Database Reference
In-Depth Information
PII Attributes
Table
Column
TAX_REGISTRATION_
NUMBER
ZX_PARTY_TAX_PROFILE
EXM_EXPENSES
MERCHANT_TAX_REG_NUMBER
EXM_CREDIT_CARD_TRXNS
MERCHANT_TAX_REG_NUMBER
National
Taxpayer
Identifier
JE_ES_MODELO_190_ALL
VENDOR_NIF
EXM_EXPENSES
MERCHANT_TAXPAYER_ID
EXM_CREDIT_CARD_TRXNS
MERCHANT_TAX_ID
It is important to note that California Breach is the law that actually states that the
breach must be notified to consumers if the information was not encrypted. Notice
may be provided in writing, or electronically if the electronic notice is consistent with
federal law regarding electronic records and signatures.
Gartner Research estimates that organizations are being required to spend at least
$90 for each personal electronic record affected by a data security breach. The
Ponemon Institute claims the cost is even higher, reporting that organizations spend
as much as $140 per lost customer record.
Oracle's products and California Breach Law
There are some key technologies to be examined that protect data through
encryption. First among equals is transparent data encryption.
Transparent data encryption
Transparent data encryption enables simple and easy encryption for sensitive data
without requiring users or applications to manage the encryption key. This freedom
can be extremely important when addressing, for example, regulatory compliance
issues. No need to use views to decrypt data, because the data is transparently
decrypted once a user has passed necessary access control checks. Security
administrators have the assurance that the data on disk is encrypted, yet handling
encrypted data becomes transparent to applications. The following diagram shows
the flow from unencrypted to cipher text and back:
Search WWH ::




Custom Search