1TOUCH.io’s purpose-built data privacy technology provides continuous visibility into your organization’s personally identifiable information (PII) usage whether it is known or unknown, structured or unstructured, in motion or at rest…

business value GDPR CCPA protected

BUSINESS Value

Protect your company’s brand and reputation by avoiding regulatory fines and lawsuits.

financial value data GDPR CCPA protected

Financial Value

Maximize your value from personal data usage while minimizing your exposure.

technical value data privacy gdpr ccpa protected

Technical Value

Get proactive, accurate, real-time information with our automated system, so you can focus on your mission-critical projects.

operational value data privacy gdpr protected

Operational Value

Focus your resources on growth instead of regulatory compliance.

TO ENSURE COMPLIANCE WITH GDPR, CCPA AND OTHER DATA PRIVACY REGULATIONS, AN EFFECTIVE PRIVACY PROGRAM REQUIRES THREE CORE ELEMENTS:

Personal Data Inventory

A complete, up-to-date and maintained data inventory to formulate the organization’s information privacy policy. 

Privacy Policy Management

The mapping of business use for each data flow, defined data owners, collecting/processing/storing/
sharing the minimum personal data necessary, monitoring changes, and the tight control of third-party sharing.

Data Protection

The deployment of data protection technologies to ensure the organization is always up-to-date in protecting data.

SPOTLIGHT

1TOUCH.io RSA Ready certification with RSA Archer® Suite offers mutual customers a network-based approach to discovery, mapping and tracking of personal data. This partnership enables organizations to:

  • Automate the gathering of information to inventory all network elements and repositories that store, process or share personal data.
  • Identify changes in Data Lifecycle Management, such as new repositories and 3rd parties.
  • Identify data flows to assist with compliance, security documentation and 3rd parties.

BLOG

Dear CISO: Who is Responsible for Data Privacy?

In Theory: The legal team/DPO should lead the privacy policy as well as manage direct interaction with data subjects. such as DSAR management. Security should lead the implementation of the privacy policy, including how to create, monitor, and protect the organization's personal data inventory.

And in practice? Read here to find out..

CISO data privacy protected gdpr ccpa analysis

NEWS

A New Approach to Personal Data Discovery

Why do we seem to emulate the ostrich and put our heads in the sand when it comes to Personally Identifiable Information (PII) discovery? Every other technology throughout history that I can think of has undergone multiple phases of evolution, including anti-virus, perimeter security, cell phones, the car – I could go on.

So please forgive me when I say that I find it incredulous that the current standard offerings that address PII discovery, where the GDPR non-compliance punishments are so severe, that we are stuck with antiquated solutions and methods of PII discovery? Read here about why companies are adopting the network analytics approach to keep their Personal Data Inventory up-to-date.