Verbatim AntiVirus 64GB 47464 Manual Do Utilizador
Códigos do produto
47464
2
3
The EU Directive 95/46/EC of the European Parliament
has been put in place to harmonise data protection laws
across the EU. The law focuses on seven key principles
concerning the use and access to personal data.
Member states of the EU have generally implemented
their own local data protection laws what refl ects the
principle of this directive (e.g. the UK Data Protection
Act or Germany’s Federal Data Protection Act /
Bundesdatenschutzgesetz).
has been put in place to harmonise data protection laws
across the EU. The law focuses on seven key principles
concerning the use and access to personal data.
Member states of the EU have generally implemented
their own local data protection laws what refl ects the
principle of this directive (e.g. the UK Data Protection
Act or Germany’s Federal Data Protection Act /
Bundesdatenschutzgesetz).
The principal of data security has been
defi ned as follows:
defi ned as follows:
Data security is the means of ensuring that data
is kept safe from corruption and that access to it is
suitably controlled. Thus data security helps to ensure
privacy. It also helps in protecting personal data.
is kept safe from corruption and that access to it is
suitably controlled. Thus data security helps to ensure
privacy. It also helps in protecting personal data.
• The fi rst and most basic Data Security measure is
Data Encryption
• Encryption is the process of converting information
into an encrypted form, so that it is available
only to someone who knows how to ‘decrypt’ it
in order to obtain the original data. Encryption
tools can vary in the type of encryption (software/
hardware), exact encryption algorithm used and in
the way it’s implemented (full drive, partial or
per- fi le encryption).
only to someone who knows how to ‘decrypt’ it
in order to obtain the original data. Encryption
tools can vary in the type of encryption (software/
hardware), exact encryption algorithm used and in
the way it’s implemented (full drive, partial or
per- fi le encryption).
Data-losing companies may be forced
to spill to public
to spill to public
The EU Commission has said that it will investigate
the passing of new EU-wide legislation forcing all
kinds of organisations to notify any data breaches to
the relevant authorities and the people affected. So,
not only should organisations ensure data is secure
for legal reasons, they should also do it to protect the
company’s reputation.
the passing of new EU-wide legislation forcing all
kinds of organisations to notify any data breaches to
the relevant authorities and the people affected. So,
not only should organisations ensure data is secure
for legal reasons, they should also do it to protect the
company’s reputation.
A data loss incident is no longer seen as an unfortunate accident; now there is a high
possibility that an organisation or individual executives will be subject to legal action.
Those responsible for IT within companies need to be aware; today, data loss is a
signifi cant legal and regulatory issue.
possibility that an organisation or individual executives will be subject to legal action.
Those responsible for IT within companies need to be aware; today, data loss is a
signifi cant legal and regulatory issue.
Contents
EU Compliance Regulations for IT Professionals
EU Compliance Regulations for IT Professionals . . . . . . . . . . . . . . . . . . . . 3
About Verbatim Secure ‘n’ Go . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Benefi ts of Hardware Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Verbatim Encryption Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Secure Data USB Drive Business . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Secure Data USB Drive / SSD ExpressCard
Remote
. . . . . . . . . . . . . . . . . . 8
Secure Data USB Drive / SSD ExpressCard
AntiVirus
. . . . . . . . . . . . . . . . . 9
Verbatim Control System (VCS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Secure Data USB Drive
FIPS 140-2
. . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Secure Data HDD Backup “PowerBay” . . . . . . . . . . . . . . . . . . . . . . . . . 12
Secure Data SSD 6,35cm (2,5’’). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Secure Data Software “EasyLock” . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Secure Data DVD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Product Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
What product fi ts my purpose? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Verbatim Security Micropage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Best practise – 10 Tips for Dummies. . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Contact details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
les
ed
e
n
A computer memory stick containing details of a military
training exercise was found on the
fl oor of a West country
nightclub, it has emerged. Files on the memory stick, which
could be opened on any personal computer
, included travel and
accommodation details as well
as some personal details.
Western Morning News
A computer memory stick said to contain top-secret
information on terror suspects has been lost by police, it has
been reported. The black 4GB stick went missing after being
taken out of a police station by an of
fi ce on patrol in the
West
Midlands last Thursday
.
Daily Mail
The personal details of every prisoner in England and
Wales have
been lost by a government contractor in the latest data security
breach in Whitehall. Police were called in after a consultancy
fi rm working for the government lost a computer memory stick
containing the private information.
London (Reuters)
Your company’s reputation and assets are at risk
It doesn’t have to be this way...
sensitive data + encryption
= legal compliancy