Intelligent Metadata Enabled Solutions for GDPR

Request a Demo

Intelligent Metadata Enabled Solutions for GDPR

General Data Protection Regulation (GDPR) is fast approaching. Do you think it’s time to prepare now? Explicit consent, 72 hour notification of a data breach, hiring a data protection officer, the right to be forgotten, the right for a copy of personal data, portability of personal information, data privacy protection, and audit trails are all required for compliance.

The bottom line? PwC recommends putting aside four percent of your revenues for fines. Do you think it’s time to prepare now?
Wall Street Journal

  • The Concept Searching Difference

    The European Union, including the UK, will be implementing the complex and far reaching General Data Protection Regulation (GDPR) to protect personal data, and the requirements for organizations doing business in these countries are documented in the regulation. In May of 2018, companies, regardless of where they reside, will need to follow the recommendations or face serious financial repercussions. If you are similar to the 97 percent of companies surveyed by Dell in 2016, you have no current plans to address GDPR.

    compliance-record-management

    Find organizationally-defined privacy data, regardless of where it resides, or how it was consumed

    Track explicit consent forms for auditing and acceptance purposes*

    Proactively identify and protect data breaches in near real time

    Review EU-US Privacy Shield, which replaces Safe Harbor, frequently for changes to support GDPR

  • *Requires a review of existing security policies, and they must be tracked and available on demand. For example, a tick box or attendance at a trade show does not constitute consent under GDPR.

    The cost of privacy noncompliance under the GDPR is steep. Most companies are unprepared. Whether or not you do business in the EU or UK, securing privacy data has never been so important, with the increase of data breaches, noncompliance, and ransomware. Putting the business processes in place for GDPR compliance results in protection for all your clients, and ultimately your organization, achieving a significant benefit.

    Eliminate end user tagging

    Identify potential and real data breaches, and protect content from access and portability

    Identify all personal data that can be purged, archived, or is noncompliant

     

     

    Key Benefits

    Key Benefits

    The challenge for most organizations is that they focus on perimeter security, yet 68 percent of data breaches are caused by internal stakeholders. With the continued rise, and costs, associated with ransomware, organizations are now facing unprecedented attacks, brand damage, and considerable recovery time. Concept Searching provides the solution that addresses security breaches and the requirements of the GDPR. Significant fines for violations are imposed by the GDPR. Up to 4 percent of revenues can be levied against an organization for an exposure.

    The conceptClassifier platform includes, in the base product, all standard descriptors. Organizationally-defined confidential information can also be used, for example, HIPAA in the healthcare industry. As content is created or ingested, if the multi-word terms and descriptors that an organization has determined are found within its own corpus of content, that content will be moved to a secure repository for disposition. Notification can be sent to an individual or application, and content prevented from portability.

    Request a Demo
    • Prevent noncompliance and costs, through the elimination of end user tagging, while improving enterprise metadata
    • Ensure all privacy data vulnerabilities have been identified from diverse repositories, such as scanned documents, and email, fax, and test servers, avoiding potential fines of up to 4 percent of revenues for one offense
    • Proactive notification of data exposures in real time removing the time gap from occurrence to resolution
    • Protect content that does contain a potential data breach, through automatic removal to a secure repository, removal from search, notification to the appropriate response team, and prevention of portability
    • Improve the quality of metadata for reuse and repurposing for enterprise business processes, solving all challenges with unstructured content
    • Organizationally-defined confidential information can be identified and protected, for example, intellectual property, new product information, and merger and acquisition information – protecting the organization, improving competitive advantage, and reducing costs