According to new research from the UK & Ireland SAP User Group, around 86% of users have yet to grasp the implications of GDPR (the General Data Protection Regulation) as it relates to their ...
WATCH “Forget” data in your SAP Systems NOW
From the server room to the boardroom
The cost of legislation compliance, or data breaches – resulting in business disruption, reputational damage, and loss of intellectual property – can be crippling. A proactive approach and solid data protection practices can help you to meet this challenge head-on.
Transparency and privacy of personal data are core concepts embedded in recent legislation such as the GDPR (General Data Protection Regulation). Other regions are seeing similar legislation updates and certifications to restrict the effects of new technology on personal freedom.
In the US, these include the California Consumer Privacy Act of 2018 (CCPA), causing a shift in the landscape of data privacy law across the country, and the amendment to the California Online Privacy Protection Act (CalOPPA), which requires privacy policies to include certain Do Not Track (DNT) disclosures. HIPAA (the Health Insurance Portability and Accountability Act) sets the standard for protecting sensitive patient data. There are also key federal laws which prevent 'unfair and deceptive practices' and make sure children's data is protected.
Other relevant legislation includes Canada’s CIPP/C (Certified Information Privacy Professional/Canada), Mexico Federal Protection Law, the POPI Act in South Africa, the Singapore Personal Protection Act, Turkey’s Data Protection Law (KVKK) and Australian data privacy regulations.
Increasing awareness and associated legislation have a massive impact on businesses and their data security obligations.
Your information and communications can be better protected and secured using encryption technologies, especially when dealing with third-party data processing entities.
Using cryptographic libraries can help you meet local and international data protection laws for structured and unstructured data.
Learn more about our Cryptographic Library offering.
Limit the amount of sensitive data that can be stolen by scrambling and anonymizing the underlying data. Protect data by changing the values of fields, while maintaining the integrity of the data and ensuring production-like behavior.
The quality of test and training data should remain the same, without exposing any confidential data. Broader access can be granted to the non-production systems to allow more thorough testing, which will benefit your organization.
See how we helped Rabobank with their compliance challenges.
Decommissioning SAP® systems is not something most people want to take on. Many companies will retain their old outdated legacy SAP systems for fear that they would need the data for auditing or reference in the future - which comes at a cost. Maintenance contracts on legacy systems together with the risk of unsupported hardware failures add up to escalating costs.
Learn more about how we help companies using our Data Sync Manager solution.
Jan Huizinga, Technical consultant, Rabobank
Mike Ellis, Software Development Technical Manager | Edwards