Everything You Need to Know About Data Privacy in Salesforce PowerPoint PPT Presentation

presentation player overlay
About This Presentation
Transcript and Presenter's Notes

Title: Everything You Need to Know About Data Privacy in Salesforce


1
Everything You Need to Know About
Data Privacy in Salesforce
2
Research by Salesforce shows that 46 of
customers do not feel that they have control
over their own data while 63 think that
companies are not using their data in a very
transparent manner.
Overview
A January 2019 Cisco Data Privacy Benchmark Study
reported that 59 of companies claimed that they
were compliant with the rules of the General
Data Protection Regulation or GDPR, a data
protection law enforced by the EU on May 25,
2018, while 29 more believed they would be by
2020. Yet, Marketing Week research showed that
even as one year of the GDPR is in effect was
about to be completed, only 31 of consumers
felt secure about how their data was being
utilized by organizations.
3
1. Salesforce Data Security Model
  • Here is everything you need to know about
    responsible and secure data management in
    Salesforce.

Salesforce uses the shard responsibility data
security model. This means that while Salesforce
is responsible for maintaining the security of
the cloud, organizations using it are
responsible for maintaining the safety of data in
the cloud. Thus, Salesforce acts as the
processor, providing all required resources and
tools for companies to implement operational
outcomes in business necessary to comply with
applicable global and local data protection laws.
4
2. Salesforce Data
Encryption
To ensure that importing data into and exporting
data from Salesforce is done securely, the
latest TLS encryption certificates are used.
Edge routers and firewalls act as gatekeepers of
data between internal and external networks.
Encryption of data at rest can be done in
Force.com that allows one to define encrypted
custom fields using AES 128, ie, 128-bit
Advanced Encryption Standard.
5
3. Salesforce Access Control
Two-factor authentication is a great way to
ensure that only authorized users are able to
access the company Salesforce database and
platform. You can control whether you want
two-factor authentication to be done for every
login or for specific actions only. You can
also enforce password criteria like complexity,
length, expiration period, reuse and hint
restrictions, and autocomplete and caching
prevention.
6
4. Salesforce Health
Check
Minimum password complexity
The Salesforce Health Check is a useful tool that
allows you to assess the quality of data privacy
and security of your system in comparison to the
Baseline Standards set by Salesforce in
accordance with the industry-level grades. It
scores your system in a percentage form based on
how well you comply with or exceed the
standards, flags out any indication of failure
to do so, and suggests actions to affect desired
business outcomes for better data privacy. Some
of the settings checked are
Maximum invalid login attempts
Forced logouts on session timeouts
7
5. Salesforce User Permission Rules
You can set permission rules to determine who is
able to view, access, and modify certain data in
your system. These permissions can be set for
specific objects, individual fields in the
objects, and even records, for different users.
You can also define role hierarchies to define
which data is accessible to whom depending on
their role in the system.
8
Field Audit Trails This allows you to view the
data history of as many as 60 fields of every
custom object, account, case, contact, lead, and
opportunity, up to as far back as 10 years. This
helps you in salesforce data cleaning and audit
trail maintenance.
6. Salesforce Shield Salesforce Shield is an
extremely powerful tool that allows users to
greatly augment the level and strength of the
security of data stored on the platform. It has
three parts to do this.
Event Monitoring The tool allows you to
generate detailed logs of any changes, including
user and application activity, and have it
delivered in 24 hours through the SOAP API and
REST API. The data can then be fed into a
visualization tool like Salesforce Analytics to
detect anomalies and threats.
Platform Encryption Using Shield, you can
encrypt fields as well as files with no size
restriction, using 256 AES. It also allows
platform actions so that the encryption is
uninterrupted. Management of the encryption key
rests with the user.
9
Conclusion
While no company, no matter how careful, can
eliminate data privacy risks completely, they
can do their best. By using the right tools,
employing a DPO, implementing Salesforce data
cleansing best practices and change monitoring,
and enforcing key business outcomes to
strengthen data protection in Salesforce.
10
14704008988
Contact Us
info_at_docmation.com
www.docmation.com
WWW. DOCMATION. COM DOCMATION 2021 . ALL
RIGHTS RESERVED.
Write a Comment
User Comments (0)
About PowerShow.com