SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
How to become GDPR & CCPA Compliant. Follow these steps to become sufficiently
compliant to avoid regulatory fines and public embarrassment brought about by a successful
data breach. Privacy by Design is what BigDataRevealed was built to deliver.
BigDataRevealed offers an application to assist in completing the following Steps
and was developed using only the most advanced languages and platforms; such as
Spark, Kafka, Java 8.0, Spring APIs, AngularJS, WildFly10, Apache Hadoop 3.1
and other advanced open source technologies, for the sole purpose of Data
Protection and Regulatory Requirements.
Our personal assessment is that most companies over
estimate their GDPR Readiness and haven’t developed
a viable plan or methodology to tackle the most
important aspect of Data Compliance; and that is
protecting their customer’s Personal Information. In
general, ‘protecting’ information has become
synonymous with encrypting personal information.
Hackers will always find a way to defeat your security
systems and obtain your data. However, that data will
have virtually no value to them, and cause no harm to
you, if the personal information is securely encrypted.
The ability to inform a customer of the information you
have collected about them, and the ability to remove
that information upon request, is important & complex,
but these two tasks are not the central tenet of GDPR.
Protecting customer’s Personal Information is what
GDPR is all about.
Following is a list of steps I feel will get you close enough
to GDPR, CCPA and most any Data Regulatory
compliancy, so that regulators will be satisfied you did
all that could be expected. In reality, becoming 100%
compliant could not be reasonably expected of any
larger company. We believe the following steps comprise
a viable plan for compliancy.
To better understand the process to allow customers to request
information you hold about them and to remove that information
view our earlier post athttps://www.linkedin.com/pulse/symantecs-
state-european-privacy-reort-found-90-believe-meister/
STEP 1. Complete a Data Protection Impact
Assessment (DPIA) in a Big Data Ecosystem. Big Data is
preferred so that your operational systems are not
degraded during the process and to minimize the
technical difficulties various data types present that Big
Data can easily handle.
Begin the DPIA by discovering the location of Personal Information in all your files.
You will want to search for patterns that identify data such as: National ID, Social
security, Driver’s License, Email, IP Addresses, Phone Numbers and hundreds more.
You will want a library containing of all these patterns and can be easily extended to
include any unique patterns or industry specific patterns you may need.
Centralize the following data sources into your Big Data Ecosystem; Legacy system
data, Office documents, PDFs, OCR documents, XML, Structured and Semi-Structured
Information and Many others. Images are supported by BigDataRevealed using Facial
and Object recognition software if applicable.
The DPIA process to discover Personal Information should include constructing a
Metadata Catalogue that will identify the location of Personal Information found in
every file processed by Row and Column. This information will become invaluable
when developing your Remediation Plan.
STEP 2. Develop a Remediation PLAN.
- Using the Metadata developed in the DPIA (STEP 1) a team comprised of Product
Managers, Developers, Business Analysts and others must review which business
applications use the files where Personal Information was discovered. This
process needs to be thorough and accurate as it identifies which
files/applications are most vulnerable to hackers.
- Pay the greatest attention to files used in applications that are central to your
business practices or interact with your customers such as; Point of Sale, Cash
Register, On-line Order Processing, Customer Service and Payment Processing.
You may even discover files that have no purpose and can be eliminated.
- The plan must include the following concepts;
a. How will these applications continue to function once the data in the files
have been encrypted?
b. Is the best practice to use APIs to interface between the application and the
data files containing the encrypted data? BigDataRevealed can provide such
APIs.
c. Where will the decryption/encryption keys be securely located so that the
APIs can complete their function safely.
d. How will newly received data be encrypted as it enters these files from non-
application sources such as IoT, Social Media and other feeds.
Prioritize the files and applications that represent the greatest risk
to your organization and begin the remediation process with them.
You have now protected the personal information in your most valuable or vulnerable application,
and are ready to celebrate.
STEP 4. Adding/Updating data in an
encrypted file.
In STEP 2, you identified where and
how a file might receive new data,
via adding a new transaction or
through a data feed. By connecting
the same APIs to exit points in the
application where new transactions
are generated, or by using
BigDataRevealed’s ability to process
streaming data ‘on the fly’ you can
achieve ongoing compliance.
STEP 5. Prepare for Production
Before implementing the newly
modified application tested in STEP 3
and STEP 4, you should verify that no
other applications use data from files
that will become encrypted.
You are now ready to use
BigDataRevealed to encrypt
production data and install the
modified application and APIs in your
production environment.
STEP 3. Begin Remediation and testing.
- Developers/analysts will identify the ‘exit points’ from the high
priority applications that access data from a file containing personal
information. These ‘exit points’ will be where the
encryption/decryption APIs must be connected to the application.
This task will likely be the most labor intensive as there are no
application tools to assist in discovering ‘exit points’.
- In a test environment, complete the process of connecting the APIs to the
application.
- Extract data from the files identified above and load them into
BigDataRevealed.
- Run a Discovery Process for those extracted files to identify all Personal
Information contained in those files. (A fully automated process)
- Request Encryption to be completed on any or all of the columns containing
personal Information. (Fully automated).
- Upload the newly encrypted files into a test environment.
- Begin Testing
Other Compliance Considerations
BigDataRevealed’s Dashboards presents to your operational staff, the customers that have requested
their ‘Right of Information’ or their ‘Right of Erasure’, and for CCPA their ‘Right of Deletion’. Operational
staff can process each request separately, or group them together for efficiency reasons.
BigDataRevealed’s extensive Metadata Catalogue allows your operational staff to request extraction of
information for presentation to a customer, and then to remove that data if necessary. BigDataRevealed
groups the data according to each customer, thereby making it easy to present information to every
customer, even if that single customer was processed in a group of many other customers.
BigDataRevealed’s Metadata stores the file, Column names, Row location and other information, which
can be used in other metadata systems, by ETL Developers, DBA’s and others to facilitate the deletion of
the Citizen’s data easily with the many legacy tools available.
BigDataRevealed’s comprehensive metadata Search Portal allows the user to
search for the necessary Metadata to fulfill the GDPR, CCPA and many others
Regulatory Requirements by:
Ability to search the Metadata Library and export
data to an excel spreadsheet using the following
criteria
Date Ranges , Specific Personal Data Patterns,
and Specific customers.
By Specific Types of Run such as Pattern / Data
Discovery, Business Classification
Compliancy is an ongoing process, as data is constantly changing or
being inserted. So, you must ask; How does one stay Compliant?
a. You must confirm that a person’s prior right of erasure is being honored,
and that their personal information has not once again entered your
company’s Data Assets. A list of Citizens that have exercised their right of
Erasure must be maintained and used in all processes adding or updating
Personal Information.
b. Data can sneak its way into your Data Assets from varying sources:
i. IoT, website Orders, Cookies, Third Party Purchases of Data,
Restores from within the company or from Data Recovery
Facilities, Internal Employees, even hackers. There are limitless
ways Information is ingested into companies data assets.
ii. To reasonably remain compliant with an Erasure request or
Deletion request you must continually look for and discover
exposed personal information for these individuals.
BigDataRevealed’s Comprehensive Metadata Catalogs are
invaluable in becoming nearly Compliant for GDPR, CCPA or others.
After reading this document, or discussing your company’s overall data environment with us,
you will understand that becoming 100% compliant might not be attainable for any company.
There is no obvious threshold to reach in order to believe you are compliant; and the nature
of your business may make it far more difficult for you to reach than for another company.
However, regulators will be expecting you to articulate your plans and accomplishments
while explaining the obstacles that are unique to you. Some of these obstacles are;
1. Operational/Production systems that are from vendors that are out of business and
NO Exit points exist to attach Spring API’s to perform encryption and decryption
functions.
2. An Operational/Production system is from a vendor that can’t provide assistance to
identify Exit Points.
3. Some of your Legacy systems are old or poorly constructed and identifying Exit Points
is extremely difficult.
4. Many other technical issues may take time to correct for proper
encryption/decryption processes to accurately and safely take place while not stifling
your business.
During this period of becoming compliant, a company may wish to run several Extensive
DPIA’s to prove to Regulatory Agencies and Courts that they have done what is possible and
have made progress. The company should prepare a timeline showing ongoing increases in
the percent of Citizens Person Data being protected.
BigDataRevealed believes we have the most comprehensive technology able to deliver
Compliancy by Design and allow companies to reach their maximum potential in Data
Protection and Regulatory Compliance and do so at with the most automation, and at an
affordable price point.
Here is the CCPA / GDPR 3 Day Training PowerPoint - https://www.slideshare.net/StevenMeister/ccpa-and-
gdpr-three-day-training-with-actual-deliverables-and-the-whys-and-hows-to-do-so
847-440-4439 https://www.youtube.com/channel/UC3F-qrvOIOwDj4ZKBMmoTWA?view_as=subscriber
GDPR 16 page PPT Plan - https://www.slideshare.net/StevenMeister/gdpr-ccpa-automated-compliance-
spark-java-application-features-and-functions-of-big-datarevealed-april-version-35
https://youtu.be/JGoQwoicUxw
Comprehensive Metadata Catalog Video for GDPR / CCPA - https://youtu.be/xryESgfzRcc

Contenu connexe

Tendances

Supporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data ClassificationSupporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data ClassificationIndex Engines Inc.
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance Jean-Michel Franco
 
Universal Search for Legal Enterprises
Universal Search for Legal EnterprisesUniversal Search for Legal Enterprises
Universal Search for Legal EnterprisesAdhereSolutions
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightSymantec
 
Tackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines WebinarTackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines WebinarIndex Engines Inc.
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideDLT Solutions
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentialsCraig Mullins
 
GDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and EvaluationGDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and EvaluationSteven Meister
 
Webinar: Practical Technology Playbook for the GDPR
Webinar: Practical Technology Playbook for the GDPRWebinar: Practical Technology Playbook for the GDPR
Webinar: Practical Technology Playbook for the GDPRIndex Engines Inc.
 
Customer-Centric Data Management for Better Customer Experiences
Customer-Centric Data Management for Better Customer ExperiencesCustomer-Centric Data Management for Better Customer Experiences
Customer-Centric Data Management for Better Customer ExperiencesInformatica
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspectiveCraig Mullins
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods IJECEIAES
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationWatchful Software
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Edge Pereira
 
Data Lakehouse Symposium | Day 1 | Part 1
Data Lakehouse Symposium | Day 1 | Part 1Data Lakehouse Symposium | Day 1 | Part 1
Data Lakehouse Symposium | Day 1 | Part 1Databricks
 
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesInformation Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesCraig Adams
 
Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...dbpublications
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy QuizDruva
 

Tendances (20)

Supporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data ClassificationSupporting GDPR Compliance through Data Classification
Supporting GDPR Compliance through Data Classification
 
Practical steps to GDPR compliance
Practical steps to GDPR compliance Practical steps to GDPR compliance
Practical steps to GDPR compliance
 
Universal Search for Legal Enterprises
Universal Search for Legal EnterprisesUniversal Search for Legal Enterprises
Universal Search for Legal Enterprises
 
Data Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data InsightData Sheet - Manage unstructured data growth with Symantec Data Insight
Data Sheet - Manage unstructured data growth with Symantec Data Insight
 
Tackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines WebinarTackling the GDPR Dell EMC Index Engines Webinar
Tackling the GDPR Dell EMC Index Engines Webinar
 
Threat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the OutsideThreat Ready Data: Protect Data from the Inside and the Outside
Threat Ready Data: Protect Data from the Inside and the Outside
 
GDPR Crash Course
GDPR Crash CourseGDPR Crash Course
GDPR Crash Course
 
Database auditing essentials
Database auditing essentialsDatabase auditing essentials
Database auditing essentials
 
GDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and EvaluationGDPR BigDataRevealed Readiness Requirements and Evaluation
GDPR BigDataRevealed Readiness Requirements and Evaluation
 
Idea to Insight
Idea to InsightIdea to Insight
Idea to Insight
 
Webinar: Practical Technology Playbook for the GDPR
Webinar: Practical Technology Playbook for the GDPRWebinar: Practical Technology Playbook for the GDPR
Webinar: Practical Technology Playbook for the GDPR
 
Customer-Centric Data Management for Better Customer Experiences
Customer-Centric Data Management for Better Customer ExperiencesCustomer-Centric Data Management for Better Customer Experiences
Customer-Centric Data Management for Better Customer Experiences
 
Data breach protection from a DB2 perspective
Data breach protection from a  DB2 perspectiveData breach protection from a  DB2 perspective
Data breach protection from a DB2 perspective
 
A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods A Study on Big Data Privacy Protection Models using Data Masking Methods
A Study on Big Data Privacy Protection Models using Data Masking Methods
 
Top 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data ClassificationTop 10 Best Practices for Implementing Data Classification
Top 10 Best Practices for Implementing Data Classification
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...
 
Data Lakehouse Symposium | Day 1 | Part 1
Data Lakehouse Symposium | Day 1 | Part 1Data Lakehouse Symposium | Day 1 | Part 1
Data Lakehouse Symposium | Day 1 | Part 1
 
Information Governance Maturity for Financial Services
Information Governance Maturity for Financial ServicesInformation Governance Maturity for Financial Services
Information Governance Maturity for Financial Services
 
Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...Design and Implementation of algorithm for detecting sensitive data leakage i...
Design and Implementation of algorithm for detecting sensitive data leakage i...
 
Enterprise Data Privacy Quiz
Enterprise Data Privacy QuizEnterprise Data Privacy Quiz
Enterprise Data Privacy Quiz
 

Similaire à Become GDPR & CCPA Compliant with 6 Easy Steps

eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceKim Cook
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceObservePoint
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePodGaret Keller
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphVaticle
 
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...Elemica
 
Gdpr ccpa automated compliance - spark java application features and functi...
Gdpr   ccpa automated compliance - spark java application features and functi...Gdpr   ccpa automated compliance - spark java application features and functi...
Gdpr ccpa automated compliance - spark java application features and functi...Steven Meister
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfData Science Council of America
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfData Science Council of America
 
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdfData Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdfData Science Council of America
 
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Stratio
 
Big Data Tools: A Deep Dive into Essential Tools
Big Data Tools: A Deep Dive into Essential ToolsBig Data Tools: A Deep Dive into Essential Tools
Big Data Tools: A Deep Dive into Essential ToolsFredReynolds2
 
Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Jeffrey T. Pollock
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak PreventionTanvir Hashmi
 
Security issues in big data
Security issues in big data Security issues in big data
Security issues in big data Shallote Dsouza
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellenceMudit Mangal
 
Hadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitHadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitDataWorks Summit
 

Similaire à Become GDPR & CCPA Compliant with 6 Easy Steps (20)

eBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data GovernanceeBook: 5 Steps to Secure Cloud Data Governance
eBook: 5 Steps to Secure Cloud Data Governance
 
Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in ComplianceThe GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
The GDPR Most Wanted: The Marketer and Analyst's Role in Compliance
 
GDPR
GDPRGDPR
GDPR
 
GDPR- The Buck Stops Here
GDPR-  The Buck Stops HereGDPR-  The Buck Stops Here
GDPR- The Buck Stops Here
 
#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod#GDPR Compliance - Data Minimization via ArchivePod
#GDPR Compliance - Data Minimization via ArchivePod
 
Unified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge GraphUnified Information Governance, Powered by Knowledge Graph
Unified Information Governance, Powered by Knowledge Graph
 
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
Sergio Juarez, Elemica – “From Big Data to Value: The Power of Master Data Ma...
 
Unlocking big data
Unlocking big dataUnlocking big data
Unlocking big data
 
Gdpr ccpa automated compliance - spark java application features and functi...
Gdpr   ccpa automated compliance - spark java application features and functi...Gdpr   ccpa automated compliance - spark java application features and functi...
Gdpr ccpa automated compliance - spark java application features and functi...
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdf
 
Why Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdfWhy Big Data Automation is Important for Your Business.pdf
Why Big Data Automation is Important for Your Business.pdf
 
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdfData Observability- The Next Frontier of Data Engineering Pdf.pdf
Data Observability- The Next Frontier of Data Engineering Pdf.pdf
 
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
Mesos Meetup - Building an enterprise-ready analytics and operational ecosyst...
 
Big Data Tools: A Deep Dive into Essential Tools
Big Data Tools: A Deep Dive into Essential ToolsBig Data Tools: A Deep Dive into Essential Tools
Big Data Tools: A Deep Dive into Essential Tools
 
Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!Klarna Tech Talk - Mind the Data!
Klarna Tech Talk - Mind the Data!
 
Comprehensive Data Leak Prevention
Comprehensive Data Leak PreventionComprehensive Data Leak Prevention
Comprehensive Data Leak Prevention
 
Security issues in big data
Security issues in big data Security issues in big data
Security issues in big data
 
Data foundation for analytics excellence
Data foundation for analytics excellenceData foundation for analytics excellence
Data foundation for analytics excellence
 
Hadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business UnitHadoop: Making it work for the Business Unit
Hadoop: Making it work for the Business Unit
 

Plus de Steven Meister

Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...
Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...
Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...Steven Meister
 
Gdpr, analytics, big data compliance beta
Gdpr, analytics, big data compliance betaGdpr, analytics, big data compliance beta
Gdpr, analytics, big data compliance betaSteven Meister
 
Privacy assurance initiative
Privacy assurance initiativePrivacy assurance initiative
Privacy assurance initiativeSteven Meister
 
I have listed 3 informative youtube videos on the eu gdpr
I have listed 3 informative youtube videos on the eu gdprI have listed 3 informative youtube videos on the eu gdpr
I have listed 3 informative youtube videos on the eu gdprSteven Meister
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesSteven Meister
 
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...Steven Meister
 
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...Steven Meister
 
Big datarevealed hadoop catalog
Big datarevealed hadoop catalogBig datarevealed hadoop catalog
Big datarevealed hadoop catalogSteven Meister
 

Plus de Steven Meister (8)

Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...
Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...
Gdpr CCPA Why Benchmarks of Billions of rows are as meaningful as compliance ...
 
Gdpr, analytics, big data compliance beta
Gdpr, analytics, big data compliance betaGdpr, analytics, big data compliance beta
Gdpr, analytics, big data compliance beta
 
Privacy assurance initiative
Privacy assurance initiativePrivacy assurance initiative
Privacy assurance initiative
 
I have listed 3 informative youtube videos on the eu gdpr
I have listed 3 informative youtube videos on the eu gdprI have listed 3 informative youtube videos on the eu gdpr
I have listed 3 informative youtube videos on the eu gdpr
 
Gdpr questions for compliance difficulties
Gdpr questions for compliance difficultiesGdpr questions for compliance difficulties
Gdpr questions for compliance difficulties
 
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
The U.S. Privacy Shield Frameworks is coming to America as is EU GDPR– It’s t...
 
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
BigDataRevealed SecureSequesterEncrypt - iot easy as 1-2-3 - catalog-metadata...
 
Big datarevealed hadoop catalog
Big datarevealed hadoop catalogBig datarevealed hadoop catalog
Big datarevealed hadoop catalog
 

Dernier

BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfMarinCaroMartnezBerg
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptxAnupama Kate
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxolyaivanovalion
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationshipsccctableauusergroup
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfSocial Samosa
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsappssapnasaifi408
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiSuhani Kapoor
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxolyaivanovalion
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...Suhani Kapoor
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxolyaivanovalion
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 

Dernier (20)

BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
FESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdfFESE Capital Markets Fact Sheet 2024 Q1.pdf
FESE Capital Markets Fact Sheet 2024 Q1.pdf
 
100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx100-Concepts-of-AI by Anupama Kate .pptx
100-Concepts-of-AI by Anupama Kate .pptx
 
Smarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptxSmarteg dropshipping via API with DroFx.pptx
Smarteg dropshipping via API with DroFx.pptx
 
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls CP 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships04242024_CCC TUG_Joins and Relationships
04242024_CCC TUG_Joins and Relationships
 
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdfKantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
Kantar AI Summit- Under Embargo till Wednesday, 24th April 2024, 4 PM, IST.pdf
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /WhatsappsBeautiful Sapna Vip  Call Girls Hauz Khas 9711199012 Call /Whatsapps
Beautiful Sapna Vip Call Girls Hauz Khas 9711199012 Call /Whatsapps
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service AmravatiVIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
VIP Call Girls in Amravati Aarohi 8250192130 Independent Escort Service Amravati
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
Mature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptxMature dropshipping via API with DroFx.pptx
Mature dropshipping via API with DroFx.pptx
 
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
VIP High Class Call Girls Jamshedpur Anushka 8250192130 Independent Escort Se...
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
VidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptxVidaXL dropshipping via API with DroFx.pptx
VidaXL dropshipping via API with DroFx.pptx
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 

Become GDPR & CCPA Compliant with 6 Easy Steps

  • 1. How to become GDPR & CCPA Compliant. Follow these steps to become sufficiently compliant to avoid regulatory fines and public embarrassment brought about by a successful data breach. Privacy by Design is what BigDataRevealed was built to deliver. BigDataRevealed offers an application to assist in completing the following Steps and was developed using only the most advanced languages and platforms; such as Spark, Kafka, Java 8.0, Spring APIs, AngularJS, WildFly10, Apache Hadoop 3.1 and other advanced open source technologies, for the sole purpose of Data Protection and Regulatory Requirements. Our personal assessment is that most companies over estimate their GDPR Readiness and haven’t developed a viable plan or methodology to tackle the most important aspect of Data Compliance; and that is protecting their customer’s Personal Information. In general, ‘protecting’ information has become synonymous with encrypting personal information. Hackers will always find a way to defeat your security systems and obtain your data. However, that data will have virtually no value to them, and cause no harm to you, if the personal information is securely encrypted. The ability to inform a customer of the information you have collected about them, and the ability to remove that information upon request, is important & complex, but these two tasks are not the central tenet of GDPR. Protecting customer’s Personal Information is what GDPR is all about. Following is a list of steps I feel will get you close enough to GDPR, CCPA and most any Data Regulatory compliancy, so that regulators will be satisfied you did all that could be expected. In reality, becoming 100% compliant could not be reasonably expected of any larger company. We believe the following steps comprise a viable plan for compliancy. To better understand the process to allow customers to request information you hold about them and to remove that information view our earlier post athttps://www.linkedin.com/pulse/symantecs- state-european-privacy-reort-found-90-believe-meister/
  • 2. STEP 1. Complete a Data Protection Impact Assessment (DPIA) in a Big Data Ecosystem. Big Data is preferred so that your operational systems are not degraded during the process and to minimize the technical difficulties various data types present that Big Data can easily handle. Begin the DPIA by discovering the location of Personal Information in all your files. You will want to search for patterns that identify data such as: National ID, Social security, Driver’s License, Email, IP Addresses, Phone Numbers and hundreds more. You will want a library containing of all these patterns and can be easily extended to include any unique patterns or industry specific patterns you may need. Centralize the following data sources into your Big Data Ecosystem; Legacy system data, Office documents, PDFs, OCR documents, XML, Structured and Semi-Structured Information and Many others. Images are supported by BigDataRevealed using Facial and Object recognition software if applicable. The DPIA process to discover Personal Information should include constructing a Metadata Catalogue that will identify the location of Personal Information found in every file processed by Row and Column. This information will become invaluable when developing your Remediation Plan. STEP 2. Develop a Remediation PLAN. - Using the Metadata developed in the DPIA (STEP 1) a team comprised of Product Managers, Developers, Business Analysts and others must review which business applications use the files where Personal Information was discovered. This process needs to be thorough and accurate as it identifies which files/applications are most vulnerable to hackers. - Pay the greatest attention to files used in applications that are central to your business practices or interact with your customers such as; Point of Sale, Cash Register, On-line Order Processing, Customer Service and Payment Processing. You may even discover files that have no purpose and can be eliminated. - The plan must include the following concepts; a. How will these applications continue to function once the data in the files have been encrypted? b. Is the best practice to use APIs to interface between the application and the data files containing the encrypted data? BigDataRevealed can provide such APIs. c. Where will the decryption/encryption keys be securely located so that the APIs can complete their function safely. d. How will newly received data be encrypted as it enters these files from non- application sources such as IoT, Social Media and other feeds. Prioritize the files and applications that represent the greatest risk to your organization and begin the remediation process with them.
  • 3. You have now protected the personal information in your most valuable or vulnerable application, and are ready to celebrate. STEP 4. Adding/Updating data in an encrypted file. In STEP 2, you identified where and how a file might receive new data, via adding a new transaction or through a data feed. By connecting the same APIs to exit points in the application where new transactions are generated, or by using BigDataRevealed’s ability to process streaming data ‘on the fly’ you can achieve ongoing compliance. STEP 5. Prepare for Production Before implementing the newly modified application tested in STEP 3 and STEP 4, you should verify that no other applications use data from files that will become encrypted. You are now ready to use BigDataRevealed to encrypt production data and install the modified application and APIs in your production environment. STEP 3. Begin Remediation and testing. - Developers/analysts will identify the ‘exit points’ from the high priority applications that access data from a file containing personal information. These ‘exit points’ will be where the encryption/decryption APIs must be connected to the application. This task will likely be the most labor intensive as there are no application tools to assist in discovering ‘exit points’. - In a test environment, complete the process of connecting the APIs to the application. - Extract data from the files identified above and load them into BigDataRevealed. - Run a Discovery Process for those extracted files to identify all Personal Information contained in those files. (A fully automated process) - Request Encryption to be completed on any or all of the columns containing personal Information. (Fully automated). - Upload the newly encrypted files into a test environment. - Begin Testing
  • 4. Other Compliance Considerations BigDataRevealed’s Dashboards presents to your operational staff, the customers that have requested their ‘Right of Information’ or their ‘Right of Erasure’, and for CCPA their ‘Right of Deletion’. Operational staff can process each request separately, or group them together for efficiency reasons. BigDataRevealed’s extensive Metadata Catalogue allows your operational staff to request extraction of information for presentation to a customer, and then to remove that data if necessary. BigDataRevealed groups the data according to each customer, thereby making it easy to present information to every customer, even if that single customer was processed in a group of many other customers. BigDataRevealed’s Metadata stores the file, Column names, Row location and other information, which can be used in other metadata systems, by ETL Developers, DBA’s and others to facilitate the deletion of the Citizen’s data easily with the many legacy tools available. BigDataRevealed’s comprehensive metadata Search Portal allows the user to search for the necessary Metadata to fulfill the GDPR, CCPA and many others Regulatory Requirements by: Ability to search the Metadata Library and export data to an excel spreadsheet using the following criteria Date Ranges , Specific Personal Data Patterns, and Specific customers. By Specific Types of Run such as Pattern / Data Discovery, Business Classification Compliancy is an ongoing process, as data is constantly changing or being inserted. So, you must ask; How does one stay Compliant? a. You must confirm that a person’s prior right of erasure is being honored, and that their personal information has not once again entered your company’s Data Assets. A list of Citizens that have exercised their right of Erasure must be maintained and used in all processes adding or updating Personal Information. b. Data can sneak its way into your Data Assets from varying sources: i. IoT, website Orders, Cookies, Third Party Purchases of Data, Restores from within the company or from Data Recovery Facilities, Internal Employees, even hackers. There are limitless ways Information is ingested into companies data assets. ii. To reasonably remain compliant with an Erasure request or Deletion request you must continually look for and discover exposed personal information for these individuals.
  • 5. BigDataRevealed’s Comprehensive Metadata Catalogs are invaluable in becoming nearly Compliant for GDPR, CCPA or others. After reading this document, or discussing your company’s overall data environment with us, you will understand that becoming 100% compliant might not be attainable for any company. There is no obvious threshold to reach in order to believe you are compliant; and the nature of your business may make it far more difficult for you to reach than for another company. However, regulators will be expecting you to articulate your plans and accomplishments while explaining the obstacles that are unique to you. Some of these obstacles are; 1. Operational/Production systems that are from vendors that are out of business and NO Exit points exist to attach Spring API’s to perform encryption and decryption functions. 2. An Operational/Production system is from a vendor that can’t provide assistance to identify Exit Points. 3. Some of your Legacy systems are old or poorly constructed and identifying Exit Points is extremely difficult. 4. Many other technical issues may take time to correct for proper encryption/decryption processes to accurately and safely take place while not stifling your business. During this period of becoming compliant, a company may wish to run several Extensive DPIA’s to prove to Regulatory Agencies and Courts that they have done what is possible and have made progress. The company should prepare a timeline showing ongoing increases in the percent of Citizens Person Data being protected. BigDataRevealed believes we have the most comprehensive technology able to deliver Compliancy by Design and allow companies to reach their maximum potential in Data Protection and Regulatory Compliance and do so at with the most automation, and at an affordable price point. Here is the CCPA / GDPR 3 Day Training PowerPoint - https://www.slideshare.net/StevenMeister/ccpa-and- gdpr-three-day-training-with-actual-deliverables-and-the-whys-and-hows-to-do-so 847-440-4439 https://www.youtube.com/channel/UC3F-qrvOIOwDj4ZKBMmoTWA?view_as=subscriber GDPR 16 page PPT Plan - https://www.slideshare.net/StevenMeister/gdpr-ccpa-automated-compliance- spark-java-application-features-and-functions-of-big-datarevealed-april-version-35 https://youtu.be/JGoQwoicUxw Comprehensive Metadata Catalog Video for GDPR / CCPA - https://youtu.be/xryESgfzRcc