• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • New State Privacy Laws Clamp Down on Data

    May 4, 2010 Alex Woodie

    Companies that do business in the states of Nevada, Massachusetts, and Washington are some of the first to come under the jurisdiction of new data security laws that require the use of encryption. Backup data that leaves the data center for the purpose of disaster recovery is a big concern for these companies, and SafeData, which provides options for on-site and cloud-based back up, says it can provide the necessary level of encryption for System i shops.

    Washington is the latest state to enact a data security and payment card law covering companies that do business with citizens in the state. The law, which was signed into law in early April and goes into effect July 1, requires companies that originate or process debit or credit card transactions to take “reasonable steps” to prevent a data breach. Experts say this requires the use of encryption technology.

    The Massachusetts Privacy Law, which went into effect January 1, 2010, is expected to become a model law followed by other states. This law, which was enacted because of the continued high rate of identity theft caused by corporate data breaches, requires companies to use encryption when personally identifiable information (PII) is taken outside of a company’s internal systems.

    One state has gone further than any other state: Nevada. The Silver State has taken a leadership position in regards to data security with two laws. The first, called the Nevada Electronic Transmission Encryption Law, went into effect October 1, 2008, and requires the use of encryption for all PII that is transmitted electronically (except for fax). A second Nevada law, which went into effect January 1, 2010, requires all companies in Nevada to comply with the provisions of the Payment Card Industry (PCI) Data Security Standard (DSS), when it comes to card transactions.

    However, Nevada’s second law goes further than PCI DSS and requires the use of encryption technology that is compliant with the National Institute of Standards and Technology (NIST). The PCI standards council is strongly leaning toward requiring NIST-certified encryption software as part of its PCI DSS standard, security experts say.

    SafeData welcomes the new laws, and is ready to help customers comply with them. The vendor, which provides disaster recovery (DR) and high availability (HA) hosting and services for organizations that use the System i server, recently announced that it provides the necessary level of encryption to comply with the new state laws.

    “These laws are essential steps to ensuring the protection of personally identifiable information and I believe more states will pass similar laws in months to come,” states SafeData president Peter Briggs in a press release. “Our SafeData/DR solution ensures that our clients’ data is double encrypted and in compliance with these laws. Our clients can sleep well at night knowing that their data is not at risk of being lost or stolen and maliciously used.”

    SafeData stores backup data from all customers, including System i shops, on its Windows-based SAN infrastructure. The encryption utilized on the SAN is NIST certified, a company spokesperson confirmed.

    RELATED STORIES

    SafeData Delivers Backup Appliance for System i and Windows

    SafeData Makes Backup and Recovery Deal with Omni Solutions

    SafeData Promotes Managed HA in White Paper

    SafeData Now Protects AIX Data, Too

    SafeData White Paper Discusses iSeries Rapid Recovery

    Poor Economy Driving DR Business, SafeData Says



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    DRV Tech

    Get More Out of Your IBM i

    With soaring costs, operational data is more critical than ever. IBM shops need faster, easier ways to distribute IBM applications-based data to users more efficiently, no matter where they are.

    The Problem:

    For Users, IBM Data Can Be Difficult to Get To

    IBM Applications generate reports as spooled files, originally designed to be printed. Often those reports are packed together with so much data it makes them difficult to read. Add to that hardcopy is a pain to distribute. User-friendly formats like Excel and PDF are better, offering sorting, searching, and easy portability but getting IBM reports into these formats can be tricky without the right tools.

    The Solution:

    IBM i Reports can easily be converted to easy to read and share formats like Excel and PDF and Delivered by Email

    Converting IBM i, iSeries, and AS400 reports into Excel and PDF is now a lot easier with SpoolFlex software by DRV Tech.  If you or your users are still doing this manually, think how much time is wasted dragging and reformatting to make a report readable. How much time would be saved if they were automatically formatted correctly and delivered to one or multiple recipients.

    SpoolFlex converts spooled files to Excel and PDF, automatically emailing them, and saving copies to network shared folders. SpoolFlex converts complex reports to Excel, removing unwanted headers, splitting large reports out for individual recipients, and delivering to users whether they are at the office or working from home.

    Watch our 2-minute video and see DRV’s powerful SpoolFlex software can solve your file conversion challenges.

    Watch Video

    DRV Tech

    www.drvtech.com

    866.378.3366

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Botz & Associates, Inc.:  Set up a FREE one hour security Q&A session with Patrick Botz
    BOSaNOVA:  Limited time e-Twinax Controller REBATE for new Power System customers
    Computer Keyes:  KeyesOverlay rapidly converts standard *SCS printer files into PDF documents

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    SMB Customers, BI Projects Lift SAP’s First Quarter In Orlando, Optimism Returns

    Leave a Reply Cancel reply

Volume 10, Number 17 -- May 4, 2010
THIS ISSUE SPONSORED BY:

Help/Systems
PowerTech
Patrick Townsend Security Solutions
BOSaNOVA
VAULT400

Table of Contents

  • IBM Unveils i/OS CMS Upgrades and Migration Promotions
  • PTSS First to Achieve NIST Compliance for DB2/400 Encryption
  • m-Power Gets Better Record Filtering, Other Goodies
  • Bsafe Launches Compliance Software for PCI
  • Aldon Goes 64-Bit with Service Desk Software
  • New State Privacy Laws Clamp Down on Data
  • Unitrends to Add Deduplication to D2D Backup Appliances
  • Datawatch Updates Data Integration Tool for Monarch BI Suite
  • ACOM Adds New Workflow Features to EZCM
  • Zend Studio Gets New Code Tracing Capabilities

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • The Turning Point For Power Systems Is Here, And Now
  • How IBM i Users Can Compete In The Digital Era With Composable Commerce
  • IBM Streamlines Data Migration With New Partition Mirror Tech
  • Profound Logic Adds MCP To IBM i AI Tool
  • IBM i PTF Guide, Volume 27, Number 29
  • Power11 Entry Machines: The Power S1124 And Power L1124
  • BRMS Isn’t The Only Backup Product With A Security Problem
  • Guru: A Faster Way To Sign A JWT
  • Maxis Adds IBM i Support To Database Modernization Tool
  • IBM i PTF Guide, Volume 27, Number 28

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle