meet the Demands of High Utilization and Rapid Change

ClaimCore. Putting Customers at the Core of Your Claims Processes. Integrated Customer Database. R es y me. Ad j u d ic ati o n

TSG-RAN Working Group 1 (Radio Layer 1) meeting #3 Nynashamn, Sweden 22 nd 26 th March 1999

The Journey. Roadmaps. 2 Architecture. 3 Innovation. Smart City

Research Article Dynamic Pricing of a Web Service in an Advance Selling Environment

Monitoring of Network Traffic based on Queuing Theory

Advanced Traffic Routing as Part of the USA Intelligent Telecommunications Network

Analysis and Design of a MAC Protocol for Wireless Sensor etworks with Periodic Monitoring Applications

t Thick,intelligent,or thin access points? t WLAN switch or no WLAN switch? t WLAN appliance with 3rd party APs?

Why we use compounding and discounting approaches

The Complete VoIP Telecom Service Provider The Evolution of a SIP Trunking Provider

THE IMPACT OF FINANCING POLICY ON THE COMPANY S VALUE

Information Security 201

Modelling Time Series of Counts

Distributed Containment Control with Multiple Dynamic Leaders for Double-Integrator Dynamics Using Only Position Measurements

RIM AND MORTICE LOCKS

DBIQ USD Investment Grade Corporate Bond Interest Rate Hedged Index

Performance Center Overview. Performance Center Overview 1

1/22/2007 EECS 723 intro 2/3

CALCULATION OF OMX TALLINN

Model-Based Monitoring in Large-Scale Distributed Systems

DBIQ Regulated Utilities Index

REGULATIONS OF THE COMPLIANCE UNIT 21/07/15

Monotonic, Inrush Current Limited Start-Up for Linear Regulators

Molding. Injection. Design. GE Plastics. GE Engineering Thermoplastics DESIGN GUIDE

OPERATION MANUAL. Indoor unit for air to water heat pump system and options EKHBRD011ABV1 EKHBRD014ABV1 EKHBRD016ABV1

HiPath 4000 Hicom 300 E/300 H. Operating Instructions optipoint 500 entry

Ranking of mutually exclusive investment projects how cash flow differences can solve the ranking problem

California High School Exit Examination. Local Educational Agency and Test Site Coordinator s Manual July 2014 May 2015

Research Article Survey for Sensor-Cloud System from Business Process Outsourcing Perspective

How To Reduce Working Capial

A Queuing Model of the N-design Multi-skill Call Center with Impatient Customers

Caring for trees and your service

COLLECTIVE RISK MODEL IN NON-LIFE INSURANCE

Towards Intrusion Detection in Wireless Sensor Networks

Hilbert Transform Relations

ACCOUNTING TURNOVER RATIOS AND CASH CONVERSION CYCLE

MEMBER. Application for election MEMBER, NEW GRADUATE. psychology.org.au. April 2015

How To Work For A Company

IT Essentials II: Network Operating Systems

Soving Recurrence Relations

FINANCIAL AID. The law suspends aid eligibility for students convicted under federal or state law of sale or possession

Ranking Optimization with Constraints

Improvement of a TCP Incast Avoidance Method for Data Center Networks

How To Optimize Time For A Service In 4G Nework

MEDICATION MANAGEMENT ASSESSMENT

Asymptotic Growth of Functions

Duration and Convexity ( ) 20 = Bond B has a maturity of 5 years and also has a required rate of return of 10%. Its price is $613.

Core Fittings C-Core and CD-Core Fittings

Multiplexers and Demultiplexers

The Complete VoIP Telecom Service Provider

Photo Modules for PCM Remote Control Systems

Numerical and Experimental Investigation for Stability Lobes Prediction in Thin Wall Machining

PERFORMANCE COMPARISON OF TIME SERIES DATA USING PREDICTIVE DATA MINING TECHNIQUES

The All New... TACO ZONE CONTROLS WIRING GUIDE

Information Systems for Business Integration: ERP Systems

Large Scale Online Learning.

Health Savings Account Application

Constant Data Length Retrieval for Video Servers with Variable Bit Rate Streams

A Comparison of Service Quality between Private and Public Hospitals in Thailand

Ecological Scheduling Decision Support System Based on RIA and Cloud Computing on the YaLong River Cascade Project

Video Surveillance of High Security Facilities

The Grantor Retained Annuity Trust (GRAT)

A panel data approach for fashion sales forecasting

Engineering Data Management

An Approach for Measurement of the Fair Value of Insurance Contracts by Sam Gutterman, David Rogers, Larry Rubin, David Scheinerman

Reaction Rates. Example. Chemical Kinetics. Chemical Kinetics Chapter 12. Example Concentration Data. Page 1

Derivative Securities: Lecture 7 Further applications of Black-Scholes and Arbitrage Pricing Theory. Sources: J. Hull Avellaneda and Laurence

Mechanical Vibrations Chapter 4

TACTICAL PLANNING OF THE OIL SUPPLY CHAIN: OPTIMIZATION UNDER UNCERTAINTY

How Much Can Taxes Help Selfish Routing?

Procedia - Social and Behavioral Sciences 109 ( 2014 )

MEDIA KIT NEW YORK CITY BAR

Transcription:

Daa Proeio ad Privay- Tehologies i Fous Rashmi Chadrashekar, Aeure

Sesiive Creai Daa Lifeyle o Busiess sesiive daa proeio is o a sigle eve. Adequae proeio o mus be provided appropriaely hroughou Mai he daa lifeyle. Disri Desr a d Colle How is sesiive i daa olleed or reaed? o Type ose reeived from usomer for olleed daa Who is he daa ower? Reeio period defied? Purpose of sorage defied? Is daa lassified? e a e Who a modify? Where is i sored? Is here a periodial review proess i plae o ideify ew daa asse ha oais sesiive daa? Is here a periodial proess i plae o assess sesiive daa auray Who a read, pri, forward e? Ca I revoke aess afer disribuio? Is aess o privae daa, moiored ad logged? Are here lear poliies? Are hey efored? Is all upsream ad dowsream sesiive daa flow learly doumeed? How a busiess sesiive daa be seured from reaio o desruio? b u i o Ree i ad A r h How log is he i daa aessible? v a Where are he l arhives sored? Is aess o he arhives proeed? u i o Is here a proess i plae o delee expired daa i a safe maer? Is here a proess i plae o safely desru hose medias ha oai sesiive daa? 2

Trasiioal elemes of daa DLP Capabiliies Daa-i-Use Daa-i-Moio (Nework) Daa-a-Res (Disovery) Edpoi Abiliy o preve privae, sesiive ad ofideial iformaio from beig released via email, isa messagig, peer-o-peer eworks, e. Abiliy o passively moior ad aler for aemps o disribue iformaio for he purposes of reaig a audi rail. Abiliy o quikly loae privae, sesiive ad ofideial iformaio aross ework devies. Abiliy o quikly assess urre ompliae wih laws ad regulaios for he safeguardig of sesiive ad ofideial iformaio. Abiliy o quikly ideify ad pah exisig proess flaws. Abiliy o loae sored sai privae, sesiive ad ofideial iformaio aross eerprise sorage ompoes. Abiliy o assess sruured ad/or usruured daa. This iludes iegraio wih doume maageme sysems ad basi edpoi ages wihou rue oe aalysis apabiliies. Abiliy o regulae he use of removable media o a edpoi. Abiliy o query ad loae sored sesiive files. Abiliy o provide real ime moiorig of daa i use by ed users. Implemeaio Cosideraios Number ad omplexiy of ed-pois Regulaory ad ompliae requiremes Real-ime reporig requiremes Complexiy of exisig ifrasruure 3

Effeive Daa Proeio Framework Uilize idusry daa loss preveio sadards, priiples, ad frameworks o develop risk miigaig aiviies ha arges people, proesses, ehologies for osideraio by eerprises seekig o improve sesiive iformaio proeio. Key Corols Aess Corols Daa Corols Maageme Corols Iformaio Proeio Corol Objeives People Proess Tehology Leas privileged aess o sesiive iformaio. Regular user erifiaio for sesiive iformaio aess. Defie legiimae busiess requiremes for aess o sesiive iformaio. Sesiive iformaio aouabiliy ad owership is well defied Esablish ed user iformaio seuriy awareess program. Moior ed user ompliae o he iformaio seuriy poliies ad proedures. Provisioig ad de-provisioig proess for sesiive iformaio aess. Aess o sesiive iformaio i aordae o usomer oifiaio. Iformaio is properly lassified aordig o daa lassifiaio sadard. Esablish iformaio hadlig ad olleio proedures i aordae o daa lassifiaio sadard. Codu regular risk assessme o assess iformaio proeio orols effeiveess. Regularly moiorig regulaory ompliae requiremes. Appliaio aess orols exis o resri aess o sesiive iformaio. Tehology ifrasruure apable o suppor aess orol requiremes. Sesiive iformaio i oproduio evirome should have same produio aess orols. Daa is sored i aordae wih regulaios, ad ompay poliy o eable rerieval whe eeded. Appropriae appliaio ad sysems logs is reaied ad available for foresi researh. Maageme of Appliaio ad ifrasruure mees iformaio proeio requiremes. FTC Daa Seuriy Priiples GAPP CobiT 4.0 ISO 17799:2005 Idusry Frameworks ad Sadards PCI Daa Seuriy Sadard 4

Daa Privay ad Proeio Soluio effeiveess Capabiliy Cosideraios Whe evaluaig he effeiveess of a Daa proeio soluio, osider he apabiliies of five ore Daa proeio ompoes: Poliy Eforeme, Nework, Disovery, Edpoi, ad he Coe Aalysis. 1 Poliy Eforeme Aess Corol Aepable Use Daa Reeio Regulaory Compliae Digial Righs Maageme 2 Nework (Daa-i-Moio) Coe Filerig Por maageme Passive moiorig 3 Disovery (Daa-a-Res) Remoe Saig Age Saig Memory Reside Age Saig Moiorig ad Alerig 4 Edpoi File Sysem Eforeme Updae Maageme Iide Maageme 5 Coe Aalysis Rule-based Expressio Proeio Caegories Daabase Figerpriig File Mahig Doume Mahig Saisial Mahig 5

Daa Proeio Corols Mappig Tehology o Daa Proeio Corols Tehology Soluios Daa Corols Aess Corols Nework, Ifrasruure, Physial ad Sorage Seuriy Audi ad Moiorig Risk Assessme 6