Related Articles
Data Masking
The process of de-identifying; anonymizing, or otherwise obscuring data so that the structure remains the same, but the content is no longer sensitive, in order to generate a data set that does not allow to the viewer to see the ‘masked’ confidential ...
Shadow Data
Data which is being recorded over the Internet through channels like email, social media, Web browsing and online transactions, and indirectly via point-of-sale terminals, and mobile GPS. It is created when an individual sends an email, updates a ...
Data Wipe
Use of a special software to remove information from compatible hard drives. This software may be included with the purchase of your device, or you may have to search for software compatible with your device to ensure proper data destruction. Most ...
Data Breach
The unauthorized viewing, unauthorized acquisition, accidental publication, or loss of personally information data that compromises its security, confidentiality, or integrity, and which may lead to the accidental or unlawful use, destruction, loss, ...
Data Classification
A scheme that provides the basis for managing access to, and protection of, data assets.