The law requires data controllers to have in place appropriate administrative, technical and physical safeguards to ensure the protection of personal data.
Thales can help organizations comply with these laws and avoid stiff penalties through:
Mexico's Data Protection Law (Ley Federal de Protección de Datos Personales en Posesión de los Particulares) became effective July 6, 2010.
An article in El Economista on 26 January 2017 notes “the objective of the General Law for the Protection of Personal Data is to establish the foundational principles and procedures to guarantee the right of all people to protect their personal information in possession of other subjects.”
Areli Cano Guadiana, Commissioner for the Institute on Transparency, Access to Information and Protection of Personal Data stated in El Financiero, “the approval of the General Law for the Protection of Personal Data by Mexico’s Legislature represents a significant advancement for the right of people to control the handling of their personal information.”
Data privacy and security expert Francoise Gilbert writes:
The Law applies to personal data that are processed, transferred, or disposed by private persons or entities. “Personal data” includes any information pertaining to an identified or identifiable natural person.
Data controllers must have in place appropriate administrative, technical, and physical safeguards in order to ensure that personal data are protected from loss, damage, alteration, destruction, and unauthorized access or use.
According to the resolution enacted by the Honorary Representative Council of the National Commission on Minimum Salaries, infractions and sanctions dictated by Chapter X of the General Law for the Protection of Personal Data are set between 100 and 320,000 days of minimum salary within the Federal District, which can amount to 6,500 to 20,700,000 Mexican pesos.
Complying with Mexico’s Data Protection Law (Ley Federal de Protección de Datos Personales en Posesión de los Particulare) and avoiding fines and breach notifications requires best-practice data security that is state-of-the-art.
Thales’s essential offerings in this area include:
Vormetric’s Data Security Platform provides state of the art user access control.
Vormetric protects the data itself through Vormetric Transparent Encryption with integrated Key Management for data at rest, Application Encryption, Tokenization with Dynamic Masking and more. These techniques make the data meaningless and worthless without the tools to decrypt it.
Thales lets the enterprise to monitor and identify extraordinary data access. Vormetric Security Intelligence Logs are detailed management logs that specify which processes and users have accessed protected data. They specify when users and processes accessed data, under which policies, and if access requests were allowed or denied. The management logs will even expose when a privileged user submits a command like 'switch users' in order to attempt to imitate, and potentially exploit, the credentials of another user. Sharing these logs with a security information and event management (SIEM) platform helps uncover anomalous patterns in processes and user access, which can prompt further investigation. For example, an administrator or process may suddenly access much larger volumes of data than normal, or attempt to do an unauthorized download of files. These events could point to an APT attack or malicious insider activities.
HSMs from Thales provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more. Available in three FIPS 140-2 certified form factors, HSMs support a variety of deployment scenarios. Connect and Solo HSMs also provide a secure environment for running sensitive applications. The CodeSafe option lets you execute code within boundaries, protecting your applications and the data they process.
In addition HSMs:
Perhaps the most comprehensive data privacy standard to date, GDPR affects any organization that processes the personal data of EU citizens - regardless of where the organization is headquartered.
Any organization that plays a role in processing credit and debit card payments must comply with the strict PCI DSS compliance requirements for the processing, storage and transmission of account data.
Data breach notification requirements following loss of personal information have been enacted by nations around the globe. They vary by jurisdiction but almost universally include a “safe harbor” clause.