Remove privacy
article thumbnail

Quality, Security & Privacy at Neeyamo

Neeyamo

ISO 9001: 2015. ISO 27017:2015. ISO 27017:2015 refers to the Code of practice for information security controls applicable to the provision and use of cloud services. Neeyamo, as an organization, is committed to protecting privacy rights and pledges to protect the personal information of its customers and employees.

article thumbnail

[Podcast] What if You Could Be as Customer Obsessed as a Retailer? An Interview With James Hannis

Perficient Digital Transformation

This episode also touches on the nuances of personalization within the privacy constraints of the healthcare industry and the digital hurdles that come with a traditional, B2B-focused business.

Retail 52
professionals

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mercans achieves ISO 27017 and ISO 27018 certifications

Mercans

These two additional certifications highlight the company’s ongoing commitment to providing its customers with the gold standard in data security and privacy. We demonstrate Mercans commitment to ensuring your data is secure and that we adhere to the strictest data privacy rules. What are the ISO 27017 and ISO 27018 standards?

Payroll 40
article thumbnail

Is Outsourcing Offshore Right for You? Pros and Cons

Magellan Solutions

Data Security and Privacy Concerns When you outsource offshore, you entrust sensitive data and information to a third-party provider. It can raise concerns about data security and privacy as the risk of compromised or mishandled confidential information increases. Overcoming these barriers requires a proactive and adaptable approach.

article thumbnail

Philippine Laws on Outsourcing

Magellan Solutions

Republic Act 10844: The Department of Information and Communications Technology Act of 2015. Republic Act of 10173: The Data Privacy Act of 2012. Due to the global nature of outsourcing, the Data Privacy Act also makes sure that local data security laws are also in accordance with data privacy laws in the countries they service.

article thumbnail

Beyond Encryption: Protect sensitive data using l-diversity

Perficient Digital Transformation

In a 2015 study conducted by Vanessa Teague, credit card transactions from 1.1 For privacy reasons, the data was anonymized using a technique that removes the name, address, and account numbers of each person. Many of the individuals identified in the cell-phone data set created by Yatskar and his team have been reidentified.

article thumbnail

The intangible cost of non-compliance

Mercans

In a 2011 study by the Michigan-based information and privacy management-focused Poneman Institute, the cost of non-compliance was estimated to be three-times more than compliance. Loss of trust due to transparency around privacy and data security.