Filter by Category

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

Secured ComputerHighly sensitive data is frequently exchanged between organizations.

For instance, a business will routinely transmit financial information to their bank including payroll direct deposits and ACH payments. These transactions likely contain sensitive elements like bank account numbers, routing numbers, social security numbers, and payment details.

Industry-specific transactions may also contain highly sensitive data. For example, in the health care business, patient records are regularly exchanged between hospitals, doctors and payment providers. In the insurance business, policy information is often transmitted between carriers. This information may contain names, addresses, birth dates, social security numbers and other private information.

Loss of sensitive data can result in great financial expense, lawsuits and public embarrassment for the affected organization. Therefore it is no surprise that industries are setting new regulations and standards to address the security of their data. For instance:

  • PCI DSS requires that credit card numbers are encrypted while "at rest" and "in motion."  Failure to do so can result in severe fines and potential loss of your merchant account. Learn more >
  • HIPAA requires that healthcare records are secured to protect the privacy of patients. Learn more >
  • The GDPR requires organizations that offer services to EU residents meet several privacy rules that relate to data portability, data breach notification, inventory, and more. Learn more >
  • State privacy laws require that customers are notified if their personal information may have been lost or stolen. Some states will also assess large fines against organizations if this data is not protected properly.

Organizations should consider compliance requirements and privacy laws when looking for a managed file transfer (MFT) solution. An effective solution should have a number of encryption methods available to protect sensitive data including SSL, SSH, AES, and OpenPGP encryption. Audit trails should also be in place to track file transfer activity so you can easily determine what files are being sent, what time they are sent, who the sender and receiver is, and so on.

If you're looking for a comprehensive solution, GoAnywhere MFT can do all these things and more. You can learn about the compliance requirements and regulations we help with on our compliance page

 

 

Add a Comment

Allowed tags: <b><i><br>

Latest Posts


What Do Industry Professionals Think of Cloud Security? Get the 2018 Guide

June 18, 2018

Whether you’re considering a public cloud deployment or already exist in some form of hybrid environment, you’re probably trying to keep a pulse on the ever-evolving topic of cloud…


Introducing GoAnywhere MFT 5.7: New Cloud Integrations and Other Features

June 15, 2018

The latest version of our secure managed file transfer solution is live! Today GoAnywhere MFT 5.7 released with a variety of new features and updates, including brand-new Cloud Connectors,…


20 Managed File Transfer Project Ideas (Plus Survey Results)

June 6, 2018

Earlier this year, HelpSystems surveyed nearly 200 GoAnywhere MFT users to see how they use managed file transfer software in their organizations. The responses we received from our customers were…


Tradeshow Recap: Exploring Cloud File Transfer at Red Hat Summit 2018

May 21, 2018

Last week marked the first year for GoAnywhere as an exhibitor at Red Hat Summit in San Francisco. The three-day conference was a whirlwind of activity, great conversations, and opportunities to…


3 Reasons to Attend VMUG's June 7 Virtual Event

May 17, 2018

Whether you’re already using VMware to manage multiple virtual machines in one console, or you’re just getting started with datacenter virtualization, staying on top of trends, changes,…