Quick scans, Custom Detectors, and Custom Severity. Learn to classify information automatically and guarantee every piece of your data protection puzzle is perfectly in place. Why Classify Data? Before we get to the details, it’s worth mentioning the main reasons why you should even bother to classify different types of personal data. On average, companies keep over 2 PB of … Read More
Data Redaction: The Essential Guide to Protecting Sensitive Data
The long-awaited data redaction feature by PII Tools is finally here. Generate new, AI-driven PDFs from original files with all personal data automatically blacked out – this is the future of genuinely efficient data redaction. What Does Data Redaction Mean At PII Tools, we’ve made it our calling to create AI-driven software to maximize data discovery and the remediation of … Read More
The California Delete Act: How it affects organizations
All it takes is one request, and poof… everything’s gone. What is the California Delete Act Sunny California has long been a leader in surfing, movie-making, and… consumer privacy? That’s right, and as of Jan. 1, 2024, the California Privacy Protection Agency (CCPA) is set to enforce a new law that could completely change data storage as we know it. … Read More
Person Cards® – The Holy Grail of Data Discovery
By 2025, the global datasphere is estimated to hold as much as 175 zettabytes of data. How can companies today possibly have a chance to organize that much information? The answer: Person Cards®. More Data, More Problems 175 zettabytes of data worldwide? Considering a single zettabyte is equal to a trillion gigabytes (yes, with a ‘T’), the actual amount of … Read More
What’s new: NIST Cybersecurity Framework 2.0
It’s been almost 10 years since the original CSF 1.0 was issued, and so much has changed since. What new guidelines does CSF 2.0 bring, and how can you implement them today? Remembering CSF 1.0 Before we get to the new stuff, let’s run through a quick recap of the National Institute of Standards and Technology’s (NIST) Cybersecurity Framework (CSF) … Read More
Explaining Data Subject Access Requests — DSARs
As a company owner in the 21st century, simply staying up-to-date on data compliance regulations will no longer cut it. Especially with the introduction of the GDPR in Europe, people have grown more interested in protecting their private information than ever before. So, when the time comes and one of your employees or customers makes a subject data access request, … Read More
PII Examples
Below you’ll find a list of made up PII examples to help you better understand what PII looks like in the real world. You’ll also find a downloadable file attached to each point with specified (fake) PII examples you can then use to test your discovery solution. Enjoy. PII includes, but is not limited to: Names: Full name, First name, … Read More
The Complete Guide to PII
Ever wondered what’s the difference between PII and personal data? Maybe you wanted to see a list of PII types and its examples? Not sure when regular information turns into PII? Read on to find all the answers and more. PII… Ever Heard of It? To start, let’s get the definition out of the way. PII stands for Personally Identifiable … Read More
How To: Understanding HIPAA Compliance
For many readers, when they hear the words “the Health Insurance Portability and Accountability Act (HIPAA)”, their eyelids immediately start to droop. But I’m sure getting slapped with an annual $1.5 million fine would wake them up! Whether you’re the one handling the data or the actual patient looking to protect your rights, it’s time to become a HIPAA expert … Read More
- Page 2 of 2
- 1
- 2