of organizations have a data breach reporting procedure that is aligned with GDPR requirements. Source: Deloitte.
of revenue is the maximum penalty for organizations who fail to comply with GDPR. Risk of litigation, loss of brand reputation and customer loyalty are also likely outcomes.
damages is associated with a large data breach. For smaller breaches, the average is about $$3.86 Million. Source: IBM and the Ponemon Institute.
data records got lost or stolen since 2013. Everyday, approximately 6.1 Million records are lost or stolen. Source: Gemalto.
Teramind for GDPR provides user activity and data exfiltration monitoring capabilities to help organizations detect, investigate, and report on data breaches.
Leveraging advanced fingerprinting, OCR and tagging technology, Teramind identifies personal and sensitive data in structured and unstructured information across organization data stores.
Teramind leverages its activity monitoring and data loss prevention capabilities to defend confidential and private information from unauthorized access, sharing, attack and misuse.
Teramind’s powerful behavior-based policy and rules engine casts a strong detection net over the entire organization, allowing for quick detection of insider threats and data breach incidents before it happens.
Real-time notification and immediate actions proactively defend against data exfiltration, malicious or accidental insider threats and data breaches. In case of an incident, pinpoint the exact cause and source of the incident with readily available audit and forensic data.
Meet GDPR record keeping requirements with detailed incident reports, alerts and session recordings. Exportable reports can be shared with the Controller, DPO, auditors and other members of the compliance team.
![]() ![]() |
Principles relating to processing of personal data (GDPR Article 5)Teramind for GDPR can ensure data is processed lawfully and not exfiltrated to unauthorized systems and mediums. Data classification can be set to identify personal data and then policies and rules can be created using advanced OCR and fingerprinting features to detect and restrict access to such data automatically. |
![]() ![]() |
Processing of special categories of personal data (GDPR Article 9)Article 9 lays out further requirements for special categories of personal data. For example, Member States may maintain or introduce further conditions, including limitations, with regard to the processing of genetic data, biometric data or data concerning health. |
![]() ![]() |
Data protection and design by default (GDPR Article 25)Teramind for GDPR can ensure data is processed only in the context it is required to be processed. Monitoring settings can be configured to only record the necessary information. For example, keystrokes or screen capture can be disabled when a user enters their personal banking site or personal emails. |
![]() ![]() |
Record of processing activities (GDPR Article 30)GDPR requires organizations to maintain an up-to-date record of the locations and usage of personal information and product/demonstrate safeguards used to protect the data. This could be information in files, databases, email, unstructured data, backups, DMS, knowledge bases, or anything else that houses data. |
![]() ![]() |
Security of processing (GDPR Article 32)Part of Article 32 states that the Controller and the Processor shall implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk. |
![]() ![]() |
Notification of a data breach (GDPR Article 33)Teramind for GDPR can provide full forensics with respect to a data incident, and a video recording of the event. Detailed alert reports can be exported including any security incidents and what actions were taken in minutes superseding the 72 hour limit set by GDPR. Session recordings and history playback can be used to provide proof for further forensic investigation. |
![]() ![]() |
Supporting the data protection officer (GDPR Article 38)Some key responsibilities of the DPO is advising the Controller on various GDPR initiatives and monitor the effectiveness of the compliance measures and identify any risk associated with data processing operations. |
![]() ![]() |
Monitoring of approved codes of conduct (GDPR Article 41)Teramind for GDPR monitors all employee, contractor and third-party vendor activity including file access, apps and website usage and all other interactions within the local, network or Cloud environments. Business etiquette rules can be created to train the users about nonconformity and influence corrective behavior. |
On-premise - control the Teramind implementation in its entirety, stay off-cloud if that’s your firm’s operational model, leverage LDAP groups and users to identify which users and groups to apply which policies and rules to.
Teramind Private Cloud - use your own secure, scalable private cloud implementation including AWS, Google Cloud, Azure and more.