As digital initiatives shift applications and users to the cloud and mobile platforms, modern organizations are faced with even more data growth, in more places. The constant threat of unauthorized access across this expanding attack surface places sensitive consumer and organizational information at higher risk.
Did You Know?
Only
0
% of breaches are linked to internal actors —Verizon
0
% of breaches in 2020 involved personal data —Verizon
Knowing what data needs to be protected, controlling its access
And siloed organizational ownership of data in general are common challenges in today’s environments from the ground to the cloud. As digital initiatives shift applications and users to the cloud and mobile platforms, modern organizations are faced with even more data growth, in more places.
Data protection prevents PII and other sensitive information from being stolen and used for fraudulent activities like identity theft, phishing and hacking. Some organizations store this data (names, emails, addresses, health information, phone numbers and credit card or financial information) as well as employee records, customer details, loyalty programs and transactions.
There’s no overarching US federal legislation impacting data protection.
Still, several federal data protection laws exist that are sector-specific: The Gramm Leach Bliley Act (GLBA), the Fair Credit Reporting Act, the Health Information Portability and Accountability Act (HIPAA), the Telephone Consumer Protection Act (TCPA) and the Family Educational Rights and Privacy Act (FERPA) are just a few.
In addition
Some US states have adopted data breach notification legislation,
Including New York’s SHIELD Act
Illinois’s Biometric Information Privacy Act (BIPA)
California’s Privacy Rights Act (CPRA)
Virginia’s Consumer Data Protection Act (CDPA).
Data Protection Law
Also called information privacy law, data protection laws exist to protect the personal data of residents of the United States.
Your users – and your business – rely on having access to your ever-growing stores of data. AVIH data protection offerings play a key role in safeguarding your data from compromise, corruption, and loss – thereby assuring your data’s availability.
Meet Your AVIH Data
Governance Team
There’s a good reason why AVIH clients choose us for their data governance needs – and why you should, too. Our practice specialists serve as both advisors in the creation of an effective governance strategy and implementers in leveraging the appropriate technology to execute on that strategy.