
Discovering and protecting sensitive data to comply with privacy regulations
Data is a high-value asset at any enterprise, and data on customers, partners, intellectual property must be guarded against bad actors.
Regulations such as GDPR, CCPA and HIPAA provide minimum standards. We ground our data privacy efforts in a risk-based approach, and build in compliance and regulatory requirements.
A comprehensive data classification policy provides the basis for discovery and cataloging of sensitive information. For protection and remediation, we architect and deliver solutions such as coarse- and fine-grained access controls, encryption, anonymization (masking), and tokenization.
Our goal is to shrink the circle of sensitive data, reducing long-term burdens on business and IT teams. Audit and reporting are critical to compliance and are designed into our solutions from the beginning.
Data Privacy: Our Thinking
APIs for Sharing Healthcare Data
Advisory, Engineering, Healthcare, Homepage News, Interoperability, AWS, Cloud Computing, Data Governance, Data Privacy, Data Strategy, Healthcare, Security & RiskBy: Kevin Cox, AWS SSA, CCSK, Lead Consultant, Impact Makers This is the second post in a series about sharing......
New Solutions for Sharing Healthcare Data
Advisory, Engineering, Healthcare, Homepage News, Interoperability, AWS, Cloud Computing, Data Governance, Data Privacy, Data Strategy, Data Warehousing, Healthcare, Security & RiskBy: Kevin Cox, AWS SSA, CCSK, Lead Consultant, Impact Makers Why would providers, payers, and consumers share Healthcare data? Healthcare as an industry......
GDPR is Here! What is it and How Does it Affect Your Compliance Management Program?
Advisory, Healthcare, Data Privacy, Financial Services, Security & RiskIf you’ve been a privacy professional at any point in the last few decades, your head is spinning with the myriad of privacy laws and regulations in the U.S. and abroad. Some examples are the European Data Protection Directive of 1995,...
Privacy and Security: What’s the Difference?
Advisory, Data Privacy, Security & RiskAs data collection has increased, so has controversy. Most of this data has been willingly given by us users in the form of our computers, smart phones, and more recently, smart home devices, cars, and even refrigerators. International...