Remove category identity-theft
Remove Examples Remove Exercises Remove Government Remove Information Security
article thumbnail

How to implement the General Data Protection Regulation (GDPR)

IBM Big Data Hub

For example, a business that collects user health data needs stronger protections than one that collects only email addresses. Identify and protect special category data When inventorying data, organizations should make a note of any especially sensitive data that requires extra protection.

GDPR 76
article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

These controls include: Active Directory (AD): Manages users, groups, and passwords as a fundamental access control for an organization and the basis for most other security tools. Identity access management (IAM): Simplifies, centralizes, and expands abilities to manage AD and other lightweight directory access protocol (LDAP) tools.

Security 120