Resources

Blog

What Is CUI Basic? Guidelines and Security Measures

Controlled Unclassified Information (CUI) is a sensitive data category that the United States federal government produces or interacts with.
Datasheet

Singapore Personal Data Protection Act

The Singapore Personal Data Protection Act (PDPA) of 2012 establishes a general data protection law governing the collection, use, and disclosure of an individual’s information by an organization. With penalties that target the organization and the individual, PDPA strives to entrench the protection of personal data into the business culture of an organization. The foundation of any data...
Datasheet

Government Security Classification, UK

Comply with Government Security (DCS) Classifications Policy The UK Government Security Classifications (GSC) policy requires that all UK government organizations classify their information assets into one of three types: OFFICIAL, SECRET and TOP SECRET. This simplified classification scheme replaces the previous Government Protective Marking Scheme (GPMS), making it easier for government staff,...
Datasheet

Fortra’s Data Classification Suite – Metadata Powering Your CMMC Solution

Solving for CUICore to the Controlled Unclassified Information (CUI) standards set by NARA (National Archives and Records Administration) are not only the 240 potential CUI markings, but rules on how to apply them, how they should be formatted, as well as display requirements.Additionally, these markings and metadata are meant to be control enablers, allowing other systems like attribute-based...
Datasheet

Fortra, PIPEDA, and you

The Personal Information Protection and Electronic Documents Act (PIPEDA) became law in Canada in April 2000 and has been reviewed and updated every five years since.. The act was also intended to promote consumer trust in electronic commerce and also to reassure the European Union that Canadian privacy laws sufficiently protected the personal information of European citizens. PIPEDA applies to...
Datasheet

California Consumer Privacy Act (CCPA) Compliance

The CCPA bill, passed in 2018, encourages businesses and related entities to be transparent and requires these organizations to report breaches of personal data. The CCPA is more than just a data protection regulation, as it represents a core change in the approach organizations must take to ensure their data remains secure and requires the creation of a data protection strategy for their data. ...
Datasheet

ITAR Compliance with Fortra

The aerospace and defense organizations operate on a global scale and handle data that needs to be protected from competitors as well as foreign military and government organizations. Competitive secrets, disparate customer requirements, and government regulations surrounding the sharing of sensitive information are critical considerations in the aerospace and defense marketplace. The U.S....
Datasheet

NIST SP 800-171 and CUI

Meet Compliance Requirements To Protect Controlled Unclassified InformationOriginally imposed in 2017, NIST Special Publication (SP) 800-171, Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations, requires all current U.S. Department of Defense contractors to be be compliant with DFARS Part 252.204-7012. Other executive branch agencies may also require...
Guide

Three Steps to Protecting PII in the Government

This guide discusses the three key steps that must be taken by government organizations to protect PII they have in their possession.Identify your PII through marking and metadata taggingEducate and build awareness of the organization’s PII among employees, contractors, and partnersSelect the appropriate controls to protect PII...
Guide

Protecting Sensitive ITAR Information: A Data-Centric Approach To Export Control Compliance

ITAR covers the transfer of technical data and information relating to goods, as well as the goods themselves. Technical documents, product plans and specifications, design drawings, manuals and financial details may all need to be shared across the supply chain if an ITAR-related project is to be delivered. However, authority needs to be granted and access by unauthorized persons prohibited or...
Datasheet

Managing Controlled Unclassified Information: The Role Of Data Classification In Meeting U.S. Government Requirements

Introduction After years of deliberation, the U.S. government’s National Archives and Records Administration (NARA) has released more details of its regulation for the protection framework of Controlled Unclassified Information (CUI). The rule is designed to safeguard government data that has not been assigned as confidential or secret, but which...
Guide

The Protective Security Policy Framework (PSPF) – Protecting Government Classified Information

Big data, data governance, data management and securing sensitive data – these are everyday challenges for Australian Government organizations, as well as making sure that sensitive data has the right security labelling applied.In this whitepaper we will explore how the Australian Protective Security Policy Framework is helping government agencies. We will examine Protective Markings, what these...
Guide

Meeting the UK Government Security Classifications (GSC) Requirements

With email the de-facto method of sharing information, government organizations must balance the need to share with the need to protect data from leakage or loss.In an effort to address a problem which is never far from the headlines, the UK Government has revised the requirements in its Government Security Classification (GSC) scheme to ensure information security, privacy and accountability.Our...
Guide

Government Classification and Protective Marking Systems

Big data, data governance, data management and securing sensitive data – these are everyday challenges for government organizations around the world, as well as making sure that sensitive data has the right security labelling applied.In this whitepaper we will explore how classification and protective marking schemes are helping government organizations better secure data. We will delve into...