Contact Us

Personal Information Protection and Electronic Documents Act (PIPEDA) Compliance

PIPEDA Compliance Icon

In Canada, the Personal Information Protection and Electronic Documents Act (PIPEDA) establishes laws that regulate the collection, use, and disclosure of personal information by private sector organizations.

The PIPEDA compliance laws state that personal information must be protected by security safeguards appropriate to the sensitivity of the information, including technological measures, such as the use of passwords and encryption.  Fines of up to $100,000 may be assessed for non-compliance with PIPEDA.

Benefits of SafeNet Data Protection Solutions

  • Data is protected at rest, in motion, and in use

  • Centralized policy management and reporting

  • Seamless administration of encrypted data across databases, applications, networks, and endpoint devices

  • Customizable security approach by managing encryption at the field level, which strongly adheres to PIPEDA compliance regulations


Hardware Security Modules

SafeNet hardware security modules (HSMs) provide reliable protection for transactions, identities, and applications by securing cryptographic keys and provisioning encryption, decryption, authentication, and digital signing services.

Learn more about Hardware Security Modules
Database Encryption Icon

ProtectDB offers the highest level of application security available in a commercial encryption solution for business applications like customer relationship management (CRM), enterprise resource planning (ERP), and human capital management (HCM).

Learn More About ProtectDB
ProtectFile Icon

ProtectFile enables you to secure the unstructured data residing on data center servers, encrypting data and controls access to sensitive folders and files kept on the hard drives of local and remote servers, network drives, and file servers.

Learn More About ProtectFile
SafeNet Authentication Token

Multi-factor authentication serves a vital function within any organization -securing access to corporate networks, protecting the identities of users, and ensuring that a user is who he claims to be.

Learn more about Authentication

Featured Resources:

Data Security: The Foundation for Compliance White Paper  

Data Security: The Foundation for Compliance and Reduction of Compliance Spend - White Paper

Enterprises face an overwhelming and constantly growing array of compliance mandates that regulate the management and protection of sensitive data against disclosure, theft, and misuse. With

Read More  
2015 Data Breaches Report  

2015 Data Breaches - Breach Level Index Report

 

In 2015, data breaches got much more personal than in previous years. While cybercriminals made headlines stealing credit card data and financial information in 2013 and 2014, the theft o

Read More  
Compliance Challenges Security Guide  

Security Guide - Compliance Challenges in the Consolidated Data Center

Given the broad and deep proliferation of virtualization technologies, and the ongoing mergers and acquisitions occurring across a range of industries, organizations are increasingly looking

Read More
Protect Sensitive Data Guide  

Protect Your Sensitive Data: A Step-by-Step Guide

In this step-by-step guide, you'll learn how to deploy a unified and efficient data protection platform that can be leveraged to secure all data types residing in or moving between your phys

Read More  

Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  
Comments:  
 


By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.