How To: Understanding HIPAA Compliance

Cole PrudenHIPAA Compliance, PHI, PII

How To: Understanding HIPAA Compliance

For many readers, when they hear the words “the Health Insurance Portability and Accountability Act (HIPAA)”, their eyelids immediately start to droop. But I’m sure getting slapped with an annual $1.5 million fine would wake them up! Whether you’re the one handling the data or the actual patient looking to protect your rights, it’s time to become a HIPAA expert … Read More

How to remediate PII?

Radim ŘehůřekPersonal Data Protection, PII Remediation, Sensitive Data Remediation

How to remediate PII?

Within the world of sensitive data discovery, there are many roads you can take to remain compliant to mandatory regulations. Unfortunately, many of these roads can leave you with more questions than answers. If you’re looking for a simpler route to protect your company’s data, SaaS is right for you. What is SaaS? Pronounced /sæs/, SaaS stands for Software as … Read More

How to Identify Leaked Data

Cole PrudenData Leak, Leak Management, Sensitive Data Discovery

How to Identify Leaked Data

A data breach can happen to anyone at any time. Although there are many steps in responding to such a breach, the first is actually locating the data in question. If you’ve suffered a breach of information, how do you identify all affected parties? Detecting the Leak There are multiple ways you can tell you’re dealing with a data breach, … Read More

Scanning Office 365 for sensitive PII information

Radim ŘehůřekPersonal Data, Security

Scanning Office 365 for sensitive PII information

Discover personal & sensitive data inside Office 365 accounts and remediate it. This includes both structured and unstructured data in Microsoft OneDrive, Microsoft Exchange Online, and Sharepoint Online. What does “support Office 365” mean? With PII Tools, you directly find, review, and remediate personal and sensitive information in documents, emails, and tables shared within your company’s Office 365 accounts. No … Read More

Making GDPR Compliance Simple

Cole PrudenPersonal Data Discovery, Regulatory Compliance, Self-Hosted Auditing Software

Making GDPR Compliance Simple

By now, we should all be well aware of the GDPR and what it means for our business. How is it then that so many companies remain GDPR non-compliant? Is the regulation too complicated, too time-consuming, or is it just a hassle? Discover everything you need to know to easily comply with the GDPR today. What is the GDPR and … Read More

How to Identify Personal Data in the 21st Century

Cole PrudenData Discovery, Personal Data, Sensitive Information

How to Identify Personal Data in the 21st Century

Personal data comes in many shapes and sizes. As business owners, company employees, and internet consumers, it’s our job to know what personal data is and how to locate and protect it. But now that the new millennium is well on its way, is there any new technology out there that can help? Where to Get Started? Step one is … Read More

Learning the Difference Between Data Privacy and Data Security

Martin JanoušekData Privacy Regulations, Personal Data, Personal Data Protection

Learning the Difference Between Data Privacy and Data Security

Companies often believe that by securing their sensitive data, they automatically comply with the requirements of various data privacy regulations (GDPR, HIPAA, CCPA, etc.). Unfortunately, this is not the case. Let’s take a look at these two terms to understand the difference and make sure you adhere to both. It’s a bad habit to treat data security and data privacy … Read More