The external transfer of PI (personal information) is now a core operational business process across a wide variety of industries. IT organizations in industries such as retail, transportation, financial services, healthcare, entertainment, telecommunications and government as well as IT and business process outsourcers routinely collect, process and transmit PI. From a security perspective, data in transit is data at risk. IT teams must review their exposure to attack through the tools, technologies and processes they employ to externally share PI.
While data protection regulations around the world vary significantly, a small number of data security controls can go a long way to assuring compliance. This whitepaper will cover the seven security controls that are key to assuring regulatory compliance when transferring data externally.