Filter by Category

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

Secured ComputerHighly sensitive data is frequently exchanged between organizations.

For instance, a business will routinely transmit financial information to their bank including payroll direct deposits and ACH payments. These transactions likely contain sensitive elements like bank account numbers, routing numbers, social security numbers, and payment details.

Industry-specific transactions may also contain highly sensitive data. For example, in the health care business, patient records are regularly exchanged between hospitals, doctors and payment providers. In the insurance business, policy information is often transmitted between carriers. This information may contain names, addresses, birth dates, social security numbers and other private information.

Loss of sensitive data can result in great financial expense, lawsuits and public embarrassment for the affected organization. Therefore it is no surprise that industries are setting new regulations and standards to address the security of their data. For instance:

  • PCI DSS requires that credit card numbers are encrypted while "at rest" and "in motion."  Failure to do so can result in severe fines and potential loss of your merchant account. Learn more >
  • HIPAA requires that healthcare records are secured to protect the privacy of patients. Learn more >
  • The GDPR requires organizations that offer services to EU residents meet several privacy rules that relate to data portability, data breach notification, inventory, and more. Learn more >
  • State privacy laws require that customers are notified if their personal information may have been lost or stolen. Some states will also assess large fines against organizations if this data is not protected properly.

Organizations should consider compliance requirements and privacy laws when looking for a managed file transfer (MFT) solution. An effective solution should have a number of encryption methods available to protect sensitive data including SSL, SSH, AES, and Open PGP encryption. Audit trails should also be in place to track file transfer activity so you can easily determine what files are being sent, what time they are sent, who the sender and receiver is, and so on.

If you're looking for a comprehensive solution, GoAnywhere MFT can do all these things and more. You can learn about the compliance requirements and regulations we help with on our compliance page

Latest Posts


How Do I Securely Share and Send Large Files?

June 30, 2020

The biggest danger of passing notes in grade school was interception by your teacher (or a box checked “no”) but sending large files these days carries a lot more risk. Messages that you’re…


How a Data Security Breach Puts Your Organization at Risk

June 25, 2020

Data breaches are, unfortunately for organizations everywhere, becoming likely events rather than worst-case scenarios, as more and more organizations are learning. There are a variety of safeguards…


Do You Need an MFT Agent?

June 23, 2020

Do You Need an MFT Agent?Put your dark sunglasses away. An MFT agent is not going to negotiate a multi-million-dollar deal or book you on that late-night talk show. An MFT agent will, however,…


What's the Difference? AS3 vs. AS4

June 16, 2020

If you have ever delved into the Applicability Statement family tree, you may know that AS3 and AS4 don’t have much in common. But what makes these two ostensibly sequential protocols similar, and…