1TOUCH.io’s purpose-built data privacy technology provides continuous visibility into your organization’s personally identifiable information (PII) usage whether it is known or unknown, structured or unstructured, in motion or at rest…
business value GDPR CCPA protected

BUSINESS Value

Protect your company’s brand and reputation by avoiding regulatory fines and lawsuits.

financial value data GDPR CCPA protected

Financial Value

Maximize your value from personal data usage while minimizing your exposure.

technical value data privacy gdpr ccpa protected

Technical Value

Get proactive, accurate, real-time information with our automated system, so you can focus on your mission-critical projects.

operational value data privacy gdpr protected

Operational Value

Focus your resources on growth instead of regulatory compliance.

TO ENSURE COMPLIANCE WITH GDPR, CCPA AND OTHER DATA PRIVACY REGULATIONS, AN EFFECTIVE PRIVACY PROGRAM REQUIRES THREE CORE ELEMENTS:

Personal Data Inventory

A complete, up-to-date and maintained data inventory to formulate the organization’s information privacy policy. 

Privacy Policy Management

The mapping of business use for each data flow, defined data owners, collecting/processing/storing/
sharing the minimum personal data necessary, monitoring changes, and the tight control of third-party sharing.

Data Protection

The deployment of data protection technologies to ensure the organization is always up-to-date in protecting data.

BLOG

Differential Privacy (DP): This mathematical framework gives the ability to control to what extent the model ‘remembers’ and ‘forgets’ potentially sensitive data, which is its big advantage. The most popular concept of DP is ‘noisy counting’, which is based on drawing samples from Laplace distribution and using them to make the dataset represent augmented values, not the real one. However, the main disadvantage of Differential Privacy is the potential for the attacker to estimate the actual value from the repeated queries. Predictions made by using different private datasets are accurate enough, but with each new query made by the attacker, more and more sensitive information is getting released.

NEWS

1TOUCH.io Offers Image Analysis to Help Organizations Find Personally Identifiable Information

1TOUCH.io, the leading provider of data and privacy management control solutions, announced today the addition of image analysis to its platform, enabling organizations and enterprises to find personally identifiable information (PII) associated with subject photos. 1TOUCH.io is the only data privacy and protection solution on the market to offer this feature.

Using both network-analytics and data interrogation techniques in combination with facial recognition functionality, 1touch.io can scan images on national identification cards, passports, driver’s licenses and similar types of data, extrapolate text and other information associated with those images, and extend that data to existing PII about a subject.