Data Breach Notification

Definition: A data breach occurs when data for which a company is responsible suffers a security incident that results in a breach of confidentiality, availability or integrity.


ayfie's main products for Data Breach Notification:


ayfie product overview:

ayfie provides efficient workflows that empower your incident response team
in case of a data breach.

Do you store personal data about your employees? Customers? Suppliers? Leads? Should this data fall into the hands of unauthorized people, e.g. through a hacker attack, there is also the obligation to inform each individual. Without suitable software, the effort required for this can be business-threatening.

Since the introduction of the GDPR laws in May 2018, exorbitant fines have been threatened if required reports are not available for affected people within a short time. However, in an age of exponentially growing data volumes, numerous cloud providers, and a wide variety of data protection models, it is becoming increasingly difficult to meet the legal requirements without special solutions.

  • Was PII included? Quickly understand, if PII was leaked at all.
  • Which PII was included? Get an instant overview of leaked types of PII.
  • Who do I need to notify? Easily generate a list of affected persons.

SCHEDULE A DEMO

72h

In the event of a personal data breach, data controllers must notify the appropriate supervisory authority without undue delay and, if possible, no later than 72 hours after becoming aware of it (Article 33 of the GDPR).

$24M

The GDPR sets exorbitant fines of up to $24 million or 4% of the total worldwide turnover of the preceding financial year - whichever is higher - for infringements.

$3.9M

Based on a recent study conducted by IBM the average cost of a data breach is $3.9M. Main cost contributors are detection and escalation, notification, post data breach response and lost business cost.

Detection of more than 200 types of PII - no matter where the data is stored.

ayfie recognizes more than 200 relevant types of personal data (names, ID numbers, credit card details) in unstructured documents, including in particular Word/PDF files, e-mails or presentations. Due to the efficient combination of linguistics and artificial intelligence, ayfie is able to automatically recognize and process these entities in over ten languages fluently. Compared to other solutions, ayfie's linguistic approach provides a significantly higher hit rate with unparalleled accuracy.

Due to the large number of connectors to different data sources, ayfie can access almost any conceivable document repository within a organization. All documents processed by ayfie are indexed, scanned for personal data and stored with the access rights of the original source. Thus, they are efficiently available at any time for searches, reports and risk analyses.

 

 

Jeanne Somma, ayfie's Legal Insights Executive and Counsel, provides an overview of how to use ayfie Inspector to handle Breach Notification Review and Reporting efficiently, while reducing the inherent risk of noncompliance.

It really is that easy!


  1. Select
    the breached data set, e.g. in Relativity or ayfie Locator.

  2. Process
    all relevant data with ayfie's predefined profiles for PII detection.

  3. Retrieve
    instant results of the affected documents.

  4. Code
    efficiently without opening the native files.

  5. Generate
    a report containing all relevant information.

Experience our solutions for PII

Learn how ayfie can empower your incident response team and protect you from fines.

 

GET IN TOUCH