Security for Data Transfers Protecting Customer Data.

Slides:



Advertisements
Similar presentations
The Public Order Henry PastorXavier Pissavin International business law.
Advertisements

12-1 Chapter 12 Advanced EHR Functionality © 2012 The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill.
Sandhills Center Encryption Overview for External Recipients
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
1 PRIVACY ISSUES IN THE U.S. – CANADA CROSS BORDER BUSINESS CONTEXT Presented by: Anneli LeGault ACC Greater New York Chapter Compliance Seminar May 19,
Chaffey: Internet Marketing, 2nd edition © Pearson Education Limited 2003 OHT 3.1 Chapter 3 The Internet macro-environment.
EService Partnerships Infoxchange Australia Health Information and Privacy Forum S2S eReferral Service Coordination System.
Part 5:Security Network Security (Access Control, Encryption, Firewalls)
Key Export Documents A supplement to Hill, Chapter 15 This is not required, but can help you understand concepts of “letter of credit,” “draft,” and “bill.
Intra-Company Data Traversal Protecting Customer Data from Parent Company.
Security and Privacy Outline u Needs and Requirements –Personal –Business –Government u Legal Issues u Technological Issues.
Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed.
Electronic Mail Security. Authentication and confidentiality problems Two systems: - PGP (Pretty Good Privacy) - S/MIME (Science Multipurpose Internet.
Contracts. A contract… is any agreement enforceable by law.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
Electronic invoicing in the light of the VAT Directive 2001/115/EC Anna Nordén Conference on the Legal Aspects of an E-Commerce Transaction The Hague 27.
Beyond just & storage and simple document editing.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
Electronic Payments E-payment methods –Credit cards –Electronic funds transfer (EFT) –E-payments Smart cards Digital cash and script Digital checks E-billing.
ENCRYPTION Team 2.0 Pamela Dornan, Thomas Malone, David Kotar, Nayan Thakker, and Eddie Gallon.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
E-Commerce Security Professor: Morteza Anvari Student: Xiaoli Li Student ID: March 10, 2001.
CSCD 218 : DATA COMMUNICATIONS AND NETWORKING 1
Web Security : Secure Socket Layer Secure Electronic Transaction.
ETHICS, POLICY & SECURITY ISSUES
Internet Security. 2 PGP is a security technology which allows us to send that is authenticated and/or encrypted. Authentication confirms the identity.
IPsec IPsec (IP security) Security for transmission over IP networks –The Internet –Internal corporate IP networks –IP packets sent over public switched.
 A Web service is a method of communication between two electronic devices over World Wide Web.
31.1 Chapter 31 Network Security Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Information Technology Acceptable Use Policy The acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree.
Security Using PGP - Prajakta Bahekar. Importance of Security is one of the most widely used network service on Computer Currently .
OBJECTIVES  To understand the concept of Electronic Payment System and its security services.  To bring out solution in the form of applications to.
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
1 PARCC Data Privacy & Security Policy December 2013.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
APEC Privacy Framework “The lack of consumer trust and confidence in the privacy and security of online transactions and information networks is one element.
Legal, Regulations, Investigations, and Compliance Chapter 9 Part 2 Pages 1006 to 1022.
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Data protection—training materials [Name and details of speaker]
Electronic Commerce Semester 1 Term 1 Lecture 14.
Content Introduction History What is Digital Signature Why Digital Signature Basic Requirements How the Technology Works Approaches.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
SSL: Secure Socket Layer By: Mike Weissert. Overview Definition History & Background SSL Assurances SSL Session Problems Attacks & Defenses.
The Contractual Regime of PayPal and Electronic Payments Irene Kull ETAg funding, project 9301.
WIRE TRANSFERS Unauthorized Payment Order
Chapter 5a - Pretty Good Privacy (PGP)
Chapter 3 The Internet macro-environment
East Carolina University
Internet Business Associate v2.0
Security.
CS 465 Secure Last Updated: Nov 30, 2017.
Digital Signature.
netprem.com Postal Registered Mail – by Electronic Means
The introduction and the essential elements of E- Commerce.
Wiretapping and Encryption
Pooja programmer,cse department
Employee Privacy and Privacy of Employee Information
Electronic Mail Security
Chapter -7 CRYPTOGRAPHIC HASH FUNCTIONS
AAP Trainer Module I ACH Primer
Presentation transcript:

Security for Data Transfers Protecting Customer Data

Security for Data Transfers The Business Need Volkswagen Germany (VWAG) Volkswagen Germany (VWAG) wants information on the daily cash position of Volkswagen Credit (VCI-US)

Security for Data Transfers The Problem  How do we protect non-public customer data that is being electronically transmitted from the United States to Germany

Security for Data Transfers Problem Specifics Legal 1. Federal laws have specific rules & guidelines on what type of information is allowed out of the country. 2. US Consumer & Privacy laws must be followed in all cases.

Security for Data Transfers Problem Specifics Data For that information that can be sent: 1. Both parties must agree on data mappings, definitions, and data types. 2. The originating data source is Sybase 3. The receiving data source is Oracle / SAP

Security for Data Transfers Problem Specifics Transport A secure mechanism for transport must be selected that is acceptable to both parties A secure mechanism for transport must be selected that is acceptable to both parties Solution -> Secure FTP was chosen Solution -> Secure FTP was chosen

Security for Data Transfers Problem Specifics Encryption The data must be encrypted to ensure privacy, confidentiality, and integrity for: The data must be encrypted to ensure privacy, confidentiality, and integrity for:  Both the Corporation & Customer Solution: GNU Privacy Guard Solution: GNU Privacy Guard  128-bit Open PGP

Security for Data Transfers Solutions Legal – Adhere to Data privacy & exportation laws Data – Only send what the receiver needs Transport – Compatible for receiver and sender Encryption – Must be secure and standard