Resources

Datasheet

Protection of Personal Information Act, South Africa (POPIA)

Meet Compliance Requirements to Protect Personal Information in South Africa The mandate of South Africa’s Protection of Personal Information Act (POPIA) is to regulate the processing of personal information. With this Act, data breaches need to be reported by law. Organizations need to develop a clear data protection plan to build trust with customers, drive business growth,...
Datasheet

Fortra’s Data Classification Suite Deployment Options

On-premises deployment While many industries are turning to the cloud for digital transformation, some organizations are not yet ready to deploy their highly sensitive data to the cloud and continue to choose on-premises. There are several reasons why an organization might choose on-premises deployment, including: Organizational/regional requirements: Depending on industry...
Datasheet

Australian Prudential Regulation Authority (APRA) Prudential Standard CPS 234

Fortra’s Data Classification Suite (DCS) helps organizations across the finance and insurance sectors meet the information security regulations mandated by the Australian Prudential Regulation Authority (APRA) Prudential Standard CPS 234. Noncompliance with APRA can result in substantial fines as well as legal risks and damage to your organization’s reputation. A data breach...
Datasheet

Australian Privacy Act – Privacy Amendment Fact Sheet

Protect personal data and avoid financial penalties and reputational damage in the face of constantly evolving privacy legislation. Privacy laws are front and center for most countries in 2022, and Australia is no exception. The Australian Privacy Act addresses the management and handling of personal data. It applies to any organization that holds data on Australian citizens,...
Datasheet

Fortra Data Classification Solutions Overview

Secure Your Information, So People Can Work with Confidence Data is everywhere and protecting it is becoming more difficult than ever. Fortra Data Classification enables you to establish a policy driven foundation that helps you identify and classify sensitive data at creation, in motion, or at rest and apply the right security policy to protect it. Data Protection That Works...