Pioneers in secure data storage devices. Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing.

Slides:



Advertisements
Similar presentations
Data Privacy and Security in the Cloud Presented by Robert J. Scott Managing Partner Scott & Scott, LLP
Advertisements

IT Security Policy Framework
Department of Information Systems Brigham and Womens Hospital Laptop Encryption Catherine McGoldrick Schroeder Corp. Mgr, BWH IS Management & Planning.
University Data Classification Table* Level 5Level 4 Information that would cause severe harm to individuals or the University if disclosed. Level 5 information.
The Physician’s Answer to Compliance to Privacy Legislation November 2, 2001.
International Employment – latest Digital Employment issues Melanie Lane and Karine Audouze.
CHAPTER © 2011 The McGraw-Hill Companies, Inc. All rights reserved. 2 The Use of Health Information Technology in Physician Practices.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Brief Synopsis of Computer Security Standards. Tenets of Information Systems Security Confidentiality Integrity Availability Over the years, standards.
Information Security Policies Larry Conrad September 29, 2009.
Security Controls – What Works
Why Comply with PCI Security Standards?
Columbia University Medical Center Health Insurance Portability and Accountability Act of 1996 (“HIPAA”) Privacy & Information Security Training 2009.
Protecting Sensitive Information PA Turnpike Commission.
Managing Risk in Cloud Computing Contracts Henry Ward and Todd Taylor April 30, 2015.
The Use of Health Information Technology in Physician Practices
CLOUD AND SECURITY: A LEGISLATOR'S PERSPECTIVE 6/7/2013.
Quality Integrity Stewardship Courtesy Care Accountability Medical Records ARMA Florida Gulf Coast Chapter Michael Spake Lakeland Regional Medical Center.
AUGUST 25, 2015 Cyber Insurance:
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Financial Services Privacy - the interaction of the privacy and financial services regulatory systems Chris Connolly Financial Services Consumer Policy.
Europe's work in progress: quality of mHealth Pēteris Zilgalvis, J.D., Head of Unit, Health and Well-Being, DG CONNECT Voka Health Community 29 September.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
European legislative developments in the field of consumer credit ALB National Conference 15 November 2012, Bucharest.
Data Security in a Mobile World Emmitt Wells – Getronics.
HIPAA BASIC TRAINING Presented by Anderson Health Information Systems, Inc.
Robert Guerra Director, CryptoRights Foundation Implementing Privacy Implementing Privacy: Rules of the Game for Developers Mac-Crypto Conference on Macintosh.
Imagine a health system that focuses on health, not just health care. Imagine a sustainable health system with one goal: to improve the lives of the people.
IT Security Policy Framework ● Policies ● Standards ● Procedures ● Guidelines.
C HAPTER 34 Code Blue Health Sciences Edition 4. Confidentiality of sensitive information is an important issue in healthcare. Breaches of confidentiality.
Staying ahead of the storm: know your role in information security before a crisis hits Jason Testart, IST Karen Jack, Secretariat.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Information Management in Retail: A Legal Perspective Chris Hill Barlow Lyde & Gilbert LLP 17 September 2009.
Western Asset Protection
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Data Security and Privacy Overview and Update Peter Moldave October 28, 2015.
Chapter 4: Laws, Regulations, and Compliance
Safeguarding Sensitive Information. Agenda Overview Why are we here? Roles and responsibilities Information Security Guidelines Our Obligation Has This.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Database Encryption Market to Global Analysis and Forecasts by Types, End User and Deployment Type No of Pages: 150 Publishing Date: Jan 2017 Single.
Database Encryption Market to Global Analysis and Forecasts by Types, End User and Deployment Type No of Pages: 150 Publishing Date: Feb 2017 Single.
TRUSTED | PROTECTED | SECURED
COMP3357 Managing Cyber Risk
Overview General Data Protection Regulation (GDPR)
Director, Regulation and Strategy
Use of BMC Patient Information Privacy & Security
Regulatory Compliance
Contingent Workforce: Global Privacy Laws Overview
Information Destruction; 2017 and beyond!
General Data Protection Regulation
Key dates for PSD2 and implications to EU/UK payment processors
Cloud Security Market Share
My First Template.
My First Template.
Introducing GDPR: How the General Data Protection Regulation transforms the world Laura Mudd November 2016.
Introduction to GDPR 09/11/2018.
Cyber Trends and Market Update
COMP3357 Managing Cyber Risk
 How does GDPR impact your business? Pro Tip: Pro Tip: Pro Tip:
The Need for Effective Database Security
The Need for Effective Database Security
Building a Vertical Around Regulated Industries to Increase Your Business
The e-government Conference main issues
Understanding Data Protection
Move this to online module slides 11-56
Introduction to the PACS Security
SECURITY IN THE DIGITAL AGE
Presentation transcript:

Pioneers in secure data storage devices

Users have become more accustomed to using multiple devices, are increasingly mobile, and are now used to storing ever-increasing amounts of data on multiple endpoints. – Unfortunately, people are also careless and are susceptible to losing endpoints. Regulatory Compliance: New and enhanced legislation in many regions of the globe demand strong protection of specific data categories and may have a high impact if the data is lost or exposed. Business Risk: The costs associated with compromised information can be high. – A breach of law or regulation can lead to substantial fines. – Failure to comply to industry requirements may have financial or operational consequences. – Notification of breaches can lead to severe reputational damages. – Financial loss associated with sensitive business plans or intellectual property may be high. Confidential2 Industry Landscape: Industry Landscape: Relevant Market Dynamics; The Importance of Secure Data

New legislation introduced on 6 th April 2010 gives the Information Commissioner’s Office the power to fine organisations up to £500,000 for serious breaches of the Data Protection Act. Most data protection acts, notably those in Europe and Japan, demand adequate protection of personally identifiable information (PII). In the United States, some states (Massachusetts and Nevada) have recently added data-protection laws that specifically call for the use of encryption. Data breach notification laws are related to data privacy acts. After 2003, when the California Security Breach Notification Act (SB 1386) became effective, other state laws have spurred the adoption of encryption across many industries. At the moment, most U.S. states have breach notification laws that have a safe harbor for the use of encryption. European Union (EU) law for data breach notification has been limited, but changes are under way. For the telecom sector, the EU telecommunications regulation reform package that was passed in November 2009 requires EU member states to introduce mandatory data breach notifications into local legislation. Transposition of the telecom reform package into national legislation in the 27 EU member states was to take place by May Nonetheless, it is important to note that some countries (e.g., Germany, Spain, UK, and Ireland) had introduced data breach notification requirements into local legislation or regulatory codes of practice before In Canada, data breach notification has been instituted as a voluntary guideline but is currently being proposed as law in the form of an amendment to the Personal Information Protection and Electronic Documents Act (PIPEDA). Japan has had breach notification regulations for several years. Confidential3 Source: Gartner, Comparing Endpoint Encryption Technologies. Published 8 September 2011 Industry Landscape: Industry Landscape: Regulatory

Protected health information (PHI): In the United States, Health Information Technology for Economic and Clinical Health (HITECH; 2009) expands Health Insurance Portability and Accountability Act (HIPAA) to business associates and includes breach notification requirements for unsecured health records. It offers breach notification safe harbor if acquired data was encrypted. Payment card data: Payment Card Industry Data Security Standard (PCI DSS) by the PCI Security Standards Council contains requirements on the storage of cardholder data and the management of key material. Finance data: In some countries, financial regulatory bodies such as central banks have strict requirements, which may include breach notification, on the protection of customer information. An example is the Gramm-Leach-Bliley Act in the United States. Confidential4 Source: Gartner, Comparing Endpoint Encryption Technologies. Published 8 September 2011 Industry Landscape: Industry Landscape: Regulatory (Cont.)

Nuclear plant data lost by health and safety watchdog employee – Scottish charity reports data loss due to unencrypted USB sticks – Companies Lose $2.5 Million from Missing Memory Sticks, Study Says – University of Miami patient data stolen – Lost USB stick earns Rochdale Council ICO rebuke – Boy Finds USB Stick With Private Medical Records – Confidential5 Market Opportunity: Market Opportunity: Breaches Happen… In the News

The Problem: Organisations are subjected to significant exposure as a result of increasingly stringent laws, regulations, industry standards, insurance requirements and consumer expectations related to data security and loss. Increasing emphasis on employee mobility and other drivers requires the use of convenient devices that provide a secure computing environment. Unfortunately, employees lose portable storage devices and often do not report the loss to their management… The Opportunity: As a result, organisations are beginning to turn to encrypted portable storage devices as the solution. High quality, easy to use and reasonably priced products, such as iStorage’s products, will have an advantage over inferior products. Focus on the niche of encrypted/secure storage devices provides a competitive advantage over competitors. Confidential6 Market Opportunity: Market Opportunity: Problem and Opportunity

®

®

®

Confidential11 Company Overview: Company Overview: Press, Reviews and Accolades Link to read reviews

Confidential12 Company Overview: Company Overview: Press, Reviews and Accolades (Cont.) Link to read reviews

Distributors in over 25 countries and expanding