Introducing User Data Governance

Coro's User Data Governance aims to establish an all-encompassing and proactive strategy for correct and secure data handling by a business's end users (employees, contractors, third-party vendors, etc.), as well as risk mitigation for data breaches, data leaks, data loss, and other security threats when accessing, viewing, sharing, and moving data across the business's cloud apps and via email. Compliance with these strategies requires the definition and implementation of policies, procedures, and controls in accordance with applicable laws, regulations, and industry standards.

Coro's User Data Governance helps in meeting regulatory requirements. The following are some examples of regulatory requirements that Coro can assist you with:

  • HIPAA
  • GLB
  • GDPR
  • SOC2
  • SOX

Coro's User Data Governance monitors for:

  • PII (personally identifiable information)
  • PHI (protected health information)
  • PCI (payment card information)
  • NPI (non-public information)

Additionally, Admin users can configure monitoring for the following business-sensitive data:

  • Passwords
  • Certificates
  • Source code
  • Data objects with specific keywords
  • Specific file types

Threat types

Coro's User Data Governance provides the means to reduce the risk of data breaches and to protect sensitive information from unauthorized access and misuse. A number of threats can place an organization's data at risk and it is important to be aware of them and take measures to limit their impact:

  • Cyber attacks : Cybercriminals can use a variety of methods to access sensitive information, such as hacking into systems, phishing scams, and malware.
  • Insider threat : Employees and contractors can intentionally or unintentionally access or misuse sensitive information.
  • Physical theft : Sensitive information can be stolen or lost through physical theft or misplacement of laptop and smartphone devices.
  • Human error : Human error such as accidentally sending sensitive information to the wrong person, can result in data breaches.

Log into the Coro console with your admin credentials to configure, review, and analyze the data protection activities that are being captured for both protected and unprotected users in your organization.

To learn more about the privacy and security regulations with which Coro can help, see Compliance with Coro.