Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Content Protection
Predefined Policies and Classifiers | Forcepoint DLP | 8.8
Forcepoint DLP includes the following types of content protection policies:
*
*
*
*
*
Company Confidential and Intellectual Property (IP)
Predefined Policies and Classifiers | Forcepoint DLP | 8.8
The following predefined policies are available for the detection of company confidential or intellectual property data:
*
Policy for detecting bids, proposals, and tenders, such as responses to request for proposal (RFP) and invitation for bids (IFB) documents.
*
*
*
*
Policy for detection of business and technical drawing file types. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of sensitive text in the header or footer of a document. The rules for this policy are:
*
*
*
*
*
The policy detect secret or confidential documents by identifying "confidential" terms in English or Arabic, such as "Confidential" or "سري ", in the Header or the Footer of Office documents. The rule for this policy is:
*
*
Policy for detection of digitally signed PDF files. The rule for this policy is:
*
*
Policies for detection of sensitive data in the Oil and Gas industry and, in particular, information pertaining to oil prospecting and drilling.
*
Detect leakage of sensitive data in the Oil and Gas industry and, in particular, information pertaining to oil prospecting and drilling. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for promoting protection of sensitive information pertaining smart power grids and supervisory control and data acquisition (SCADA) systems. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy to identify Microsoft license keys. The policy helps mitigate software piracy and unauthorized usage of corporate assets. The rule for this policy is:
*
*
Policies for detection of sensitive data in the Media industry.
*
Policy for detection of movie and TV scripts dissemination. The rule for this policy is:
*
*
Policy for detection of information suspected to be related to mergers and acquisitions. The rules for this policy are:
*
*
*
Policy for detection of information suspected to be related to mergers and acquisitions. The rule for this policy is:
*
*
Policy for detection of network security documents and network diagrams. This policy detects network diagrams by searching for IP addresses, MAC addresses and various terms common to such documents. In order to achieve complete coverage, first 2 rules and one of the MAC address rules must be selected. The rules for this policy are:
*
*
*
*
*
*
Policy for detection of patents and patent applications. The rule for this policy is:
*
*
Policy for detection of project document in traffic. This may cause false positives. The rule for this policy is:
*
*
Policy for detection of security software files. The rule for this policy is:
*
*
Policies for detection of source codes and software design documents.
*
Policy for detection of software design documents in traffic. The rules for this policy are:
*
*
Policy for detection of software source code. The rule for this policy is:
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of integrated circuits design source code in SPICE (Simulation Program with Integrated Circuits Emphasis). This may cause false positives. the rules for this policy are:
*
*
*
Policy for detection of SQL and Oracle queries and database. This may cause false positives. the rules for this policy are:
*
*
*
*
Policy for detection of Verilog source code dissemination. This policy is comprised of 2 rules, each covering a different aspect of the detected texts. In order to achieve complete coverage, all rules must be selected. This may cause false positives. The rules for this policy are:
*
*
*
Policy for detection of source code dissemination in VHDL, used mainly for hardware design. This may cause false positives. The rule for this policy is:
*
*
Policy for detection of Visual Basic source code. This may produce a false positive. The rules for this policy are:
*
*
*
*
Policy for detection of documents of prime strategic value, such as business and marketing plans. The rule for this policy is:
*
*
*
*
Policies for detection of sensitive data in the Telecom industry.
*
Policy for detection of Call Detail Records (CDRs) in traffic. The rule for this policy is:
*
*
*
Policy for detection of serial (IMEI) numbers of cell phones. The International Mobile Equipment Identity (IMEI) is a number unique to every GSM and UMTS and iDEN mobile phone as well as some satellite phones. It is usually found printed on the phone underneath the battery. The rule for this policy is:
*
*
*
*
Policy for detection of location coordinates. The rule for this policy is:
*
*
Credit Cards
Predefined Policies and Classifiers | Forcepoint DLP | 8.8
The following predefined policies are available for the detection of credit card information:
*
Policy for detection of electronic data from credit card strips. The rules for this policy are:
*
*
*
*
*
Policy for detection of credit card numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of credit card numbers, obtained from using the printer agent OCR. The rules take into account possible errors that may be induced by the OCR software. The rule for this policy is:
*
*
All Policy for detection of credit card numbers prevalent in Europe. The rule for this policy is:
*
*
Policy for detection of credit card numbers prevalent in Israel. The rule for this policy is:
*
*
*
*
*
*
*
*
*
*
Policy for detection of credit card numbers prevalent in Japan. The rule for this policy is:
*
*
Policy for detection of credit card numbers prevalent in the US. The rule for this policy is:
*
Financial Data
Predefined Policies and Classifiers | Forcepoint DLP | 8.8
The following predefined policies are available for the detection of financial information:
*
Policy for detection of 401(k) and 403(b) form that contain private information of employees. The rules for this policy are:
*
*
*
*
*
*
*
Policy for detection of Austrian financial information. The rules for this policy are:
*
*
*
Policy for detection of Belgian financial information. The rules for this policy are:
*
*
*
Policy for detection of Brazilian financial information. The rules for this policy are:
*
*
*
Policy for detection of Bulgarian financial information. The rules for this policy are:
*
*
*
Policy for detection of Croatian financial information. The rules for this policy are:
*
*
*
Policy for detection of Cypriot financial information. The rules for this policy are:
*
*
*
Policy for detection of Czech financial information. The rules for this policy are:
*
*
*
Policy for detection of Danish financial information. The rules for this policy are:
*
*
*
Policy for detection of Estonian financial information. The rules for this policy are:
*
*
*
Policy for detection of general, personal, and investment financial information in traffic. The rules for this policy are:
*
*
*
*
Policy for detection of financial information in Chinese. The rules for this policy are:
*
*
*
*
Policy for detection of Finnish financial information. The rules for this policy are:
*
*
*
Policy for detection of French financial information. The rules for this policy are:
*
*
*
Policy for detection of German financial information. The rules for this policy are:
*
*
*
Policy for detection of Greek financial information. The rules for this policy are:
*
*
*
Policy for detection of Hungarian financial information. The rules for this policy are:
*
*
*
Policy for detection of Icelandic financial information. The rules for this policy are:
*
*
*
Policy for detection of Irish financial information. The rules for this policy are:
*
*
*
*
Policy for detection of IRS Tax Forms; for example, Form W-2, Form W-4, and Form 1040. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of International Securities Identification Number (ISIN), which uniquely identifies a security. The ISIN code is a 12-character alphanumerical code that serves as uniform identification of a security at trading and settlement. The rules for this policy are:
*
*
*
*
*
Policy for identifying Israeli bank account numbers in traffic. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Policy for detection of Italian financial information. The rules for this policy are:
*
*
*
Policy for detection of Kazakh financial information. The rules for this policy are:
*
*
*
Policy for detection of Latvian financial information. The rules for this policy are:
*
*
*
Policy for detection of Lithuanian financial information. The rules for this policy are:
*
*
*
Policy for detection of Luxembourgian financial information. The rules for this policy are:
*
*
*
Policy for detection of Maltese financial information. The rules for this policy are:
*
*
*
Policy for detection of Mexican financial information. The rules for this policy are:
*
*
*
Policy for identifying Dutch financial information. The rules for this policy are:
*
*
*
Policy for identifying Norwegian financial information. The rules for this policy are:
*
*
*
Policy for detection of PRC financial information. The rules for this policy are
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of Polish financial information. The rules for this policy are:
*
*
*
*
Policy for detection of Portuguese financial information. The rules for this policy are:
*
*
*
Policy for detection of pricing information and pricelists in traffic. The rules for this policy are:
*
*
*
*
Policy for detection of Qatari financial information. The rules for this policy are:
*
*
*
Policy for detection of Romanian financial information. The rules for this policy are:
*
*
*
Policy for detection of Routing Transit Numbers (RTN), also known as American Bankers Association (ABA) numbers. RTN numbers are nine digit bank codes, used in the United States to identify, for example, which financial institution checks and banknotes are drawn upon. The rules for this policy are:
*
*
*
*
Policy for detection of Saudi Arabia financial information. The rules for this policy are:
*
*
*
Policy for detection of Slovak financial information. The rules for this policy are:
*
*
*
Policy for detection of Slovenian financial information. The rules for this policy are:
*
*
*
Policy for detection of Spanish financial information. The rules for this policy are:
*
*
*
Policy for detection of Swedish financial information. The rules for this policy are:
*
*
*
Policy for detection of Swiss financial information. The rules for this policy are:
*
*
*
Policy for detection of Turkish financial information. The rules for this policy are:
*
*
*
*
*
Policy for detection of UK financial information. The rules for this policy are:
*
*
*
Policy for detection of Emirati financial information. The rules for this policy are:
*
*
Protected Health Information (PHI)
Predefined Policies and Classifiers | Forcepoint DLP | 8.8
*
Policy for detection of protected health information for Australian citizens. The rules for this policy are:
*
*
*
*
*
Policy for detection of data types pertaining to medical conditions, drugs etc. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of protected health information for Israeli citizens, to promote compliance with Israeli privacy rules and Israeli patients rights law of 1996. The rules for this policy are:
*
*
*
*
*
*
*
Policy for detection of protected health information for Italy citizens. The rules for this policy are:
*
*
*
*
*
Policy for detection of protected health information for Norwegian citizens. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
A policy for detection of protected health information (PHI) of Swedish citizens and residents. The policy comprises rules for detection of Health information and Medical Conditions (in Swedish or English), in proximity to personally identifiable information such as personal number (personnummer), or name. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of UK protected health information.The rules for this policy are
*
*
*
*
*
*
A policy for detection of protected health information of US citizens. The rules for this policy are
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Personally Identifiable Information (PII)
Predefined Policies and Classifiers | Forcepoint DLP | 8.8
The following predefined policies are available for the detection of private information:
*
Policy for detection of Australian private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Policy for detection of Austrian private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of Belgian private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Policy for detection of biometric files. The rules for this policy are:
*
*
*
Policy for detection of Unique Master Citizen Numbers. The rules for this policy are:
*
*
*
Policy for detection of Brazilian private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Policy for detection of Bulgarian private information. The rules for this policy are:
*
*
*
Policy for detection of Canadian private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of Chilean private information. The rules for this policy are:
*
*
*
*
*
Policy for detection of Colombian private information. The rules for this policy are:
*
*
*
*
*
Policy for detection of Costa Rican private information. The rules for this policy are:
*
*
*
*
*
*
*
Policy for detection of Unique Master Citizen Numbers and Personal identification numbers. The rules for this policy are:
*
*
*
*
*
Policy for detection of Cypriot private information. The rules for this policy are:
*
*
*
Policy for detection of Czech Republic private information. The rules for this policy are:
*
*
*
*
*
Policy for detection of Danish private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Policy for detection of Employer Identification Numbers (EIN). The rule for this policy is:
*
*
Policy for detection of email addresses in email body or attachments. The rules for this policy are:
*
*
*
*
*
Policy for detection of Estonian private information. The rules for this policy are:
*
*
*
Policy for detection of Finnish private information. The rules for this policy are:
*
*
*
*
*
Policy for detection of French private information.The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of German private information. The rules for this policy are:
*
*
*
*
*
*
*
Policy for detection of Greek private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of Hong Kong private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of Hungarian private information. The rules for this policy are:
*
*
*
*
*
*
*
Policy for detection of Icelandic private information. The rules for this policy are:
*
*
*
Policy for detection of Indian private information. The rules for this policy are:
*
*
*
*
*
*
Policy for detection of Indonesian private information. The rules for this policy are:
*
*
*
*
*
Policy for detection of Irish private information. The rules for this policy are:
*
*
*
*
*
*
Policy for detection of Israeli private information. The rules for this policy are:
*
*
*
*
*
*
*
*
Policy for detection of Italian private information. The rules for this policy are:
*
*
*
*
*
*
Policy for detection of Japanese private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of Kazakh private information. The rules for this policy are:
*
*
*
*
*
*
*
Policy for detection of Latvian private information. The rules for this policy are:
*
*
*
Policy for detection of Lithuanian private information. The rules for this policy are:
*
*
*
Policy for detection of Luxembourgian private information. The rules for this policy are:
*
*
*
*
*
Policy for detection of Macau private information.The rules for this policy are:
*
*
*
*
*
*
Policy for detection of Unique Master Citizen Numbers. The rules for this policy are:
*
*
*
Policy for detection of Malaysian private information.The rules for this policy are:
*
*
*
*
*
*
*
*
Policy for detection of Maltese private information. The rules for this policy are:
*
*
*
Policy for detection of Mexican private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of Unique Master Citizen Numbers. The rules for this policy are:
*
*
*
Policy for detection of Dutch private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of New Zealand private information. The rules for this policy are:
*
*
*
*
*
Policy for detection of Norwegian private information. The rules for this policy are
*
*
*
*
*
*
*
*
Policy for detection of People's Republic of China private information. The rules for this policy are:
*
*
*
*
*
*
*
Policy for detection of Peruvian private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Policy for detection of Philippine private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of Polish private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of Portuguese private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Policy for detection of Romanian private information. The rule for this policy is:
*
*
Policy for detection of Russian private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of Unique Master Citizen Numbers. The rules for this policy are:
*
*
*
Policy for detection of Singaporean private information. The rules for this policy are:
*
*
*
*
*
*
*
*
Policy for detection of Slovak private information. The rule for this policy is:
*
*
*
*
*
Policy for detection of Unique Master Citizen Numbers. The rules for this policy are:
*
*
*
Detects valid Canadian Social Insurance Numbers (SIN). The rules for this policy are:
*
*
*
*
Policy for detection of validated social security numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
Policy for detection of South African private information. The rules for this policy are:
*
*
*
*
*
*
*
Policy for detection of South Korean private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Policy for detection of Spanish private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of Swedish private information. The rules for this policy are:
*
*
*
*
*
Policy for detection of Swiss private information. The rules for this policy are:
*
*
*
*
*
Policy for detection of Taiwanese private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of Thai private information. The rules for this policy are:
*
*
*
*
*
Policy for detection of Turkish private information.The rules for this policy are:
*
*
*
*
*
*
*
*
*
Policy for detection of UK private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of US private information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for detection of Vietnamese private information. The rules for this policy are:
*
*
*
*
Regulations, Compliance and Standards
Predefined Policies and Classifiers | Forcepoint DLP | 8.8
Forcepoint DLP includes the following types of regulatory and compliance policies:
*
*
*
*
*
EU General Data Protection Regulation (GDPR)
Predefined Policies and Classifiers | Forcepoint DLP | 8.8
The description and list of rules for each policy in this category can be found in other sections of this document.
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Financial Regulations
Predefined Policies and Classifiers | Forcepoint DLP | 8.8
EU Finance
Policy for promoting regulatory compliance with the requirements of the Basel Committee on Banking Supervision. The policy contains rules to detect financial data like account numbers, passwords, or magnetic credit card tracks. Additional rules detect combinations of Personally Identifiable Information (PII) like credit cards and identification numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
FCRA
The Fair Credit Reporting Act (FCRA) is a United States federal law. The Act is designed to help ensure that consumer reporting agencies act fairly, impartially, and with respect for the consumer's right to privacy when preparing consumer reports on individuals. The policy comprises rules for detection of personal financial information. The rules for this policy are:
*
*
*
*
*
*
*
FFIEC
The Federal Financial Institutions Examination Council (FFIEC) is a formal interagency body empowered to prescribe uniform principles, standards, and report forms for the Federal examination of financial institutions. The policy contains rules to detect financial data like account numbers, passwords, or magnetic credit card tracks. Additional rules detect combinations of Personally Identifiable Information (PII) like credit cards, social security numbers, driver license numbers, and private financial information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
FSA SYSC 13.7.7
The Financial Services Authority (FSA) publishes a set of rules in the Financial Services Handbook. The Senior Management Arrangements, Systems and Controls (SYSC) is one of the subsections of this handbook. Chapter 13.7.7 requires firm to establish and maintain appropriate systems and controls to manage its information security risks regarding the confidentiality, integrity, availability, and accountability of its information. This policy detects confidential and financial documents. The rules for this policy are:
*
*
*
*
GLBA
The Financial Modernization Act of 1999, also known as the "Gramm-Leach-Bliley Act" or GLB Act, is a US Federal regulation that includes provisions to protect consumers' personal financial information held by financial institutions. The policy contains rules to detect accounts, credit cards, and social security numbers. The policy comprises rules for detection of personal financial information and other personal information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Model Audit Rule (MAR)
The National Association of Insurance Commissioners (NAIC) Model Audit Rule (MAR) requires the assessment of internal controls over financial reporting. The policy comprises rules for detection of documents containing financial reports and, in particular, of actuary reports. The rules for this policy are:
*
*
*
*
*
*
*
NBT 357
The Israeli NBT directive requires Israeli Banks and agencies to protect customers privacy by ensuring the integrity and confidentiality of data. The policy detects credit card information, account numbers, International Bank accounts number (Israeli IBAN) and buy and sell instructions in Hebrew. The rules for this policy are:
*
*
*
*
*
*
*
*
NYSE rule 472
Regulates communications with investors and mandates approval of communications and research reports before being released as well as the retention and archiving of such communications. The rule for this policy is:
*
SEC
Policy for detection of SEC forms 10-K and 10-Q, based on calendar fiscal year.
The rule s for this policy are:
*
*
*
*
Payment Card Industry (PCI)
Predefined Policies and Classifiers | Forcepoint DLP | 8.8
PCI
Policy for promoting compliance with the Payment Card Industry Data Security Standard (PCI DSS). PCI DSS is an industry standard, accepted internationally by all major credit card issuers and is enforced on companies and organizations that accept credit card payments or process, store, or transmit cardholder data. The standard includes the mandate that credit card numbers and cardholder data be highly secured and that transactions comprising PCI data be encrypted. Forensics are not saved for the rules that are enabled by default. The rules for this policy are:
*
*
*
*
PCI Audit
A permissive policy for detecting potential credit-card-numbers. The policy contains several rules to address corner cases, such as numbers that appear as part of a long sequence, with user-defined delimiters etc. Most of the rules in the policy may cause high rate of false positives and are not recommended for usage in production mode. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
National Privacy Regulations
Predefined Policies and Classifiers | Forcepoint DLP | 8.8
Forcepoint DLP includes regulatory policies for numerous countries.
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Australia
Policies for promoting compliance with Australian Privacy regulations.
*
Australian Privacy Act (2012 Revision)
The Australian Federal Privacy Act mandates protection of private information and limits its storage, usage, and distribution. The policy detects private information of Australians. Each one of this policy's rules relates to different private information. Enable the rules you want to enforce. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Canada
Policies for promoting compliance with Canadian Privacy regulations.
*
The Personal Information Protection and Electronic Documents Act is a Canadian law governing how private sector organizations collect, use and disclose personal information in the course of commercial business. The policy detects Canadian Personally Identifiable Information (PII) like social insurance numbers or credit cards, either alone or in combination with sensitive private information like health conditions.
*
*
*
*
*
*
*
*
*
*
*
*
*
*
European Union
Policies for promoting compliance with European Union Privacy regulations.
*
*
The Denmark Personal Information Protection Law (PIP) regulates the handling of personal information. The policy comprises rules for detection of CPR numbers and Danish bank account numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
Finland's Personal Data Act provides restrictions on the processing, storage and transmission of personal and sensitive information, including personal ID. Under the Law, personal information relating to identity may only be processed, stored and transmitted with the consent of the individual. Personal information cannot generally be transferred outside of Finland unless the country has "comparable" protections. The policy comprises rules for detection of Finnish Social Security Numbers and DNA sequences. The rules for this policy are:
*
*
*
*
*
A policy to promote compliance with the France Breach Notification Requirement (Ordonnance 2011-1012). According to this Ordinance, electronic communication service provider must inform, without delay, the French Data Protection Authority in case of any security breach. A data security breach is defined as any security breach that accidentally or unlawfully results in the destruction, loss, alteration, disclosure or unauthorized access to personal data that is being processed in the context of electronic communication services that are provided to the public. The rules for this policy are:
*
*
*
*
*
*
*
Policy for the French Law 2004-801, which implements the EU Directive 95 on privacy. The policy contains rules to detect combinations of French full names and INSEE numbers with sensitive private information like credit card number or health conditions. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Policy for the German Federal Privacy Protection Act, implementing the EU Directive 95 on privacy. The policy contains rules to detect combinations of German full names with sensitive private information like credit card number, ethnicity, and health conditions. the rules for this policy are:
*
*
*
*
*
*
The Hellenic Data Protection Act of 1997 regulates the processing of personal data and therefore mandates the protection of private information. The policy detects Greek AFM (Αριθμός Φορολογικού Μητρώου) and ID numbers, alone or in proximity to a Greek names in Greek or Latin letters, and combinations of Greek names in proximity to sensitive medical information in Greek and English. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Act LXIII of 1992 on Protection of Personal Data and Disclosure of Data Public Interest mandates, among others, that personal data shall be protected against unauthorized access, transfer and public exposure. Data may only be processed, stored and transmitted with the consent of the individual. The Act sets out sanctions for violations. The policy comprises rules for detection of Hungarian Personal Numeric Code Numbers (szemelyi azonosito szam) Social Security Numbers (TAJ szam), Tax ID Numbers (Adoazonosito jel) and DNA information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Ireland Data Protection Acts (DPA) of 1988 and 2003, and in particular, the Personal Data Security Breach Code of Practice set by Ireland Data Protection Commissioner (DPC), mandate protection of personal information and requires that, in case where there is a risk of unauthorized disclosure, loss, destruction or alteration of personal data, the data controller must give immediate consideration to informing those affected. The policy contains rules to detect Irish Personally Identifiable Information (PII) like Personal Public Service Numbers (PPS/RSI) or passport numbers, alone or in combination with credit card numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
The Italy Health Data Privacy Act protects persons from violation of their right to privacy through the processing of personal data. The Act helps to ensure that personal data is processed in accordance with fundamental respect for the right to privacy, including the need to protect personal integrity and private life and ensures that personal data is of adequate quality. The policy contains rules to detect combinations of Italy Personally Identifiable Information (PII) like Codice Fiscale and full name, with sensitive health information. The rules for this policy are:
*
*
*
*
*
*
*
*
Policy to promote compliance with the Dutch Personal Data Protection Act, which implements the EU Directive 95 on privacy. The policy contains rules to detect combinations of Netherlands sofinummer and sensitive private information like account number, driver license number, passport number, ethnicity and health conditions. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
The Law on the Protection of Personal Data (LPPD) is based on the European Union (EU) Data Protection Directive. Under the Law, personal information relating to identity may only be processed, stored and transmitted with the consent of the individual. Personal information cannot generally be transferred outside of Poland unless the country has 'comparable' protections. The law sets out civil and criminal sanctions for violations. The policy comprises rules for detection of Polish NIP numbers, PESEL numbers, Polish ID numbers, DNA information and Polish REGON numbers, alone or in proximity to a Polish name. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
The Spanish Data Privacy Act implementing the EU Directive 95 on privacy. The policy contains rules to detect combinations of Spain National Identity Documents and sensitive private information like account numbers, ethnicity and health conditions. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Sweden's Personal Data Act of 1998 was enacted to protect people against the violation of their personal integrity by processing of personal data. The act includes restrictions on the storage and transmission of personal data. The pre-defined policy comprises rules for detection of Swedish Personal Identity Number (personnummer) in traffic and DNA information. The rules for this policy are:
*
*
*
*
A policy to promote compliance with the Swedish Patient Data Act (Patientdatalag, SFS 2008:355) that mandates protection of protected health information (PHI) and Personally Identifiable Information (PII) of Swedish citizens and residents. The policy comprises rules for detection of health information or medical conditions (in Swedish or English), in proximity to personally identifiable information such as personnummer or name, and for detection of SPSS files and Database files. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for compliance with the NHS Information Governance Toolkit (IG Toolkit). The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
The UK Data Protection Act 1998 provides provision for the regulation of the processing of information relating to individuals, including the obtaining, holding, use or disclosure of such information. The policy contains rules to detect UK Personally Identifiable Information (PII) like National Insurance numbers, passport numbers, alone or in combination with credit card numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
Policy for promoting regulatory compliance with the requirements of the Basel Committee on Banking Supervision. The policy contains rules to detect financial data like account numbers, passwords, or magnetic credit card tracks. Additional rules detect combinations of Personally Identifiable Information (PII) like credit cards and identification numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
Hong Kong
Policies for promoting compliance with Hong Kong Privacy regulations.
*
The Hong Kong Personal Data Privacy Ordinance (PDPO) protects the privacy interests of living individuals in relation to personal data. The Ordinance covers any data relating directly or indirectly to a living individual from which it is practicable to ascertain the identity of the individual and which are in a form in which access or processing is practicable, including, for example, Hong Kong Identity Card Number, name and address. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Iceland
Policies for promoting compliance with Iceland Privacy regulations.
*
The Iceland Act on Protection of Individuals with regard to the Processing of Personal Information (law 77/2000) follows the EU Data Protection Directive and restricts the processing, storage, and transmission of personal and sensitive information. The predefined policy comprises rules for detecting Icelandic identification numbers (Kennitala) of individuals and DNA profiles. The rules for this policy are:
*
*
*
India
*
Policy for detecting sensitive personal information as defined by the India Information Technology Act. The rules for this policy include:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Israel
Policies for promoting compliance with Israel Privacy regulations.
*
Policy for detection of protected health information of Israeli citizens, to promote compliance with Israeli privacy rules and Israeli patients rights law of 1996.
*
*
*
*
*
*
Japan
Policies for promoting compliance with Japan Privacy regulations.
*
The Japan Personal Information Protection Law (PIP) states a set of obligations for companies handling personal data. The law protects individuals by regulating the handling of information by private sector businesses. The policy contains rules to protect Japan PII (Personally Identifiable Information), either alone or with a credit card number. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Malaysia
Policies for promoting compliance with Malaysia Privacy regulations.
*
The Malaysian Personal Data Protection Act of 2009 mandates, among others, that any person in Malaysia who collects or stores any personal data in respect of commercial transactions, should take practical steps to protect the personal data from any loss or unauthorized access or disclosure. Penalties for incompliance comprise fine not exceeding 250000 ringgit or imprisonment for a term not exceeding two years or to both. The policy comprises rules for detection of Malaysian personal information, such as Malaysian ID, alone or in combination with sensitive information such as sensitive health information, credit card numbers, account number, ethnicities and religion etc. Additional rules detect combinations of names with sensitive health information or passwords.
*
*
*
*
*
*
*
*
*
*
New Zealand
Policies for promoting compliance with New Zealand Privacy regulations.
*
New Zealand's Privacy Act of 1993 applies to almost every person, business or organization in New Zealand. The act sets out information privacy principles, which, among others, limit transmission and storage of personal data. The pre-defined policy comprises rules for detection and monitoring of NZ National Health Index (NHI) numbers and DNA information. The rules for this policy are:
*
*
*
Norway
Policies for promoting compliance with Norway Privacy regulations.
*
The Norway Health Data Privacy Act protects persons from violation of their right to privacy through the processing of personal data. The Act helps to ensure that personal data is processed in accordance with fundamental respect for the right to privacy, including the need to protect personal integrity and private life and ensures that personal data is of adequate quality. The policy contains rules to detect combinations of Norwegian Personally Identifiable Information (PII) like personnummer and full name, with sensitive health information.
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Philippines
Policies for promoting compliance with Philippines Privacy regulations.
*
The Philippines Data Privacy Act of 2012 adopts generally accepted international principles and standards for personal data protection. It states that all sensitive personal information maintained by the government shall be secured with the use of the most appropriate standard recognized by the information and communications technology industry. Sensitive personal information includes information about an individual's age, color, health, genetics, offense committed, or ID numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Russia
Policies for promoting compliance with Russia Privacy regulations.
*
Federal Law No. 152-FZ regulates activities related to processing of personal data in the Russian Federation by means of automation equipment, and mandates protecting the confidentiality of personal information. The policy detects personal information that should be protected, like passport number, personal pension account number (SNILS), Taxpayer Identification Numbers (INN), personal phone numbers, etc., in proximity to Russian names. The rules for this policy are:
*
*
*
*
*
*
*
The law of the Russian Federation on Information, Informatization, and Information Protection of 1995 covers both the government and private sectors and imposes a code of fair information practices and other restrictions on the processing of personal and sensitive information. The pre-defined policy comprises rules for detection of a Russian passport number when appearing together with Russian full names and for detection of DNA information. The rules for this policy are:
*
*
*
*
*
Singapore
Policies for promoting compliance with Singapore Privacy regulations.
*
The Singapore Electronic Transaction Act (ETA) mandates applying adequate measures to assure the confidentiality of electronic records, imposing fines and incarceration for compromising confidentiality. It also outlines the liability of directors, managers, secretaries and other officers of the body corporate in case of a breach. The rules for this policy are:
*
*
*
*
*
*
The Singapore Personal Data Protection Act of 2012 covers all private sector organizations engaged in data activities within Singapore. It regulates the management of personal data by businesses and imposes financial penalties. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
South Africa
Policies for promoting compliance with South Africa Privacy regulations.
*
The Republic of South Africa Electronic Communication and Transaction Act defines a national e-strategy for the Republic and also prevents abuse of information systems. Chapter VIII of the act deals with protection of personal information. The policy detects combinations of valid South Africa ID number with credit card numbers. The rules for this policy is:
*
*
*
The "Protection of Personal Information" (POPI) bill regulates the collection, dissemination, use and retention of private information.The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Switzerland
Policies for promoting compliance with Switzerland Privacy regulations.
*
The Federal Act of Data Protection of 1992 regulates personal information held by government and private bodies. The Act requires that information must be legally and fairly collected and places limits on its use and disclosure to third parties. Transfers to other nations must be registered and the recipient nation must have equivalent laws. The pre-defined policy comprises rules for detection of Swiss AHV numbers and DNA information. The rules for this policy are:
*
*
*
Taiwan
Policies for promoting compliance with Taiwan Privacy regulations.
*
Taiwan - Personal Information Protection Act. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Thailand
Policies for promoting compliance with Thailand Privacy regulations.
*
The Thailand Official Information Act, B.E. 2540 of 1997 sets a code of information practices for the processing of personal information by state agencies. The act mandates, among other things, not to disclose personal information to other state agencies or other persons without prior consent given in writing, except in limited circumstances. The pre-defined policy comprises rules for detecting validated Thai National ID Numbers and DNA sequences. The rules for this policy are:
*
*
*
Turkey
*
A policy for protection of personal information, in accordance with Turkey's "Protection of Personal Data" Draft Law. The rules for this policy are:
*
*
*
*
*
*
*
*
*
United States of America - State Privacy Regulations
Predefined Policies and Classifiers | Forcepoint DLP | 8.8
Policies for promoting compliance with various states' privacy regulations
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Alabama Information Protection
Alabama standard 681S2-00 requires that executive branch agencies, boards, and commissions shall identify Personally Identifiable Information (PII), evaluate the risk and impact of loss or unauthorized disclosure of PII, and implement PII confidentiality safeguards. The policy detects combinations of PII like social security and credit card numbers. Additional rules detect passwords. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Alaska Personal Information Protection Act
Alaska HB 65 of 2008 notifies consumers when a data breach concerning personal information has occurred. Personal information is defined to include unencrypted information on an individual, which consists of the individual's name and one or more of several other pieces of information, including social security number, driver's license number, account number, password, or other access codes. The policy detects combinations of full names with social security, driver's license, or credit card numbers. Additional rules detect passwords and account numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Arizona Data Breach Notification Law
Arizona SB 1338 of 2006 requires businesses to provide consumer notification of data breaches. It is applicable to any person that conducts business in Arizona and owns or licenses computerized data that includes personal information or maintains such data. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and Arizona driver's license numbers. The rules for this policy are:
*
*
Arkansas Personal Information Protection Act
Arkansas SB 1167 of 2005 requires organizations to protect personal information of Arkansas residents (including personal health information) and to inform Arkansas customers when their private information is disclosed during a security breach. The policy comprises rules that detect combinations of personally identifiable information with sensitive information such as protected health information, credit card numbers, or passwords. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
California Consumer Privacy Act (CCPA)
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Colorado Consumer Protection Act
Colorado HB 06-1119 of 2006 requires that an individual or commercial entity that conducts business in Colorado and that owns or licenses computerized data that includes personal information about a resident of Colorado shall, when it becomes aware of a breach of the security of the system, conduct in good faith a prompt investigation to determine the likelihood that personal information has been or will be misused. The individual or the commercial entity shall give notice as soon as possible to the affected Colorado residents unless the investigation determines that the misuse of information about a Colorado resident has not occurred and is not reasonably likely to occur. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
Connecticut Data Breach Notification Act
Connecticut SB 650 of 2006 requires that any person who conducts business in this state, and who, in the ordinary course of such person's business, owns, licenses or maintains computerized data that includes personal information, shall provide notice of any breach of security, following the discovery of the breach, to any resident of this state whose personal information was breached or is reasonably believed to have been breached. Such notice shall be made without unreasonable delay but not later than ninety days after the discovery of such breach. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Delaware Data Breach Notification
Delaware HB 116 of 2005 requires that any person who conducts business in this State and who owns, licenses, or maintains computerized data that includes personal information shall provide notice of any breach of security, following determination of the breach of security, to any resident of this state whose personal information was breached or is reasonably believed to have been breached; unless, after an appropriate investigation, the person reasonably determines that the breach of security is unlikely to result in harm to the individuals whose personal information has been breached. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
District of Columbia Security Breach Notification Act
District of Columbia CB 16-810, signed into law as the Consumer Personal Information Security Breach Notification Act in 2007, requires any person or entity who conducts business in the District of Columbia, and who, in the course of such business, owns or licenses computerized or other electronic data that includes personal information, and who discovers a breach of the security of the system, shall promptly notify any District of Columbia resident whose personal information was included in the breach. The notification shall be made n the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subsection (d) of this section, and with any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Florida Information Protection Act
Florida SB 1524 of 2014 requires that a corporation, trust, estate, cooperative, association, or other commercial entity that acquires, maintains, stores, or uses personal information shall provide notice to the department of any breach of security affecting 500 of more individuals in this state. Such notice must be provided to the department as expeditiously as practicable, but no later than 30 days after the determination of the breach or reason to believe a breach occurred. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. Additional rules protect passwords. The rules for this policy are:
*
*
*
*
*
Georgia Personal Data Security Act
Georgia SB 230 of 2005 requires that in the vent of a breach of the security of the system, which system is maintained by a third-party agent for a covered entity, the third-party agent shall notify the covered entity of such breach as expeditiously as practicable but no later than 72 hours after the determination of such breach or reason to believe such breach has occurred. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. Additional rules detect passwords. The rules for this policy are:
*
*
*
*
*
*
*
*
Hawaii Security Breach of Personal Information
Hawaii SB 2290 of 2007 requires that any business that owns or licenses personal information of residents of Hawaii, any business that conducts business in Hawaii that owns or licenses personal information in any form (whether computerized, paper, or otherwise), or any government agency that collects personal information for specific government purposes shall provide notice to the affected person that there has been a security breach, following discovery or notification of the breach. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. Additional rules detect passwords and account numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Idaho Data Breach Notification
Idaho SB 1374 of 2006 requires a city, county, or stage agency, individual, or commercial entity that conducts business in Idaho and that owns or licenses computerized data that includes personal information about a resident of Idaho shall, when it becomes aware of a breach of the security of the system, conduct in good faith a reasonable and prompt investigation to determine the likelihood that personal information has been or will be misused. If the investigation determines that the misuse of information about an Idaho resident has occurred or is reasonably likely to occur, the agency, individual, or commercial entity shall give notice as soon as possible to the affected Idaho resident. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. Additional rules detect passwords and account numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Illinois Personal Information Protection Act
Illinois HB 1633 of 2006 requires data collectors to provide notification of a security breach after discovery, even if data has not been accessed by unauthorized persons. This state law affects all data collectors that own or license personal information (PI), or maintains computerized data that includes PI. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, state ID, and driver's license numbers. Additional rules detect passwords. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Indiana Disclosure of Security Breach law
Indiana SB 503 of 2006 requires that after discovering or being notified of a breach of the security of data, database owners shall disclose the breach to an Indiana resident whose: (1) unencrypted personal information was or may have been acquired by an unauthorized person; or (2) encrypted personal information was or may have been acquired by an unauthorized person with access to the encryption key; if the database owners know, should know, or should have known that the unauthorized acquisition constituting the breach has resulted in or could result in identity deception, identity theft, or fraud affecting the Indiana resident. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Iowa Data Breach Notification Law
Iowa S.F. 2308 of 2008 requires that any person who owns or licenses computerized data that includes a consumer's personal information that is used in the course of the person's business, vocation, occupation, or volunteer activities and that was subject to a breach of security shall give notice of the breach of security, following discovery of such breach of security, to any consumer whose personal information was included in the information that was breached. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Kansas Protection of Consumer Information
Kansas SB 196 requires that a person that conducts business in this state, or a government, governmental subdivision, or agency that owns or licenses computerized data that includes personal information shall, when it becomes aware of any breach of the security of the system, conduct in good faith a reasonable and prompt investigation to determine the likelihood that personal information has been or will be misused. If the investigation determines that the misuse of information has occurred or is reasonably likely to occur, the person or government, governmental subdivision, or agency shall give notice as soon as possible to the affected Kansas resident. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Kentucky Data Breach Notification
Kentucky HB 232, signed into law in 2014, requires any person or business entity that conducts business in Kentucky to provide notification in case of an unauthorized acquisition of unencrypted, unredacted computerized data that compromises the security, confidentiality, or integrity of personally identifiable information (PII) maintained by the information holder as part of a database regarding multiple individuals that causes or leads the information holder to believe has caused or will cause identity theft or fraud against a Kentucky resident. Upon notification or discovery of a breach of the security of the system, an information holder must notify any resident of Kentucky whose unencrypted information was or is reasonably believed to have been acquired by an unauthorized person. It is applicable to any person that conducts business in the state and owns or licenses computerized data or maintains such data. The policy detects combinations of PII like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Louisiana Data Breach Notification
Louisiana SB 205 of 2006 demands notification to any Louisiana resident whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person as a result of a security breach. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Maine Data Breach Notification Law
Maine LD 1671 of 2006 requires that an information broker that maintains computerized data that includes personal information that becomes aware of a breach of the security of the system shall conduct in good faith a reasonable and prompt investigation to determine the likelihood that personal information has been or will be misused, and shall give notice of a breach of the security of the system, following discovery or notification of the security breach, to a resident of this state whose personal information has been, or is reasonably believed to have been, acquired by an unauthorized person. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Maryland Personal Information Protection Act
Maryland HB 208 of 2008 requires that a business that owns or licenses computerized data that includes personal information of an individual residing in the state, when it discovers or is notified of a breach of the security of a system, shall conduct in good faith a reasonable and prompt investigation to determine the likelihood that personal information of the individual has been or will be misused as a result of the breach. It is applicable to any person that conducts business in the state and owns or licenses computerized data or maintains such data. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Massachusetts Protection of Personal Information
Massachusetts 201 CMR 17 requires that every person that owns or licenses personal information about a resident of the Commonwealth shall develop, implement, and maintain a comprehensive information security program that is written in one or more readily accessible parts and contains administrative, technical, and physical safeguards that are appropriate to (a) the size, scope, and type of business of the person obligated to safeguard the personal information under such comprehensive information security program; (b) the amount of resources available to such person; (c) the amount of stored data; and (d) the need for security and confidentiality of both consumer and employee information. The safeguards contained in such program must be consistent with the safeguards for protection of personal information and information of a similar character set forth in any state or federal regulations by which the person who owns or licenses such information may be regulated. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Michigan Identity Theft Protection Act
Michigan HB 4658 of 2007 requires, unless the person or agency determines that the security breach has not or is not likely to cause substantial loss or injury to, or result in identity theft with respect to, one ore more residents of this state, a person or agency that owns or licenses data that are included in a database that discovers a security breach, or receives notice of a security breach, shall provide a notice of the security breach to each resident of this state. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Minnesota Data Breach Notification
Minnesota HF 2121 of 2006 requires that any person or business that conducts business in this state, and that owns or licenses data that includes personal information, shall disclose any breach of the security of the system, following discovery or notification of the breach in the security of the data, to any resident of this state whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. The disclosure must be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in paragraph (c), or with any measures necessary to determine the scope of the breach, identify the individuals affected, and restore the reasonable integrity of the data system. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
Mississippi Data Breach Notification
Mississippi HB 583 of 2010 requires that consumers are notified promptly if the security of their information has been compromised, and gives the public the right to freeze their credit files if they become a victim of identity theft. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Missouri Breach Notification Law
Missouri HB 62 of 2009 requires that any person that owns or licenses personal information of residents of Missouri or any person that conducts business in Missouri that owns or licenses personal information in any form of a resident of Missouri shall provide notice to the affected consumer that there has been a breach of security, following discovery or notification of the breach. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
Montana Data Breach Notification Statute
Montana HB 732 of 2005 requires that any person or business that conducts business in Montana and that owns or licenses computerized data that includes personal information shall disclose any breach of the security of the data system, following discovery or notification of the breach, to any resident of Montana whose unencrypted personal information was or is reasonably believed to have been acquired by an unauthorized person. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Nebraska Notification of Data Security Breach Act
Nebraska LB 876, which was signed into law on April 13, 2006, requires that an individual or a commercial entity that conducts business in Nebraska and that owns or licenses computerized data that includes personal information about a resident of Nebraska shall, when it becomes aware of a breach of the security of the system, conduct in good faith a reasonable and prompt investigation to determine the likelihood that personal information has been or will be used for an unauthorized purpose. If the investigation determines that the use of information about a Nebraska resident for an unauthorized purpose has occurred or is reasonably likely to occur, the individual or commercial entity shall give notice to the affected Nebraska resident. Notice shall be made as soon as possible and without unreasonable delay, consistent with the legitimate needs of law enforcement and consistent with any measures necessary to determine the scope of the breach and to restore the reasonable integrity of the computerized data system. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Nevada Security of Personal Information
Nevada SB SB 347 of 2006 requires that data collectors that maintain records that contain personal information of a resident of this state shall implement and maintain reasonable security measures to protect those records from unauthorized access, acquisition, destruction, use, modification, or disclosure. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
New Hampshire Notice of Security Breach
New Hampshire HB 1660 of 2007 requires businesses who own or license computerized data that includes personal information shall, when they become aware of a security breach, promptly determine the likelihood that the information has been or will be misused. If the determination is that misuse of the information has occurred or is reasonably likely to occur, or if a determination cannot be made, businesses shall notify the affected individuals as soon as possible. Personal information is considered the customer's full name in combination with any of the following: social security number, driver's license number, or financial account information. The policy detects a combination of full names with social security, driver's license, or credit card numbers. Additional rules detect passwords and account numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
New Jersey Personal Information and Privacy Protection Act
New Jersey A 4001 requires that any business or public entity required under this section to disclose a breach of security of a customer's personal information shall, in advance of the disclosure to the customer, report the breach of security and any information pertaining to the breach to the Division of State Police in the Department of Law and Public Safety for investigation or handling, which may include dissemination or referral to other appropriate law enforcement entities. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
New Mexico Data Breach Notification Act
New Mexico HB 15 of 2017 requires that any person that is licensed to maintain or possess computerized data containing personal identifying information of a New Mexico resident that the person does not own or license shall notify the owner or licensee of the information of any security breach in the most expedient time possible. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
New York Data Security Act
New York A 4254 of 2005 provides that in the event of unauthorized access to "private information," defined as personal information in combination with a social security number, driver's license, or an account or credit card number, the business or state entity is required to notify affected customers and inform appropriate authorities. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
North Carolina Identity Theft Protection Act
North Carolina SB 1048 of 2005 requires that any business that owns or licenses personal information of residents of North Carolina or any business that conducts business in North Carolina that owns or licenses personal information in any form (whether computerized, paper, or otherwise) shall provide notice to the affected person that there has been a security breach, following discovery or notification of the breach. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
North Dakota Data Breach Notification
North Dakota Data Breach Notification, amended in 2017 by HB 1088, requires any person that owns or licenses computerized data that includes personal information, to disclose any breach of the security system, following discovery or notification of the breach in the security of the data, to any resident of the state whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Ohio Data Security Breach Notification Law
Ohio HB 104 of 2005 requires that any person that owns or licenses computerized data that includes personal information shall disclose any breach of the security of the system, following its discovery or notification of the breach of the security of the system, to any resident of this state whose personal information was, or reasonably is believed to have been, accessed and acquired by an unauthorized person if the access and acquisition by the unauthorized person causes, or is reasonably believed will cause, a material risk of identity theft or other fraud to the resident. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Oklahoma Security Breach Notification Act
Oklahoma HB 2357 of 2006 requires that if you maintain, as part of a database, a consumer's name and other personal identification numbers (i.e., SSN, driver's license, credit card, or financial information with a personal security code) that such information must be encrypted or redacted so that in the event of a breach, such information cannot be obtained and used by a third party. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Oregon Consumer Identity Theft Protection Act
Oregon SB 583 of 2007 requires that a person that owns or licenses personal information that the person uses in the course of the person's business, vocation, occupation, or volunteer activities and that was subject to a breach of security shall give notice of the breach of security to a) the consumer to whom the personal information pertains; b) the Attorney General, either in writing or electronically, if the number of consumers to whom the person must send the notice exceeds 250. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. Additional rules detect passwords and account numbers.The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Pennsylvania Breach of Personal Information Notification Act
Pennsylvania SBG 712 of 2006 requires that an entity that maintains, stores, or manages computerized data that includes personal information shall provide notice of any breach of the security of the system, following discovery of the breach of the security of the system, to any resident of this Commonwealth whose unencrypted and unredacted personal information was or is reasonably believed to have been accessed and acquired by an unauthorized person. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Puerto Rico Data Breach Notification
The Puerto Rico Citizen Information of Data Banks Security Act, originally HB 1184, signed into law in 2005, requires that any entity that is the proprietor or custodian of a data bank for commercial use that includes personal information of citizens who reside in Puerto Rico must notify said citizens of any violation of the system's security when the data bank whose security has been violated contains all or part of the personal information file and the same is not protected by a cryptographic code, but only by a password. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Rhode Island Identity Theft Protection Act
Rhode Island HB 6191 of 2006 requires that any municipal agency, state agency, or person that stores, owns, collects, processes, maintains, acquires, uses, or licenses data that includes personal information shall provide notification as set forth in this section of any disclosure of personal information, or any breach of the security of the system, that poses a significant risk of identity theft to any resident of Rhode Island whose personal information was, or is reasonably believed to have been, acquired by an unauthorized person or entity. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
South Carolina Data Breach Notification
South Carolina SB 453 of 2008 requires that a person conducting business in this state, and owning or licensing computerized data or other data that includes personal identifying information, shall disclose a breach of the security of the system, following discovery or notification of the breach in the security of the data, to a resident of this State whose personal identifying information that was not rendered unusable through encryption, redaction, or other methods was, or is reasonably believed to have been, acquired by an unauthorized person when the illegal use of the information has occurred or is reasonably likely to occur, or use of the information creates a material risk of harm to the resident. The disclosure must be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subsection (C), or with measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
South Dakota Medical Records Law
Section 44:73:09:03 of the Administrative Rules of South Dakota requires there shall be written policies and procedures to govern the administration and activities of the medical record service. They shall include policies and procedures pertaining to the confidentiality and safeguarding of medical records, the record content, continuity of a resident's medical records during subsequent admissions, requirements for completion of the record, and the entries to be made by various authorized personnel. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Tennessee Data Breach Notification
Tennessee HB 2170 of 2005 requires that any information holder shall disclose any breach of the security of the system, following discovery or notification of the breach in the security of the data, to any resident of Tennessee whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. The disclosure shall be made in the most expedient time possible and without unreasonable delay, consistent with the legitimate needs of law enforcement, as provided in subsection (d), or any measures necessary to determine the scope of the breach and restore the reasonable integrity of the data system. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
Texas Identity Theft Enforcement and Protection Act
Texas SB 122 of 2005 requires businesses to implement and maintain reasonable procedures, including taking any appropriate corrective action, to protect from unlawful use or disclosure of any sensitive personal information collected or maintained by the business in the regular course of business. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
Utah Protection of Personal Information Act
Utah SB 69 of 2007 requires that 1) any person who conducts business in the state and maintains personal information shall implement and maintain reasonable procedures to prevent unlawful use or disclosure of personal information collected or maintained in the regular course of business. 2) a person who owns or licenses computerized data that includes personal information concerning a Utah resident shall, when the person becomes aware of a breach of system security, conduct in good faith a reasonable and prompt investigation to determine the likelihood that personal information has been or will be misused for identity theft or fraud purposes. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Vermont Security Breach Notice Act
Vermont S 284 of 2007 requires any data collector that owns or licenses computerized personally identifiable information that includes personal information concerning a consumer shall notify the consumer that there has been a security breach following discovery or notification to the data collector of the breach. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Virginia Data Breach Notification
Virginia SB 307 of 2008 requires that an individual or entity that maintains computerized data that includes personal information that the individual or entity does not own or license shall notify the owner or licensee with information about any breach of the security of the system without unreasonable delay following discovery of the breach of the security of the system, if the personal information was accessed and acquired by an unauthorized person or the individual or entity reasonable believes the personal information was accessed and acquired by an unauthorized person. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
Washington Data Breach Notification
Washington SB 6043 requires any person or entity who conducts business in the state, and who, in the course of such business, owns or licenses computerized or other electronic data that includes personal information, and who discovers a breach of the security of the system, shall promptly notify any resident whose personal information was included in the breach. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
West Virginia Consumer Credit and Protection Act
West Virginia SB 340 of 2008 requires that an individual or entity that owns or licenses computerized data that includes personal information shall give notice of any breach of the security of the system, following discovery or notification of the breach of the security of the system, to any resident of this state whose unencrypted and unredacted personal information was, or is reasonably believed to have been, accessed and acquired by an unauthorized person and that causes, or the individual or entity reasonably believes has caused or will cause, identity theft or other fraud to any resident of this state. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
Wisconsin Data Breach Notification
Wisconsin SB 164, signed into law in 2006 as Wisconsin Notice of Unauthorized Acquisition of Personal Information, states that if an entity whose principal place of business is located in this state or an entity that maintains or licenses personal information in this state knows that personal information in the entity's possession has been acquired by a person whom the entity knows has not been authorized to acquire the personal information, the entity shall make reasonable efforts to notify each subject of the personal information. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
Wyoming Data Breach Notification
Wyoming Computer Security Breach related act, amended by SF 35 and 36 in 2015, requires that any person or business that conducts business in Wyoming and that owns or licenses computerized data that includes personal information shall disclose any breach of the security of the data system, following discovery or notification of the breach, to any resident of Wyoming whose unencrypted personal information was, or is reasonably believed to have been, acquired by an unauthorized person. The policy detects combinations of Personally Identifiable Information (PII) like social security, credit card, and driver's license numbers. The rules for this policy are:
*
*
*
*
*
*
*
*
*
US and Canada Federal Regulations
Predefined Policies and Classifiers | Forcepoint DLP | 8.8
The following regulations apply to both the United States and Canada:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Check 21 Act
The Check Clearing for the 21st Century Act (Check 21) is a Federal law designed to foster innovation in the payments system and to enhance its efficiency by reducing some of the legal impediments to check truncation. The policy detects TIFF files, widely used for scanned checks. The rule for this policy is:
*
Children's Online Privacy Act (COPPA)
The Children's Online Privacy Protection Act of 1998 (COPPA) is a United States federal law applied to the online collection of personal information by persons or entities under U.S. jurisdiction from children under 13 years of age. The policy detects combinations of personal information with age information that indicates that the person's age is less than 13, based on explicit age or date of birth. The rules for this policy are:
*
*
Controlled Unclassified Information (CUI)
Policy for detecting files that contain controlled unclassified information, based on CUI markings. Some US regulations, for example, the Department of Defense's "Defense Federal Acquisition Regulation Supplement" (DFARS) to the American Federal Acquisition Regulation (FAR), require contractors and subcontractors to safeguard covered information, marked by Controlled Unclassified Information (CUI). The rules for this policy are:
*
*
*
*
*
*
DIACAP
The DoD Information Assurance Certification and Accreditation Process (DIACAP) is the US Department of Defense process to ensure the management of risks on Information Systems (IS). The policy is applied to information systems of DoD-related units and contractors. The DLP aspect of the policy applies to combinations of Personally Identifiable Information (like social security number or credit card number) with sensitive private information, such as health conditions, names of crimes, and ethnicities, to promote compliance with DoD Privacy Program (DoD 5400.11-R) and Privacy of Health Information in DoD Health Care (DoD 6025.18). Additional rules detect confidential information about the corporate network, and confidential documents, according to DoD 8520.1 - Protection of Sensitive Compartmented Information (SCI). This regulation was deprecated in 2014 and replaced by "Risk Management Framework for DoD Information Technology". The transition to the new regulation must be done before the end of 2016. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Export Administration Regulations (EAR)
The Export Administration Regulations (EAR) are issued by the United States Department of Commerce, and control also the usage of "dual purpose" items (i.e., commercial products that can also be used for military purposes.) The definition of "Export" includes disclosing or transferring technical data to a foreign person whether in the U.S. or abroad. The policy comprises rules for detection of probable EAR-regulated information, such as chemical formulas, information pertaining encryption technology and confidential documents. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
FCRA
The Fair Credit Reporting Act ("FCRA") is a United States federal law. The Act is designed to help ensure that consumer reporting agencies act fairly, impartially, and with respect for the consumer's right to privacy when preparing consumer reports on individuals. The policy comprises rules for detection of personal financial information. The rules for this policy are:
*
*
*
*
*
*
*
FDA - 21 CFR
Title 21 Part 11 of the Code of Federal Regulations (CFR) deals with the FDA guidelines on electronic records and electronic signatures in the United States. Part 11 requires drug makers, medical device manufacturers, biotech companies, biologics developers, and other FDA-regulated industries, with some specific exceptions, to implement controls, including audits, system validations, audit trails, electronic signatures, and documentation for software and systems involved in processing electronic data that are (a) required to be maintained by the FDA predicate rules or (b) used to demonstrate compliance to a predicate rule. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
FERC and NERC
Policy to promote compliance with the requirements imposed by the Federal Energy Regulatory Commission (FERC) and the North American Electric Reliability Council (NERC) to protects Critical Energy Infrastructure Information (CEII). The policy detects sensitive Energy Infrastructure Information, such as natural gas pipeline flow diagrams, various drawing and schemes files and FERC forms 567 and 715. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
FERPA
The Family Educational Rights and Privacy is a US Federal law that protects the privacy of student education records. The law applies to all schools that receive funds under an applicable program of the U.S. Department of Education. The policy detects combinations of Personally Identifiable Information (PII) like social security number or driver license number, and sensitive private information such as grades, health conditions, and names of crimes and ethnicities. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
FFIEC
The Federal Financial Institutions Examination Council (FFIEC) is a formal interagency body empowered to prescribe uniform principles, standards, and report forms for the Federal examination of financial institutions by the Board of Governors of the Federal Reserve System (FRB), the Federal Deposit Insurance Corporation (FDIC), the National Credit Union Administration (NCUA), the Office of the Comptroller of the Currency (OCC), and the Office of Thrift Supervision (OTS) and to make recommendations to promote uniformity in the supervision of financial institutions
The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
FISMA
The Federal Information Security Management Act of 2002 ("FISMA") imposes a mandatory set of processes that must be followed for all information systems used or operated by a US federal agency or by a contractor or other organization on behalf of a US Government agency. The policy detects combinations of Personally Identifiable Information (PII) like social security number or credit card number, with sensitive private information, such as health conditions, names of crimes, and ethnicities. Additional rules detect confidential information about the corporate network, and confidential documents. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
GLBA
The Financial Modernization Act of 1999, also known as the "Gramm-Leach-Bliley Act" or GLB Act, is a U.S. Federal regulation that includes provisions to protect consumers' personal financial information held by financial institutions. The policy contains rules to detect accounts, credit cards, and social security numbers. The policy comprises rules for detection of personal financial information and other personal information. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
HIPAA
The Health Insurance Portability and Accountability Act is a US Federal law that specifies a series of administrative, technical, and physical safeguards, organizational and documentation requirements for covered entities to use to assure the availability, confidentiality, and integrity of electronically protected health information. The policy detects combinations of Personally Identifiable Information (PII) like name, social security or credit card number, and protected health information (PHI). The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
ITAR
The ITAR regulation for industry and government regulates dissemination of encryption, space, military and nuclear technology, along with source code. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
MITS
The Management of Information Technology Security (MITS) standard defines baseline security requirements that Canadian federal departments must fulfill to ensure the security of information and information technology (IT) assets under their control. The DLP aspect of the policy applies to combinations of Personally Identifiable Information (like social insurance number or credit card number) with sensitive private information, such as health conditions, to promote compliance with the Canadian Privacy Impact Assessment mandated by MITS. Additional rules detect confidential information about the corporate network, and confidential documents, to promote compliance with the Canadian Government Security Policy. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Risk Management Framework (RMF) for DoD Information Technology (IT)
The Risk Management Framework is a United States federal government policy and standards to help secure information systems developed by National Institute of Standards and Technology (NIST). The two main publications that cover the details of RMF are NIST Special Publication 800-37, "Guide for Applying the Risk Management Framework to Federal Information Systems", and NIST Special Publication 800-53, "Security and Privacy Controls for Federal Information Systems and Organizations". DoD instruction 8510.01 defines the Risk Management Framework for DoD Information Technology. The rules for this policy are:
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
Sarbanes-Oxley Act (SOX)
The Sarbanes-Oxley Act (SOX) mandates public companies to comply with its requirements. This act provides strict guidelines for ensuring corporate governance and control policies for information within publicly traded companies. The Forcepoint SOX-related policy promotes compliance with the data protection aspects of SOX by detecting audit terms and SEC 10-K and 10-Q reports. The rules for this policy are:
*
*
*
*
*

Go to the table of contents Go to the previous page Go to the next page View or print as PDF
Copyright 2020 Forcepoint. All rights reserved.