• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • New State Privacy Laws Clamp Down on Data

    May 4, 2010 Alex Woodie

    Companies that do business in the states of Nevada, Massachusetts, and Washington are some of the first to come under the jurisdiction of new data security laws that require the use of encryption. Backup data that leaves the data center for the purpose of disaster recovery is a big concern for these companies, and SafeData, which provides options for on-site and cloud-based back up, says it can provide the necessary level of encryption for System i shops.

    Washington is the latest state to enact a data security and payment card law covering companies that do business with citizens in the state. The law, which was signed into law in early April and goes into effect July 1, requires companies that originate or process debit or credit card transactions to take “reasonable steps” to prevent a data breach. Experts say this requires the use of encryption technology.

    The Massachusetts Privacy Law, which went into effect January 1, 2010, is expected to become a model law followed by other states. This law, which was enacted because of the continued high rate of identity theft caused by corporate data breaches, requires companies to use encryption when personally identifiable information (PII) is taken outside of a company’s internal systems.

    One state has gone further than any other state: Nevada. The Silver State has taken a leadership position in regards to data security with two laws. The first, called the Nevada Electronic Transmission Encryption Law, went into effect October 1, 2008, and requires the use of encryption for all PII that is transmitted electronically (except for fax). A second Nevada law, which went into effect January 1, 2010, requires all companies in Nevada to comply with the provisions of the Payment Card Industry (PCI) Data Security Standard (DSS), when it comes to card transactions.

    However, Nevada’s second law goes further than PCI DSS and requires the use of encryption technology that is compliant with the National Institute of Standards and Technology (NIST). The PCI standards council is strongly leaning toward requiring NIST-certified encryption software as part of its PCI DSS standard, security experts say.

    SafeData welcomes the new laws, and is ready to help customers comply with them. The vendor, which provides disaster recovery (DR) and high availability (HA) hosting and services for organizations that use the System i server, recently announced that it provides the necessary level of encryption to comply with the new state laws.

    “These laws are essential steps to ensuring the protection of personally identifiable information and I believe more states will pass similar laws in months to come,” states SafeData president Peter Briggs in a press release. “Our SafeData/DR solution ensures that our clients’ data is double encrypted and in compliance with these laws. Our clients can sleep well at night knowing that their data is not at risk of being lost or stolen and maliciously used.”

    SafeData stores backup data from all customers, including System i shops, on its Windows-based SAN infrastructure. The encryption utilized on the SAN is NIST certified, a company spokesperson confirmed.

    RELATED STORIES

    SafeData Delivers Backup Appliance for System i and Windows

    SafeData Makes Backup and Recovery Deal with Omni Solutions

    SafeData Promotes Managed HA in White Paper

    SafeData Now Protects AIX Data, Too

    SafeData White Paper Discusses iSeries Rapid Recovery

    Poor Economy Driving DR Business, SafeData Says



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags:

    Sponsored by
    ARCAD Software

    [Live Webinar] Rewrite your Synon in Java? It could be… a mistake!

    Converting from Synon CA 2E to a modern language? There are many good reasons to take this step. Beyond the critical shortage of Synon skills, applications developed in this 4GL environment can no longer take advantage of key technology advances in the IBM i operating system. And though a leader in its day, the Synon CASE tool is incompatible with modern DevOps practices and concurrent development.

    Do you think the best way to move away from Synon CA 2E is by rewriting everything in Java?

    Think again. A full rewrite is risky, expensive, and slow — often leading to years of redevelopment and countless functional regressions.

    Join Philippe Magne, CEO of ARCAD Software and Ray Bernardi, senior solution architect to learn why a conversion to Free Form RPG is a risk-free and high-performance option that leverages the architecture of the original Synon application – retaining all the reliability and security advantages of the host platform.

    In our Webinar, we will share a secure, automated migration path for business applications developed in Synon CA 2E:

    • 100% automated conversion to modern Free Form RPG and DDL (SQL)
    • Guaranteed conversion accuracy with test automation process
    • Possible modernization of the user interface during the project
    • Risk free, fixed price Modernization as a Service (MaaS)
    • Modern full DevOps framework for delivery

    Leverage the competitive advantage within your Synon application.

    Register Today!

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Sponsored Links

    Botz & Associates, Inc.:  Set up a FREE one hour security Q&A session with Patrick Botz
    BOSaNOVA:  Limited time e-Twinax Controller REBATE for new Power System customers
    Computer Keyes:  KeyesOverlay rapidly converts standard *SCS printer files into PDF documents

    IT Jungle Store Top Book Picks

    Easy Steps to Internet Programming for AS/400, iSeries, and System i: List Price, $49.95
    The iSeries Express Web Implementer's Guide: List Price, $49.95
    The System i RPG & RPG IV Tutorial and Lab Exercises: List Price, $59.95
    The System i Pocket RPG & RPG IV Guide: List Price, $69.95
    The iSeries Pocket Database Guide: List Price, $59.00
    The iSeries Pocket SQL Guide: List Price, $59.00
    The iSeries Pocket Query Guide: List Price, $49.00
    The iSeries Pocket WebFacing Primer: List Price, $39.00
    Migrating to WebSphere Express for iSeries: List Price, $49.00
    Getting Started With WebSphere Development Studio Client for iSeries: List Price, $89.00
    Getting Started with WebSphere Express for iSeries: List Price, $49.00
    Can the AS/400 Survive IBM?: List Price, $49.00
    Chip Wars: List Price, $29.95

    SMB Customers, BI Projects Lift SAP’s First Quarter In Orlando, Optimism Returns

    Leave a Reply Cancel reply

Volume 10, Number 17 -- May 4, 2010
THIS ISSUE SPONSORED BY:

Help/Systems
PowerTech
Patrick Townsend Security Solutions
BOSaNOVA
VAULT400

Table of Contents

  • IBM Unveils i/OS CMS Upgrades and Migration Promotions
  • PTSS First to Achieve NIST Compliance for DB2/400 Encryption
  • m-Power Gets Better Record Filtering, Other Goodies
  • Bsafe Launches Compliance Software for PCI
  • Aldon Goes 64-Bit with Service Desk Software
  • New State Privacy Laws Clamp Down on Data
  • Unitrends to Add Deduplication to D2D Backup Appliances
  • Datawatch Updates Data Integration Tool for Monarch BI Suite
  • ACOM Adds New Workflow Features to EZCM
  • Zend Studio Gets New Code Tracing Capabilities

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Bang For The Buck On Entry Power10 And Power11 Machines
  • A Hardware Refresh Is The Perfect Time To Re-Evaluate Your HA/DR Strategy
  • Fresche Taps AI For New RPG-To-Java Conversion Tool
  • Gartner Raises 2025 IT Spending Forecast, Puts Out 2026 Prediction
  • IBM i PTF Guide, Volume 27, Number 45
  • EvolveWare Makes Progress With RPG Code Modernization Using AI
  • Why The IBM i Market Needed Another VTL Option
  • What Price Power?
  • Cloud Revenues Saved By The GenAI Boom
  • IBM i PTF Guide, Volume 27, Number 44

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle