PIPEDA Compliance

PIPEDA Compliance


In Canada, the Personal Information Protection and Electronic Documents Act (PIPEDA) establishes laws that regulate the collection, use, and disclosure of personal information by private sector organizations.

The PIPEDA compliance laws state that personal information must be protected by security safeguards appropriate to the sensitivity of the information, including technological measures, such as the use of passwords and encryption.  Fines of up to $100,000 may be assessed for non-compliance with PIPEDA.

Benefits of SafeNet Data Protection Solutions

  • Data is protected at rest, in motion, and in use

  • Centralized policy management and reporting

  • Seamless administration of encrypted data across databases, applications, networks, and endpoint devices

  • Customizable security approach by managing encryption at the field level, which strongly adheres to PIPEDA compliance regulations

  • Hardware Security Modules
  • Database & file Encrption
  • Multi-Factor Authentication

SafeNet hardware security modules (HSMs) provide reliable protection for transactions, identities, and applications by securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services.

Learn more about Hardware Security Modules


Database Encryption

ProtectDB offers the highest level of application security available in a commercial encryption solution for business applications like customer relationship management (CRM), enterprise resource planning (ERP), and human capital management (HCM).

Learn More About ProtectDB


File Encryption 

ProtectFile enables you to secure the unstructured data residing on data center servers, encrypting data and controls access to sensitive folders and files kept on the hard drives of local and remote servers, network drives, and file servers.

Learn More About ProtectFile


Multi-factor authentication serves a vital function within any organization -securing access to corporate networks, protecting the identities of users, and ensuring that a user is who he claims to be.

Learn more about Authentication