SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Reach a complete 360% GDPR / CCPA Compliance solution in a few months! Even if you have Petabytes
of Data, eCommerce/Websites, Big Data & numerous Data & File Types! Use BDR’s Compliance App’s &
Proxy Server. Below we explain how to accomplish Automated Compliance.
Let’s begin with what we feel should be the primary objective of every Regulatory Compliancy,
compelling companies to encrypt, or otherwise protect Personal Information in their databases & File
Systems so that hackers gain almost nothing from a successful intrusion. Encryption is thought to be the
most secure method of protecting sensitive data; and once completed your company will be protected
from the more significant Regulatory Fines, marketing and customers losses and damages and your
customers from Identity Theft.
BigDataRevealed Discovers and Encrypts massive amounts of Personal Information with its Automated
Spark Application Engine to start the Compliance process in motion. If your data Compliance needs are
only a million rows or Billions of rows a day, BigDataRevealed can be architected and scaled to meet
your needs.
What disheartens companies is they don’t understand how their Customer Service, eCommerce,
Analytics, and Operational systems can continue to function once their data has been encrypted.
However, with the BDR Proxy, we can show you how this is no longer an issue.
BDR’s Proxy Server will eliminate your concerns! BDR’s Proxy will accept unencrypted requests for data
from most any of your applications or websites, modify the request by encrypting the data fields
contained in the request, call the RDBMS (and soon non SQL file systems) and access the encrypted
data. BDR Proxy then decrypts the data from your files and returns it to your application or web screen
in a human readable format, business as usual. No Alterations to your existing systems code are
required, your data is Protected and your applications function as always. Your company has
experienced nearly zero impact in order to become compliant. BDR Proxy is so efficient that it adds
almost no extra processing time to your systems.
The BDR Proxy Server can be installed and ready for use in just one day once the Administrator
changes a Port setting for the database or file system.
Below we explain how BDR gets you compliant so easily.
Below are a series of steps that consultants should have told you are necessary before beginning a
Compliancy Project.
1. Comprise a list of all company personnel from the CEO and other C levels, Legal Staff, DPO,
Department Heads, Data Governance, most all levels of Information Technology including
production, eCommerce/Websites, Big Data, Data Science, and any third party consultancies
involved.
a. Call for an initial meeting and ongoing status meetings to discuss and agree upon the
priorities, must haves, can waits and how ;long until needed, ramifications of delays and
waiting for deliveries, buy, build or a combination that will also determine time to
Compliancy and again the risks if breached before project completion.
2. Complete a Data Protection Impact Assessment (DPIA) that searches for Personal Information
patterns in all possible Data Assets. Begin with Structured data but continue with (S/A, Office
Docs, PDF, OCR, Biometric, XML, Email …). Don’t take randomized samples of your data for
analysis, all rows must be processed or Personal Information will be missed.
3. The BigDataRevealed’s Suite and Proxy can be loaded and delivering in a day. BDR will not
degrade production systems performance as it is read into Spark memory then processed.
BDR simultaneously builds extensive metadata catalog files that can be extracted for analysis
and will become the base to support all other Compliance efforts such as Encryption, Right of
Erasure, and Right of Information.
4. At first a company will want to process their traditional stores of information, but eventually
other forms of corporate data will need to be included. Again, BDR is already capable of
performing Discovery and completing the DPIA steps against Office Docs, PDF Files, XML, Jason,
OCR, Email (PST Files & Attachments), Biometrics, JDBC/RDBMS Direct to memory with Spark,
Apache Hadoop HDFS, Hbase, IoT and most all Streams, and many more …
5. DPIA’s are not a once a year or even a weekly task, there should be a process in place to
discover and encrypt newly ingested data that flows into your data files on a continuous basis.
BDR provides this type of processing to protect your data before in becomes data at rest.
6. After a DPIA, a company will know which files should be protected by encrypting sensitive fields
contained in the files. BDR can deliver Encryption after a DPIA/Data Discovery is run with a
simple push of a button and has the ability to Encrypt Personal Information as it is identified in
real-time during the Discovery or DPIA Process.
Metadata created by our DPIA process can be used to better understand existing systems and to provide
detailed information for more in-depth analytics and marketing.
Our 5 years of developing BigDataRevealed’s Data Governance and Security Solutions that also lead to
our recent breakthrough that resulted in the BDR Proxy, makes the communications between
decrypted and encrypted information possible, hence making Compliance possible in weeks and
months, versus years.
1. BDR Proxy will know which files and which fields the calling system is requesting and will
encrypt and decrypt the data accordingly.
2. No application or eCommerce Web sites need to be touched (just two properties), unless
Port settings were hard coded in the applications.
3. All technical development for Complete CCPA and GDPR Compliance has been completed
by us, so that your staff only needs to know how to interact through our GUI interface to ask
BDR to do its job.
Other areas of concern affecting Compliance, especially in the Ad-Tech sector, is Consent, usage of data
and the right of erasure.
BigDataRevealed Handles these in the following ways through its BDR Consent GUI Module which allows
for:
1. The User to create a secured account and receive an encryption login key.
2. The ability to check one or multiple PII boxes, or select individual Personal Information values
for which they grant Consent to use;
a. The ability to Confirm their current intentions in a free format text box.
b. Upload a signed consent document that becomes downloadable by the Company
c. A means to click ‘Revoke Consent’ and repeat steps a and b
3. Selection of allowable requests from lists organized by Regulatory Agencies. BDR captures the
following requests and others.
a. Right of Erasure
i. When the Company views requests by Citizens, their Personal Information can
be automatically loaded into the BDR Application and, with the push of a
button, accurately act upon their request and deliver results.
ii. Metadata Catalogs will be created and maintained for each request processed
and can be sent to the Citizen for their verification and use.
1. The metadata can also be matched against new data being ingested
from various sources and discarded unless there is valid reason such as
the Citizen made a new purchase. In this way the Citizens Right of
Erasure is maintained.
b. What Data do you possess on a Citizen?
c. To Whom have you sold or transferred the Citizens Data?
d. Opt out of Marketing and so on …
4. BDR’s Consent Module allows ongoing bi-lateral communications, up and downloading of
documents between Company and Customer/Citizen, and provides an auditable record of
activity.
The BigDataRevealed Eco-System was built on a flexible Architecture using the latest technologies such
as Apache Spark (2.4.3/JDBC), Java, Big Data Hadoop as desired, the popular and secure Spring
Framework for the API’s that will support adoption of new regulations from other Regulatory Agencies
in just days, keeping Compliance nearly 100% automated, scalable, accurate and affordable as possible.

Contenu connexe

Plus de Steven Meister

I have listed 3 informative youtube videos on the eu gdpr
I have listed 3 informative youtube videos on the eu gdprI have listed 3 informative youtube videos on the eu gdpr
I have listed 3 informative youtube videos on the eu gdprSteven Meister
 
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
Eu gdpr technical workflow and productionalization   neccessary w privacy ass...Eu gdpr technical workflow and productionalization   neccessary w privacy ass...
Eu gdpr technical workflow and productionalization neccessary w privacy ass...Steven Meister
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesSteven Meister
 
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...Steven Meister
 
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...Steven Meister
 
Big datarevealed hadoop catalog
Big datarevealed hadoop catalogBig datarevealed hadoop catalog
Big datarevealed hadoop catalogSteven Meister
 

Plus de Steven Meister (6)

I have listed 3 informative youtube videos on the eu gdpr
I have listed 3 informative youtube videos on the eu gdprI have listed 3 informative youtube videos on the eu gdpr
I have listed 3 informative youtube videos on the eu gdpr
 
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
Eu gdpr technical workflow and productionalization   neccessary w privacy ass...Eu gdpr technical workflow and productionalization   neccessary w privacy ass...
Eu gdpr technical workflow and productionalization neccessary w privacy ass...
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
 
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
 
Big datarevealed hadoop catalog
Big datarevealed hadoop catalogBig datarevealed hadoop catalog
Big datarevealed hadoop catalog
 

Dernier

Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryJeremy Anderson
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfchwongval
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改yuu sss
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxMike Bennett
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]📊 Markus Baersch
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Seán Kennedy
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFAAndrei Kaleshka
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理e4aez8ss
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...ssuserf63bd7
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Boston Institute of Analytics
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGIThomas Poetter
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Cantervoginip
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...limedy534
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 217djon017
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPTBoston Institute of Analytics
 

Dernier (20)

Defining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data StoryDefining Constituents, Data Vizzes and Telling a Data Story
Defining Constituents, Data Vizzes and Telling a Data Story
 
Multiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdfMultiple time frame trading analysis -brianshannon.pdf
Multiple time frame trading analysis -brianshannon.pdf
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
专业一比一美国俄亥俄大学毕业证成绩单pdf电子版制作修改
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptx
 
GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]GA4 Without Cookies [Measure Camp AMS]
GA4 Without Cookies [Measure Camp AMS]
 
Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...Student Profile Sample report on improving academic performance by uniting gr...
Student Profile Sample report on improving academic performance by uniting gr...
 
How we prevented account sharing with MFA
How we prevented account sharing with MFAHow we prevented account sharing with MFA
How we prevented account sharing with MFA
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
 
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
Data Analysis Project : Targeting the Right Customers, Presentation on Bank M...
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
 
ASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel CanterASML's Taxonomy Adventure by Daniel Canter
ASML's Taxonomy Adventure by Daniel Canter
 
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
Effects of Smartphone Addiction on the Academic Performances of Grades 9 to 1...
 
Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2Easter Eggs From Star Wars and in cars 1 and 2
Easter Eggs From Star Wars and in cars 1 and 2
 
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
办美国阿肯色大学小石城分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default  Presentation : Data Analysis Project PPTPredictive Analysis for Loan Default  Presentation : Data Analysis Project PPT
Predictive Analysis for Loan Default Presentation : Data Analysis Project PPT
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 

Complete GDPR/CCPA Compliance in Months! even with Petabytes of data, eCommerce websites, big data & numerous file types sept

  • 1. Reach a complete 360% GDPR / CCPA Compliance solution in a few months! Even if you have Petabytes of Data, eCommerce/Websites, Big Data & numerous Data & File Types! Use BDR’s Compliance App’s & Proxy Server. Below we explain how to accomplish Automated Compliance. Let’s begin with what we feel should be the primary objective of every Regulatory Compliancy, compelling companies to encrypt, or otherwise protect Personal Information in their databases & File Systems so that hackers gain almost nothing from a successful intrusion. Encryption is thought to be the most secure method of protecting sensitive data; and once completed your company will be protected from the more significant Regulatory Fines, marketing and customers losses and damages and your customers from Identity Theft. BigDataRevealed Discovers and Encrypts massive amounts of Personal Information with its Automated Spark Application Engine to start the Compliance process in motion. If your data Compliance needs are only a million rows or Billions of rows a day, BigDataRevealed can be architected and scaled to meet your needs. What disheartens companies is they don’t understand how their Customer Service, eCommerce, Analytics, and Operational systems can continue to function once their data has been encrypted. However, with the BDR Proxy, we can show you how this is no longer an issue. BDR’s Proxy Server will eliminate your concerns! BDR’s Proxy will accept unencrypted requests for data from most any of your applications or websites, modify the request by encrypting the data fields contained in the request, call the RDBMS (and soon non SQL file systems) and access the encrypted data. BDR Proxy then decrypts the data from your files and returns it to your application or web screen in a human readable format, business as usual. No Alterations to your existing systems code are required, your data is Protected and your applications function as always. Your company has experienced nearly zero impact in order to become compliant. BDR Proxy is so efficient that it adds almost no extra processing time to your systems. The BDR Proxy Server can be installed and ready for use in just one day once the Administrator changes a Port setting for the database or file system. Below we explain how BDR gets you compliant so easily.
  • 2. Below are a series of steps that consultants should have told you are necessary before beginning a Compliancy Project. 1. Comprise a list of all company personnel from the CEO and other C levels, Legal Staff, DPO, Department Heads, Data Governance, most all levels of Information Technology including production, eCommerce/Websites, Big Data, Data Science, and any third party consultancies involved. a. Call for an initial meeting and ongoing status meetings to discuss and agree upon the priorities, must haves, can waits and how ;long until needed, ramifications of delays and waiting for deliveries, buy, build or a combination that will also determine time to Compliancy and again the risks if breached before project completion. 2. Complete a Data Protection Impact Assessment (DPIA) that searches for Personal Information patterns in all possible Data Assets. Begin with Structured data but continue with (S/A, Office Docs, PDF, OCR, Biometric, XML, Email …). Don’t take randomized samples of your data for analysis, all rows must be processed or Personal Information will be missed. 3. The BigDataRevealed’s Suite and Proxy can be loaded and delivering in a day. BDR will not degrade production systems performance as it is read into Spark memory then processed. BDR simultaneously builds extensive metadata catalog files that can be extracted for analysis and will become the base to support all other Compliance efforts such as Encryption, Right of Erasure, and Right of Information. 4. At first a company will want to process their traditional stores of information, but eventually other forms of corporate data will need to be included. Again, BDR is already capable of performing Discovery and completing the DPIA steps against Office Docs, PDF Files, XML, Jason, OCR, Email (PST Files & Attachments), Biometrics, JDBC/RDBMS Direct to memory with Spark, Apache Hadoop HDFS, Hbase, IoT and most all Streams, and many more … 5. DPIA’s are not a once a year or even a weekly task, there should be a process in place to discover and encrypt newly ingested data that flows into your data files on a continuous basis. BDR provides this type of processing to protect your data before in becomes data at rest. 6. After a DPIA, a company will know which files should be protected by encrypting sensitive fields contained in the files. BDR can deliver Encryption after a DPIA/Data Discovery is run with a simple push of a button and has the ability to Encrypt Personal Information as it is identified in real-time during the Discovery or DPIA Process. Metadata created by our DPIA process can be used to better understand existing systems and to provide detailed information for more in-depth analytics and marketing. Our 5 years of developing BigDataRevealed’s Data Governance and Security Solutions that also lead to our recent breakthrough that resulted in the BDR Proxy, makes the communications between decrypted and encrypted information possible, hence making Compliance possible in weeks and months, versus years. 1. BDR Proxy will know which files and which fields the calling system is requesting and will encrypt and decrypt the data accordingly. 2. No application or eCommerce Web sites need to be touched (just two properties), unless Port settings were hard coded in the applications. 3. All technical development for Complete CCPA and GDPR Compliance has been completed by us, so that your staff only needs to know how to interact through our GUI interface to ask BDR to do its job. Other areas of concern affecting Compliance, especially in the Ad-Tech sector, is Consent, usage of data and the right of erasure.
  • 3. BigDataRevealed Handles these in the following ways through its BDR Consent GUI Module which allows for: 1. The User to create a secured account and receive an encryption login key. 2. The ability to check one or multiple PII boxes, or select individual Personal Information values for which they grant Consent to use; a. The ability to Confirm their current intentions in a free format text box. b. Upload a signed consent document that becomes downloadable by the Company c. A means to click ‘Revoke Consent’ and repeat steps a and b 3. Selection of allowable requests from lists organized by Regulatory Agencies. BDR captures the following requests and others. a. Right of Erasure i. When the Company views requests by Citizens, their Personal Information can be automatically loaded into the BDR Application and, with the push of a button, accurately act upon their request and deliver results. ii. Metadata Catalogs will be created and maintained for each request processed and can be sent to the Citizen for their verification and use. 1. The metadata can also be matched against new data being ingested from various sources and discarded unless there is valid reason such as the Citizen made a new purchase. In this way the Citizens Right of Erasure is maintained. b. What Data do you possess on a Citizen? c. To Whom have you sold or transferred the Citizens Data? d. Opt out of Marketing and so on … 4. BDR’s Consent Module allows ongoing bi-lateral communications, up and downloading of documents between Company and Customer/Citizen, and provides an auditable record of activity. The BigDataRevealed Eco-System was built on a flexible Architecture using the latest technologies such as Apache Spark (2.4.3/JDBC), Java, Big Data Hadoop as desired, the popular and secure Spring Framework for the API’s that will support adoption of new regulations from other Regulatory Agencies in just days, keeping Compliance nearly 100% automated, scalable, accurate and affordable as possible.