Thales

PIPEDA Compliance

Thales can help you comply with Canada’s Personal Information and Electronic Documents Act (PIPEDA).

PIPEDA Compliance

Test

In Canada, the Personal Information Protection and Electronic Documents Act (PIPEDA) establishes laws that regulate the collection, use, and disclosure of personal information by private sector organizations.

The PIPEDA compliance laws state that personal information must be protected by security safeguards appropriate to the sensitivity of the information, including technological measures, such as the use of passwords and encryption. Fines of up to $100,000 may be assessed for non-compliance with PIPEDA.

  • Regulation
  • Compliance

Canada’s Privacy Guide for Businesses, the Canadian Government’s guide for PIPEDA compliance, says this about using appropriate safeguards:

Use appropriate security safeguards to provide necessary protection. These can include:

  • Physical measures (e.g., locked filing cabinets, restricting access to offices, and alarm systems);
  • Up-to-date technological tools (e.g., passwords, encryption, firewalls and security patches); and
  • Organizational controls (e.g., security clearances, limiting access, staff training and agreements).

Thales can help your organization comply with PIPEDA.

Best Practice Data Security

Thales is a leader in digital security, and, having helped hundreds of enterprises comply with regulatory regimes around the world, we recommend key best practice data protection technologies called for in virtually every set of regulations. These include:

  • Data access control
  • Encryption and tokenization (pseudonymization) of data at rest
  • Encryption of data in motion
  • Encryption key management
  • Keeping and monitoring user access logs
  • Using hardware security modules (HSMs) for executing encryption processes and protecting encryption keys

Data Access Control

Thales’ CipherTrust Manager enables organizations to limit user access to information systems that contain sensitive Information.

SafeNet Trusted Access is a cloud-based access management service that combines the convenience of cloud and web single sign-on (SSO) with granular access security. By validating identities, enforcing access policies and applying Smart Single Sign-On, organizations can ensure secure, convenient access to numerous cloud applications from one easy-to-navigate console.

Adding SafeNet certificate-based authentication (CBA) smart card solution as an integral part of IT infrastructure, significantly improves client logon security by requiring multi-factor authentication. Adding multiple factors ensures secure login to workstations and enterprise networks, eliminates complex and costly passwords, and significantly reduces help desk calls. The smart card enables easy and reliable visual identification of the card holder and strong communication around corporate identity. Furthermore, the certificate-based solution is fully integrated in a Windows environment when using applications from Microsoft.

With Thales Authentication and Access Management solutions, you can leverage a unified authentication infrastructure for both on-premises and cloud-based services—providing a centralized, comprehensive way to manage all access policies. Users can log into enterprise cloud services such as Office 365, Salesforce.com, or GoogleApps through an organization’s existing SafeNet authentication mechanisms.

Encryption and Tokenization of Data at Rest

CipherTrust Data Security Platform provides key components necessary to implement data-centric security. These include security controls that enable organizations to safeguard and audit the integrity of customer records and information against a broad range of threats to data. Thales data breach protection solutions are transparent to existing operating processes and applications for rapid implementation.

This single platform solution to multiple data breach protection helps organizations meet compliance requirements with low TCO and an easy-to-deploy, centrally managed infrastructure and solution set.

Thales’ CipherTrust Transparent Encryption solution protects data with file and volume level data-at-rest encryption, access controls, and data access audit logging without re-engineering applications, databases, or infrastructure. Deployment of the transparent file encryption software is simple, scalable and fast, with agents installed above the file system on servers or virtual machines to enforce data security and compliance policies. Policy and encryption key management are provided by CipherTrust Manager.

CipherTrust Tokenization dramatically reduces the cost and effort required to comply with security policies and regulatory mandates, such as CCPA. The solution delivers capabilities for database tokenization and dynamic display security. Enterprises can efficiently address their objectives for securing and pseudonymizing sensitive assets—whether they reside in data center, big data, container or cloud environments.

CipherTrust Application Data Protection delivers key management, signing, and encryption services enabling comprehensive protection of files, database fields, big data selections, or data in platform-as-a-service (PaaS) environments. The solution is FIPS 140-2 Level-1 certified, based on the PKCS#11 standard and fully documented with a range of practical, use-case based extensions to the standard. It eliminates the time, complexity, and risk of developing and implementing an in-house encryption and key management solution with development options including a comprehensive traditional software development kit for a wide range of languages and operating systems as well as a collection of RESTful APIs for the broadest platform support.

Encryption of Data in Motion

A powerful safeguard for data in motion, Thales High Speed Encryptors deliver high-assurance certified data in motion encryption capabilities that meet secure network performance demands for real-time low latency and near zero overhead to provide security without compromise for data on the move across the network.

Encryption Key Management

Thales’ CipherTrust Enterprise Key Management unifies and centralizes encryption key management on premises and provides secure key management for data storage solutions. Cloud Key Management products include the CipherTrust Cloud Key Manager for centralized multi-cloud key life cycle visibility and management with FIPS-140-2 secure key storage, and Cloud Bring Your Own Key.

User Access Logs

The CipherTrust Platform’s Security Intelligence logs let your organization identify unauthorized access attempts and build baselines of authorized user access patterns. CipherTrust Security Intelligence integrates with leading security information and event management (SIEM) systems that make this information actionable. The solution allows immediate automated escalation and response to unauthorized access attempts. It also provides all the data needed to specify behavioral patterns required to identify suspicious use by authorized users, as well as for training.

Hardware Security Modules

Thales Luna Hardware Security Modules (HSMs) provide the highest level of encryption security by always storing cryptographic keys in hardware. Thales HSMs provide a secure crypto foundation, because the keys never leave the intrusion-resistant, tamper-evident, FIPS-validated appliance. Strong access controls prevent unauthorized users from accessing sensitive cryptographic material, because all cryptographic operations occur within the HSM. In addition, Thales implements operations that make the deployment of secure HSMs simple, and our HSMs are integrated with SafeNet Crypto Command Center for quick and easy crypto resource partitioning, reporting, and monitoring.

The award winning Thales Data Protection on Demand solution is a cloud-based platform that provides a wide range of cloud HSM and key management services through a simple online marketplace. These include HSM on Demand and Key Management on Demand.

  • Related Resources