Remove Education Remove Encryption Remove How To Remove White Paper
article thumbnail

How to prepare for the California Consumer Privacy Act

Thales Cloud Protection & Licensing

When you boil these down for your organization into technology and process requirements, you’ll find that encryption, tokenization, strong key management, and access controls can satisfy many of the privacy requirements to protect your organization from breach notification actions. (4) Personal Information excluded by the CCPA.

Privacy 92
article thumbnail

An Approach to Cybersecurity Risk Oversight for Corporate Directors

Data Matters

Encrypting critical data assets. The NACD Handbook principles provide directors with a high-level understanding of how to think about cyber issues from the perspective of corporate strategy. Encrypting Critical Data Assets. Creating an enterprise-wide governance structure. Aligning cyber risk with corporate strategy.