PIPEDA Compliance with CREDANT
Fulfill PIPEDA Requirements With Endpoint Data Protection
Enacted in April 2000 and implemented in stages through 2004, Canada’s Personal Information Protection and Electronic Documents Act (PIPEDA) governs how private-sector organizations collect, use and disclose personal information in the course of commercial business. Enacted in April 2000 and effective January 2004, PIPEDA also governs the use of electronic documents as noted by Section 5, Principle 7 – Safeguards, specifically that “Organizations shall protect personal information regardless of the format in which it is held.”
The act clarifies the rights of individuals regarding their personal information. Among the requirements for organizations are a mandate to obtain consent before using an individual’s information, explaining why the organization uses their information, and keeping their information accurate and protected. PIPEDA also explains the right to complain about privacy violations.
As with all privacy regulations, PIPEDA includes some exceptions, including when information can be obtained without consent and which areas of Canada are not bound by PIPEDA.
CREDANT: Proven Data Security Solutions
Compliance with PIPEDA can be confusing. That’s why it’s essential to partner with a proven, experienced solution provider in the field of data security. Through hundreds of customer engagements, CREDANT has proven experience in helping organizations around the globe to meet data encryption and compliance requirements.
CREDANT Enterprise Edition helps organizations can meet and prove PIPEDA compliance by:
- Encrypting data no matter where it resides, including on laptops, desktops, USB drives and CDs/DVDs
- Securing data across multiple platforms from a single console
- Creating automatic audit trails
How CREDANT Delivers Flexible Data Protection Solutions
CREDANT provides centrally managed, highly scalable and architecturally flexible security to manage all data endpoints and:
- Prevent users from placing data in unencrypted areas
- Provide confidentiality, privacy and auditing of data on any endpoint device
- Protect sensitive data from unwarranted access and reduce the risk of internal breaches
- Deliver options for data encryption across endpoint devices, full disk encryption, or a combination of both