fbpx
      Posts Tagged :

      Data Classification

      The 5 W’s of Data Classification

      There are several routes to Regulatory Compliance, but the journey has to include Data Classification. At the heart of becoming compliant, is an effective Data Security Strategy – which in the perfect world would keep our information assets safe from unauthorized access (aka Hackers and Data Thieves). Regardless of the compliance requirement: HIPAA, ITAR, EAR, PCI,…

      read more

      EAR Compliance and Data Classification Pt. II; Categorization

      Equally important as classifying EAR Sensitive data, is categorizing it. Once data is deemed as sensitive or non-sensitive, an organization must apply a set of categories that will differentiate data based on confidentiality and authorization. While it’s understood that an inherent rule of EAR compliance demands that EAR Sensitive data not be seen by non-US…

      read more

      EAR Compliance and Data Classification

      Export Administration Regulations (EAR) is a set of US Government regulations that deals with the export and temporary import of items designed for commercial use, which could have military application (Dual Use). The sensitive information in an EAR context is usually defined as “Technical Data” which includes; articles, technology, software, and other information necessary for…

      read more

      Data Security Best Practices for ITAR Compliance

      What can organizations do to protect data with regards to ITAR compliance? We listed a short, summarized list below that can help organizations with ITAR compliance through some data security best-practices. It is important to understand that data security is not an end result, but a continuous journey in protecting your information assets. We implement…

      read more

      The Importance of Data Classification

      Data is truly not created equal. We’re all concerned about Data theft, be it credit card information, healthcare (PHI) information, or private and confidential employee data or trade secrets. In recent cases, we have heard a lot about corporate espionage and hacking threats from competing nation states. Well, how do we go about protecting our…

      read more
      Aurora has joined the Plurilock FamilyLearn More
      +