SlideShare a Scribd company logo
Powered by Apache RangerTM
WEBINAR
CCPA Compliance for Analytics and Data Science
with Privacera and Databricks
February 19, 2020
Srikanth Venkat
Vice President of Product Management
Privacera
Nauman Fakhar
Director of ISV Solutions
Databricks
Today’s Presenters
Total data
Lost Value: Competing Mandates to Comply and Democratize Data
D
A
T
A
V
O
L
U
M
E
Lost value
2018 2020
Captured value
Data that meets
compliance
CCPA: Businesses & Consumers
Collects, shares, buys or sells Annual Revenue over $25M+ 50%+ of revenue from
PI data of 50K+ CA consumers CA
consumers
Receive a copy of the
specific personal
information collected
about them during
preceding 12 months
prior to their request
Right to have their
personal information
deleted (with
exceptions) within
reasonable timeframe
(45 days or less)
What categories of
personal information
collected, the source
and use of the
information, and
disclosed to who?
Right to know a
firm’s data sale
practices and to
request that their
PI not be sold to
3rd parties
Right not to be
discriminated against due
to exercise of CCPA
consumer rights!
FOR PROFIT BUSINESS
CONSUMER
CCPA: Personal Information & Obligations
● CCPA defines personal information broadly
○ “identifies, relates to, describes, is capable of being
associated with, or could reasonably be linked,
directly or indirectly, with a particular consumer or
household”
○ Inferences drawn to create a profile about the
individual to reflect preferences, attitudes, etc.
● Obligation of firms to:
○ Expand and annually update their privacy policy
disclosures
○ Provide on-demand to consumers within 45 days
information requested
○ Delete personal information upon request
○ Stop selling personal information of consumers upon
request
Personal Information (PI) Examples:
➢ Name
➢ Address
➢ Internet protocol address
➢ Email address
➢ Account name
➢ SSN, driver’s license number, passport numbers
➢ Protected classifications under CA or U.S. law
➢ Commercial activity (personal property, products or
services purchased)
➢ Biometric information
➢ Browsing history
➢ Geolocation data
➢ Audio, electronic, visual thermal, olfactory or similar
information
➢ Professional or employment information
➢ Education information
CCPA: Non-Compliance Consequences
● Up to $750 in damages per
consumer per incident or
actual damages, whichever
is greater
● Civil Action with fines by
Attorney General Office upto
$7500 for each intentional
violation, if offense is not
remedied within 30 days!
● Fines and penalties
● Costs for Litigations
● Product modification cost
● Restriction of operations
● Loss of revenue
● Increased insurance
coverage costs
● Loss of Brand image
● Loss of customer trust
● Customer churn
● Loss of employee trust
Unified data analytics platform for accelerating innovation across
data science, data engineering, and business analytics
Original creators of popular data and machine learning open source projects
Global company with 5,000 customers and 450+ partners
Accelerating data-driven
innovation across data
science, data engineering,
and business analytics
RAW DATA LAKE
DATA
SCIENTISTS
ML ENGINEERS DATA ANALYSTS
DATA
ENGINEERS
ENTERPRISE CLOUD SERVICE
A simple, scalable, and secure managed service
UNIFIED DATA SERVICE
High quality data with great performance
DATA SCIENCE WORKSPACE
Collaboration across the lifecycle
BI INTEGRATIONS
Access all your data
UNIFIED DATA ANALYTICS PLATFORM
Compliance - Transactions
Performance - Fast queries at scale
• Ability to delete/update specific rows of data from a cloud
native data lake
• Transaction log tracks history of operations on every Delta
table
• Compaction to optimize file sizes
• Data skipping reads only the relevant data
• Caching increases read throughput by up to 15x
Delta Lake: Adds Reliability & Performance
Reliability - High Quality Data
• Schema enforcement makes data consistent
• Transactions ensure only completed writes are committed
• Time travel maintains versions of data
2012
XA Secure
founded.
XA Secure
acquired by
Hortonworks, open
sourced as
Apache Ranger.
2014
Apache Atlas,
data governance
project incubated
2015
Privacera
founded
2016
Privacera
platform
Generally
Available
2017
Customers
include
multiple
Fortune 100
companies.
Founded in 2016 by the creators of Apache Ranger and Apache Atlas.
Experienced and accomplished innovators in data and cloud governance.
Partner of Amazon Web Services, Microsoft, and Databricks.
2020
Privacera: Leaders in Big Data and Cloud
● Centralized data access governance
platform.
● Works across heterogenous on-
premises and cloud data services.
● Based on open source Apache Ranger
project.
● Breaks data silos and simplifies data
access governance.
Privacera: Centralized Data Access Governance for the Hybrid Cloud
Central
Portal
LDAP/AD
Policy
Database
DatabasesDatabasesHive/Spark
Plug-In Policy Sync
Privacera: Platform Architecture
Cloud/Object Storage
Data Access
Server
Benefits of Privacera Data Access Governance for Hybrid Cloud
For IT and data teams
✓ Single, centralized environment.
✓ Automated sensitive data discovery and
tagging.
✓ Consistent policy creation and
automated enforcement across services.
✓ Comprehensive monitoring, auditing and
compliance reporting.
Benefits of Privacera Data Access Governance for Hybrid Cloud
For data scientists and analysts
✓ Faster, safer access to more data and
data services.
✓ Transparent governance for improved
user experience.
✓ Reduced privacy, security and
compliance risk.
✓ More use cases, better insights, smarter
decisions.
DISCOVER DEFINE ENFORCE REPORT
Privacera: Data Access Governance Lifecycle
DISCOVER DEFINE ENFORCE REPORT
Privacera: Data Access Governance Features
○ Diverse Compatibility: Quickly connect to cloud
storage & databases.
○ Scan & Tag Sensitive Data: Leverage machine
learning, rules to scan and tag sensitive data.
○ Scalable Metadata Storage: Store tags in a truly
scalable metadata store or integrate with 3rd party
data catalogs and associated tags.
DISCOVER DEFINE ENFORCE REPORT
Privacera: Data Access Governance Features
○ Centralized Management: Manage access control
policies for all data sources in a central portal.
○ FGAC: Create fine-grained access control policies
down to the file, row, and column level.
○ Robust Policy Definition: Create role-based,
attribute-based, and tag-based access control
policies.
DISCOVER DEFINE ENFORCE REPORT
Privacera: Data Access Governance Features
○ Heterogeneous Compatibility: Configure
enforcement points across on-premises and cloud
data and analytics services.
○ Simple, Immediate Enforcement: Automate
enforcement of access control policies for all users
across all environments.
DISCOVER DEFINE ENFORCE REPORT
Privacera: Data Access Governance Features
○ Instant Visibility: Quickly generate reports to help
teams get instant visibility on data assets.
○ Seamless Compliance: Generate custom reports to
prove compliance to outside regulators.
○ Comprehensive View of Sensitive Data Risks:
Monitor and audit data access behavior and get alerts
when sensitive data is moved.
CCPA: PI Handling & Processing Best Practices
● PI DATA INVENTORY : CCPA compliance starts with knowing what PI you have
=> Accurate, complete, and up-to-date sensitive data inventory is the foundation for compliance!
○ Review areas where any type of PI can reside (e.g. website, forms at retail locations, mail, email, employment
applications, HR documents, call center recordings, agreements and contracts (vendor or service providers,
landlord/tenant), marketing, CCTV, chatbot data etc.)
○ Identify and categorize or classify all PI with sources
○ Identify purposes for collecting PI data and uses
○ Identify retention period for each category of information to honor deletion requests
○ Identify who has been given access to the information, including 3rd parties via contracts and their use of the
information
○ Identify location of PI in data stores, storage format, and the owner or person(s) responsible for maintaining it
● For Managing Consumer Rights
○ Use de-identified PI data where possible to minimize exfiltration and attribution risk
○ Provide methods for record level deletion and updates across data stores in cloud and data center
○ Use masking, encryption (with removal of keys) and redaction on PI data where complete deletion is not
possible due to legal exceptions or other processing requirements
○ Centralize entitlement, access control, and consent management
CCPA Compliance Demo
CCPA as an Opportunity!
● Automated data security and privacy controls help:
○ reduce risk of manual errors
○ reduce operational complexity
○ improve response times to critical privacy and security incidents
○ avoid costly penalties, positively impacting bottom line
● Integrating a robust privacy program into your business processes
○ Helps build deeper customer engagement and improves business outcomes
○ Improves employee, partner, and customer trust and enhances brand image
and reputation
○ Improves data management practices to enable better and faster insights to
generate top line benefits
Questions?
Submit your questions now or email follow-up
questions to info@privacera.com and either
Srikanth or Nauman will follow up with you.
For more information about Privacera and
Databricks, visit www.privacera.com/databricks.
Thank You
Powered by Apache RangerTM

More Related Content

What's hot (17)

PPTX
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
BigID Inc
 
PDF
Beginning your General Data Protection Regulation (GDPR) Journey
Microsoft Österreich
 
PPTX
GDPR Readiness for Software Usage Analytics
Revulytics Inc.
 
PDF
Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...
Jean-Michel Franco
 
PPTX
Security&Governance
Datio Big Data
 
PDF
Data- and database security & GDPR: end-to-end offer
Capgemini
 
PDF
A Comparison of Analytics and Tag Management Suites by Piwik PRO and Google
Piwik PRO
 
PPTX
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
Cloudera, Inc.
 
PPTX
Ensuring GDPR Compliance - A Zymplify Guide
Zymplify
 
PPTX
Hadoop and Financial Services
Cloudera, Inc.
 
PPTX
GDPR: Your Journey to Compliance
Cobweb
 
PDF
DEFeND Project Presentation - July 2018
DEFeND Project
 
PDF
Are Your Data Ready for GDPR? (with MAPR and Talend)
Jean-Michel Franco
 
PDF
Unlocking Greater Insights with Integrated Data Quality for Collibra
Precisely
 
PPTX
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
IDERA Software
 
PPTX
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Delphix
 
PPTX
Make a case for Data Classification in your organization
Watchful Software
 
Collibra Data Citizen '19 - Bridging Data Privacy with Data Governance
BigID Inc
 
Beginning your General Data Protection Regulation (GDPR) Journey
Microsoft Österreich
 
GDPR Readiness for Software Usage Analytics
Revulytics Inc.
 
Enacting the Data Subjects Access Rights for GDPR with Data Services and Data...
Jean-Michel Franco
 
Security&Governance
Datio Big Data
 
Data- and database security & GDPR: end-to-end offer
Capgemini
 
A Comparison of Analytics and Tag Management Suites by Piwik PRO and Google
Piwik PRO
 
GDPR: 20 Million Reasons to get ready - Part 1: Preparing for compliance
Cloudera, Inc.
 
Ensuring GDPR Compliance - A Zymplify Guide
Zymplify
 
Hadoop and Financial Services
Cloudera, Inc.
 
GDPR: Your Journey to Compliance
Cobweb
 
DEFeND Project Presentation - July 2018
DEFeND Project
 
Are Your Data Ready for GDPR? (with MAPR and Talend)
Jean-Michel Franco
 
Unlocking Greater Insights with Integrated Data Quality for Collibra
Precisely
 
Geek Sync | Tackling Key GDPR Challenges with Data Modeling and Governance
IDERA Software
 
Secure Your Enterprise Data Now and Be Ready for CCPA in 2020
Delphix
 
Make a case for Data Classification in your organization
Watchful Software
 

Similar to CCPA Compliance for Analytics and Data Science Use Cases with Databricks and Privacera (20)

PDF
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Steven Meister
 
PDF
Scaling Privacy in a Spark Ecosystem
Databricks
 
PDF
Privacera and Northwestern Mutual - Scaling Privacy in a Spark Ecosystem
Privacera
 
PDF
Mastering Data Compliance in a Dynamic Business Landscape
Denodo
 
PDF
Where In The World Is Your Sensitive Data?
Druva
 
PPTX
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
Aggregage
 
PDF
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Precisely
 
PDF
Top Questions Asked About the CCPA
Ryan Foster
 
PDF
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
AIIM International
 
PDF
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
dsapps
 
PPTX
U1 - Data Privacy and Compliance Requirements.pptx
KPR Institute of Engineering and Technology
 
PDF
Isaca new delhi india - privacy and big data
Ulf Mattsson
 
PDF
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
Jean-Michel Franco
 
PDF
How to streamline data governance and security across on-prem and cloud?
Privacera
 
PPTX
New opportunities and business risks with evolving privacy regulations
Ulf Mattsson
 
PDF
How to Build a Privacy Program
secratic
 
PPTX
Developing a privacy compliance program
Raoul Miller
 
PDF
Maturing Your Organization's Information Risk Management Strategy
Privacera
 
PPT
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Perficient, Inc.
 
PDF
Isaca new delhi india privacy and big data
Ulf Mattsson
 
Gdpr ccpa steps to near as close to compliancy as possible with low risk of f...
Steven Meister
 
Scaling Privacy in a Spark Ecosystem
Databricks
 
Privacera and Northwestern Mutual - Scaling Privacy in a Spark Ecosystem
Privacera
 
Mastering Data Compliance in a Dynamic Business Landscape
Denodo
 
Where In The World Is Your Sensitive Data?
Druva
 
How to Effectively Equip Your IG Program for the Perilous Journey Into the Fu...
Aggregage
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Precisely
 
Top Questions Asked About the CCPA
Ryan Foster
 
[Webinar Slides] Data Privacy – Learn What It Takes to Protect Your Information
AIIM International
 
API World 2019 Presentation on Securing sensitive data through APIs and AI pa...
dsapps
 
U1 - Data Privacy and Compliance Requirements.pptx
KPR Institute of Engineering and Technology
 
Isaca new delhi india - privacy and big data
Ulf Mattsson
 
3 Steps to Turning CCPA & Data Privacy into Personalized Customer Experiences
Jean-Michel Franco
 
How to streamline data governance and security across on-prem and cloud?
Privacera
 
New opportunities and business risks with evolving privacy regulations
Ulf Mattsson
 
How to Build a Privacy Program
secratic
 
Developing a privacy compliance program
Raoul Miller
 
Maturing Your Organization's Information Risk Management Strategy
Privacera
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Perficient, Inc.
 
Isaca new delhi india privacy and big data
Ulf Mattsson
 
Ad

More from Jeff Kelly (7)

PPTX
Wikibon Barclays Disruptive Tech Call - November 2014
Jeff Kelly
 
PPTX
Wikibon Big Data Capital Markets Day 2014
Jeff Kelly
 
PDF
Democratizing Big Data (Updated)
Jeff Kelly
 
PDF
The business value of Big Data
Jeff Kelly
 
PDF
Big Data and Hadoop - key drivers, ecosystem and use cases
Jeff Kelly
 
PDF
Create your Big Data vision and Hadoop-ify your data warehouse
Jeff Kelly
 
PPTX
Democratizing Big Data
Jeff Kelly
 
Wikibon Barclays Disruptive Tech Call - November 2014
Jeff Kelly
 
Wikibon Big Data Capital Markets Day 2014
Jeff Kelly
 
Democratizing Big Data (Updated)
Jeff Kelly
 
The business value of Big Data
Jeff Kelly
 
Big Data and Hadoop - key drivers, ecosystem and use cases
Jeff Kelly
 
Create your Big Data vision and Hadoop-ify your data warehouse
Jeff Kelly
 
Democratizing Big Data
Jeff Kelly
 
Ad

Recently uploaded (20)

PDF
CloudStack GPU Integration - Rohit Yadav
ShapeBlue
 
PPTX
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
PDF
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
PPTX
Darren Mills The Migration Modernization Balancing Act: Navigating Risks and...
AWS Chicago
 
PPTX
Top Managed Service Providers in Los Angeles
Captain IT
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PPTX
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
PDF
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
PDF
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
PDF
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
PDF
Apache CloudStack 201: Let's Design & Build an IaaS Cloud
ShapeBlue
 
PDF
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
PDF
July Patch Tuesday
Ivanti
 
PDF
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
PDF
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
PPTX
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 
CloudStack GPU Integration - Rohit Yadav
ShapeBlue
 
Building and Operating a Private Cloud with CloudStack and LINBIT CloudStack ...
ShapeBlue
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Smart Air Quality Monitoring with Serrax AQM190 LITE
SERRAX TECHNOLOGIES LLP
 
Predicting the unpredictable: re-engineering recommendation algorithms for fr...
Speck&Tech
 
Darren Mills The Migration Modernization Balancing Act: Navigating Risks and...
AWS Chicago
 
Top Managed Service Providers in Los Angeles
Captain IT
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Top iOS App Development Company in the USA for Innovative Apps
SynapseIndia
 
Human-centred design in online workplace learning and relationship to engagem...
Tracy Tang
 
Why Orbit Edge Tech is a Top Next JS Development Company in 2025
mahendraalaska08
 
The Builder’s Playbook - 2025 State of AI Report.pdf
jeroen339954
 
Apache CloudStack 201: Let's Design & Build an IaaS Cloud
ShapeBlue
 
Empower Inclusion Through Accessible Java Applications
Ana-Maria Mihalceanu
 
July Patch Tuesday
Ivanti
 
Impact of IEEE Computer Society in Advancing Emerging Technologies including ...
Hironori Washizaki
 
Building Resilience with Digital Twins : Lessons from Korea
SANGHEE SHIN
 
Building Search Using OpenSearch: Limitations and Workarounds
Sease
 

CCPA Compliance for Analytics and Data Science Use Cases with Databricks and Privacera

  • 1. Powered by Apache RangerTM WEBINAR CCPA Compliance for Analytics and Data Science with Privacera and Databricks February 19, 2020
  • 2. Srikanth Venkat Vice President of Product Management Privacera Nauman Fakhar Director of ISV Solutions Databricks Today’s Presenters
  • 3. Total data Lost Value: Competing Mandates to Comply and Democratize Data D A T A V O L U M E Lost value 2018 2020 Captured value Data that meets compliance
  • 4. CCPA: Businesses & Consumers Collects, shares, buys or sells Annual Revenue over $25M+ 50%+ of revenue from PI data of 50K+ CA consumers CA consumers Receive a copy of the specific personal information collected about them during preceding 12 months prior to their request Right to have their personal information deleted (with exceptions) within reasonable timeframe (45 days or less) What categories of personal information collected, the source and use of the information, and disclosed to who? Right to know a firm’s data sale practices and to request that their PI not be sold to 3rd parties Right not to be discriminated against due to exercise of CCPA consumer rights! FOR PROFIT BUSINESS CONSUMER
  • 5. CCPA: Personal Information & Obligations ● CCPA defines personal information broadly ○ “identifies, relates to, describes, is capable of being associated with, or could reasonably be linked, directly or indirectly, with a particular consumer or household” ○ Inferences drawn to create a profile about the individual to reflect preferences, attitudes, etc. ● Obligation of firms to: ○ Expand and annually update their privacy policy disclosures ○ Provide on-demand to consumers within 45 days information requested ○ Delete personal information upon request ○ Stop selling personal information of consumers upon request Personal Information (PI) Examples: ➢ Name ➢ Address ➢ Internet protocol address ➢ Email address ➢ Account name ➢ SSN, driver’s license number, passport numbers ➢ Protected classifications under CA or U.S. law ➢ Commercial activity (personal property, products or services purchased) ➢ Biometric information ➢ Browsing history ➢ Geolocation data ➢ Audio, electronic, visual thermal, olfactory or similar information ➢ Professional or employment information ➢ Education information
  • 6. CCPA: Non-Compliance Consequences ● Up to $750 in damages per consumer per incident or actual damages, whichever is greater ● Civil Action with fines by Attorney General Office upto $7500 for each intentional violation, if offense is not remedied within 30 days! ● Fines and penalties ● Costs for Litigations ● Product modification cost ● Restriction of operations ● Loss of revenue ● Increased insurance coverage costs ● Loss of Brand image ● Loss of customer trust ● Customer churn ● Loss of employee trust
  • 7. Unified data analytics platform for accelerating innovation across data science, data engineering, and business analytics Original creators of popular data and machine learning open source projects Global company with 5,000 customers and 450+ partners
  • 8. Accelerating data-driven innovation across data science, data engineering, and business analytics RAW DATA LAKE DATA SCIENTISTS ML ENGINEERS DATA ANALYSTS DATA ENGINEERS ENTERPRISE CLOUD SERVICE A simple, scalable, and secure managed service UNIFIED DATA SERVICE High quality data with great performance DATA SCIENCE WORKSPACE Collaboration across the lifecycle BI INTEGRATIONS Access all your data UNIFIED DATA ANALYTICS PLATFORM
  • 9. Compliance - Transactions Performance - Fast queries at scale • Ability to delete/update specific rows of data from a cloud native data lake • Transaction log tracks history of operations on every Delta table • Compaction to optimize file sizes • Data skipping reads only the relevant data • Caching increases read throughput by up to 15x Delta Lake: Adds Reliability & Performance Reliability - High Quality Data • Schema enforcement makes data consistent • Transactions ensure only completed writes are committed • Time travel maintains versions of data
  • 10. 2012 XA Secure founded. XA Secure acquired by Hortonworks, open sourced as Apache Ranger. 2014 Apache Atlas, data governance project incubated 2015 Privacera founded 2016 Privacera platform Generally Available 2017 Customers include multiple Fortune 100 companies. Founded in 2016 by the creators of Apache Ranger and Apache Atlas. Experienced and accomplished innovators in data and cloud governance. Partner of Amazon Web Services, Microsoft, and Databricks. 2020 Privacera: Leaders in Big Data and Cloud
  • 11. ● Centralized data access governance platform. ● Works across heterogenous on- premises and cloud data services. ● Based on open source Apache Ranger project. ● Breaks data silos and simplifies data access governance. Privacera: Centralized Data Access Governance for the Hybrid Cloud
  • 12. Central Portal LDAP/AD Policy Database DatabasesDatabasesHive/Spark Plug-In Policy Sync Privacera: Platform Architecture Cloud/Object Storage Data Access Server
  • 13. Benefits of Privacera Data Access Governance for Hybrid Cloud For IT and data teams ✓ Single, centralized environment. ✓ Automated sensitive data discovery and tagging. ✓ Consistent policy creation and automated enforcement across services. ✓ Comprehensive monitoring, auditing and compliance reporting.
  • 14. Benefits of Privacera Data Access Governance for Hybrid Cloud For data scientists and analysts ✓ Faster, safer access to more data and data services. ✓ Transparent governance for improved user experience. ✓ Reduced privacy, security and compliance risk. ✓ More use cases, better insights, smarter decisions.
  • 15. DISCOVER DEFINE ENFORCE REPORT Privacera: Data Access Governance Lifecycle
  • 16. DISCOVER DEFINE ENFORCE REPORT Privacera: Data Access Governance Features ○ Diverse Compatibility: Quickly connect to cloud storage & databases. ○ Scan & Tag Sensitive Data: Leverage machine learning, rules to scan and tag sensitive data. ○ Scalable Metadata Storage: Store tags in a truly scalable metadata store or integrate with 3rd party data catalogs and associated tags.
  • 17. DISCOVER DEFINE ENFORCE REPORT Privacera: Data Access Governance Features ○ Centralized Management: Manage access control policies for all data sources in a central portal. ○ FGAC: Create fine-grained access control policies down to the file, row, and column level. ○ Robust Policy Definition: Create role-based, attribute-based, and tag-based access control policies.
  • 18. DISCOVER DEFINE ENFORCE REPORT Privacera: Data Access Governance Features ○ Heterogeneous Compatibility: Configure enforcement points across on-premises and cloud data and analytics services. ○ Simple, Immediate Enforcement: Automate enforcement of access control policies for all users across all environments.
  • 19. DISCOVER DEFINE ENFORCE REPORT Privacera: Data Access Governance Features ○ Instant Visibility: Quickly generate reports to help teams get instant visibility on data assets. ○ Seamless Compliance: Generate custom reports to prove compliance to outside regulators. ○ Comprehensive View of Sensitive Data Risks: Monitor and audit data access behavior and get alerts when sensitive data is moved.
  • 20. CCPA: PI Handling & Processing Best Practices ● PI DATA INVENTORY : CCPA compliance starts with knowing what PI you have => Accurate, complete, and up-to-date sensitive data inventory is the foundation for compliance! ○ Review areas where any type of PI can reside (e.g. website, forms at retail locations, mail, email, employment applications, HR documents, call center recordings, agreements and contracts (vendor or service providers, landlord/tenant), marketing, CCTV, chatbot data etc.) ○ Identify and categorize or classify all PI with sources ○ Identify purposes for collecting PI data and uses ○ Identify retention period for each category of information to honor deletion requests ○ Identify who has been given access to the information, including 3rd parties via contracts and their use of the information ○ Identify location of PI in data stores, storage format, and the owner or person(s) responsible for maintaining it ● For Managing Consumer Rights ○ Use de-identified PI data where possible to minimize exfiltration and attribution risk ○ Provide methods for record level deletion and updates across data stores in cloud and data center ○ Use masking, encryption (with removal of keys) and redaction on PI data where complete deletion is not possible due to legal exceptions or other processing requirements ○ Centralize entitlement, access control, and consent management
  • 22. CCPA as an Opportunity! ● Automated data security and privacy controls help: ○ reduce risk of manual errors ○ reduce operational complexity ○ improve response times to critical privacy and security incidents ○ avoid costly penalties, positively impacting bottom line ● Integrating a robust privacy program into your business processes ○ Helps build deeper customer engagement and improves business outcomes ○ Improves employee, partner, and customer trust and enhances brand image and reputation ○ Improves data management practices to enable better and faster insights to generate top line benefits
  • 23. Questions? Submit your questions now or email follow-up questions to [email protected] and either Srikanth or Nauman will follow up with you. For more information about Privacera and Databricks, visit www.privacera.com/databricks.
  • 24. Thank You Powered by Apache RangerTM