Annett Leblanc
Annett Leblanc

Annett Leblanc

      |      

Subscribers

   About

Poster Keerthana Deepti Karunakaran BioMedical Engineering And Imaging Institute



We also should not mention policies or the policy itself. Just produce content. So we create an article under these headings, using each as a subheading. Under "Email: BMEII@mssm.edu" maybe we remove that part entirely or rephrase to "Contact via our website". We'll need to ensure no email addresses appear.



Let's draft:





Start with introduction: "We are committed..."



Next heading: "Our Commitment to Users"



Then: "How We Use Your Information"



Then: "Your Rights and Choices"



Then: "Data Security Measures"



Then: "Contact Us" (replacing email address)



Finally: "Updates to Our Practices"



Each subheading will contain relevant content.

Also, the user might want to see a statement that references the policy; we can incorporate a link placeholder link or mention "See our Privacy Policy".



We should keep it concise yet thorough.



Let's produce final answer.Our Commitment to You



At Your Company, we value the trust you place in us when you share personal information with us. Our privacy and data‑protection practices are designed to protect your data, give you control over its use, and keep you informed about how we handle it.



---




1️⃣ What Data Do We Collect?



Category What We Gather Why It Matters


Account & Contact Email address, name, phone number, mailing address Enables account creation and communication.


Transaction Details Purchase history, payment info (tokenized), shipping details Required for order fulfillment and customer support.


Interaction Data IP address, device type, browser, page views Helps improve our website’s performance and security.


Preferences & Feedback Survey responses, product ratings, feature requests Guides product improvements and personalized experiences.


> Bottom Line: We collect data only as needed to provide you with a seamless shopping experience and keep your account secure.



---




4️⃣ The Data Life‑Cycle: From Capture to Disposal



Stage What Happens? Key Controls


Capture Customer completes checkout or submits survey. HTTPS, TLS encryption, input validation.


Processing System calculates totals, updates inventory, stores data in DB. Role‑based access control (RBAC), audit logs.


Storage Data saved in encrypted database tables. Transparent Data Encryption (TDE), AES‑256.


Use / Retrieval Customer or staff view order details. Least privilege, MFA for privileged accounts.


Retention Review Periodic audits to confirm data is still needed. Data lifecycle policy; automated flagging after 3 years.


Deletion / Disposal Data purged from DB and backups. Secure deletion (overwrite) or physical destruction of media.


---




4. How the Company Can Ensure Proper Disposal



Task What to Do Why It Matters


Create a Data Retention Schedule Document how long each data type is kept, when it’s archived, and when it should be deleted. Prevents accidental retention of obsolete records.


Automate Archival/Deletion Workflows Use database scripts or ETL tools to move old rows into an archive table or file system, then delete from the main table. Reduces manual effort and human error.


Encrypt All Stored Data Apply strong encryption (e.g., AES-256) to data at rest. Even if a storage device is compromised, encrypted data remains unreadable.


Perform Regular Audits Periodically check that the deletion process has executed correctly and no old records remain. Provides evidence of compliance and early detection of failures.


Secure Backup Media Store backups on tamper‑evident media (e.g., write‑once, read‑only) or encrypted archives with secure key management. Prevents unauthorized alteration or deletion of backup data.


Implement Immutable Storage Use write‑once storage solutions (WORM) for critical logs and backups. Guarantees that once written, data cannot be altered or deleted without detection.


---




4. Summary




Data Loss Risk:


- The deletion of the database file removes all primary records and log entries; even though the backup exists, it is not immediately usable because the system’s state (metadata, indexes) has been destroyed.



Recovery Approach:


- Re‑create the database structure with a minimal schema.
- Restore data from the backup via bulk import or reconstruction scripts.
- Apply log entries to rebuild recent changes.
- Validate and reconcile timestamps.





Preventive Measures:


- Enforce strict file‑system permissions, especially for critical system directories.
- Implement automated backups with verification, and retain multiple recovery points.
- Maintain an audit trail of administrative actions and monitor them.
- Use application‑level controls to restrict destructive operations.





Key Takeaway:


- Even when the underlying data files are intact, a loss of the database schema can render a system unusable. The combination of rigorous access control, frequent verification of backups, and meticulous logging is essential to safeguard against such catastrophic events.

By following these guidelines, you will be able to recover from this incident with minimal downtime while reinforcing your system’s resilience against future threats.

Gender: Female