Whitepaper : Protecting Personally Identifiable Information in Databases

Presenter: IDERA
Share This:  Facebook Twitter LinkedIn

The data resources of an organization are one of its most valuable assets. Except for its people, the information contained in enterprise databases and how it is used is one of the most differentiating factors when comparing similar companies. Productive utilization of data assets through analytics can result in obtaining substantial competitive advantages in the marketplace.

Information streams such as big data and the Internet of Things (IoT) have increased the volume of data, its diversity, and the rate at which it is generated and collected. The differences in structured and unstructured data elements further complicate thoroughly processing and categorizing the information that ends up in databases of an organization.

Not all data is of equal importance to the entities responsible for its creation and storage. In particular, personally identifiable information (PII) needs to be handled more securely than the average data. In this whitepaper, we will discuss the methods and techniques that should be used to protect PII to safeguard the individuals identified by the data and the organizations that store these resources in enterprise databases.

This whitepaper describes what personally identifiable information is, categorizing data resources, steps to protect PII and sensitive PII in databases, identifying the PII collected and stored by the organization, locating where PII is stored, classifying data sensitivity, developing an acceptable usage policy, and encrypting PII and sensitive PII. The whitepaper also presents deleting obsolete PII, reviewing and resolving permission errors, educating employees regarding PII, creating standard procedures for employees leaving the organization, reasons to protect PII and sensitive PII, and tools for protecting PII and SPII in databases.

Register to read the full whitepaper.



Register for Free Whitepaper

Register For a Free Whitepaper

*
*
*
*
*