Resources

Guide

Achieving Compliance with India’s Personal Data Protection Act

India's Digital Personal Data Protection (DPDP) Act is a ground-breaking legislation that balances the rights of individuals to protect their personal data with the necessity of processing such data for lawful purposes. The Act imposes obligations on Data Fiduciaries, those processing data, and outlines the rights and duties of Data Principals, individuals to whom the data pertains. It also...
Guide

Protecting Sensitive ITAR Information: A Data-Centric Approach To Export Control Compliance

ITAR covers the transfer of technical data and information relating to goods, as well as the goods themselves. Technical documents, product plans and specifications, design drawings, manuals and financial details may all need to be shared across the supply chain if an ITAR-related project is to be delivered. However, authority needs to be granted and access by unauthorized persons prohibited or...
Guide

Meeting CUI Requirements with Fortra’s Data Classification Suite Solutions

Established by Executive Order 13556, the Controlled Unclassified Information (CUI) program defines a uniform policy for the treatment of unclassified information that requires safeguarding or dissemination controls. The CUI Executive Order specifically adopts, defines, and institutes CUI as the single designation for all information formerly designated by Sensitive but Unclassified (SBU), For...
Guide

Integrating Information Labelling and Microsoft AD RMS

This guide will examine the challenges of content protection and user acceptance of this technology.It provides an overview of Microsoft’s Active Directory Rights Management Services (AD RMS) and its integration with Fortra Data Classification. This combination provides a powerful and intuitive solution for policy compliance and information protection....
Guide

Enhancing Microsoft MIP In An Era Of Enhanced Regulatory Obligation

The data protection landscape and compliance environment has changed significantly with the implementation of GDPR, and the many other privacy regulations that have followed suit. It is no longer about what organizations think they need to be doing in order to control their data, but what they are being told they need to do by regulators.Some vendors today offer “one-size-fits-all” security...