Filter by Category

Meeting Compliance Regulations and Privacy Laws for Sensitive Data Transfers

Secured ComputerHighly sensitive data is frequently exchanged between organizations.

For instance, a business will routinely transmit financial information to their bank including payroll direct deposits and ACH payments. These transactions likely contain sensitive elements like bank account numbers, routing numbers, social security numbers, and payment details.

Industry-specific transactions may also contain highly sensitive data. For example, in the health care business, patient records are regularly exchanged between hospitals, doctors and payment providers. In the insurance business, policy information is often transmitted between carriers. This information may contain names, addresses, birth dates, social security numbers and other private information.

Loss of sensitive data can result in great financial expense, lawsuits and public embarrassment for the affected organization. Therefore it is no surprise that industries are setting new regulations and standards to address the security of their data. For instance:

  • PCI DSS requires that credit card numbers are encrypted while "at rest" and "in motion."  Failure to do so can result in severe fines and potential loss of your merchant account. Learn more >
  • HIPAA requires that healthcare records are secured to protect the privacy of patients. Learn more >
  • The GDPR requires organizations that offer services to EU residents meet several privacy rules that relate to data portability, data breach notification, inventory, and more. Learn more >
  • State privacy laws require that customers are notified if their personal information may have been lost or stolen. Some states will also assess large fines against organizations if this data is not protected properly.

Organizations should consider compliance requirements and privacy laws when looking for a managed file transfer (MFT) solution. An effective solution should have a number of encryption methods available to protect sensitive data including SSL, SSH, AES, and Open PGP encryption. Audit trails should also be in place to track file transfer activity so you can easily determine what files are being sent, what time they are sent, who the sender and receiver is, and so on.

If you're looking for a comprehensive solution, GoAnywhere MFT can do all these things and more. You can learn about the compliance requirements and regulations we help with on our compliance page

 

Add a Comment

Allowed tags: <b><i><br>

Latest Posts


The Pros and Cons of Open Source Managed File Transfer Software

April 24, 2019

There comes a day for many companies when it’s time to implement a managed file transfer (MFT) solution. Perhaps there are new compliance requirements to meet, new relationships with third…


Will Brexit Impact Your Data Transfers?

April 23, 2019

The Current Situation: The United Kingdom and European Union have agreed on the text of the Brexit withdrawal agreement, but it will only get the go-ahead if the European Parliament and UK…


Which is Better: AS2 vs. SFTP?

April 15, 2019

Over the last several months, we’ve compared many different file transfer protocols, including SFTP vs. FTPS and SFTP vs. MFT, and MFT vs. Dropbox for secure file sharing. Today, we’re…


Who’s Leading the Managed File Transfer Data Quadrant?

April 4, 2019

For most IT professionals, finding credible, third-party evaluations is critical when researching new software solutions. You want the most comprehensive, honest information you can find to help you…


PGP vs. GPG: What's the Difference?

March 28, 2019

PGP, GPG, GnuPG, Open PGP. These terms file under the same category but refer to slightly different things. If you’re wondering what they mean or what the difference is between them, especially…