Breakwater Solutions
  • Home
  • Products
    • Product Overview
    • StoredIQ for Information Governance
    • StoredIQ for Legal
    • StoredIQ InstaScan
    • Breakwater Cyber Response
    • Breakwater DSAR Response
    • Breakwater Inventory
    • Atlas Policy Management
    • Atlas eDiscovery Management
    • eDiscovery Manager
  • Consulting & Advisory
    • Consulting & Advisory Overview
    • Information Governance
    • Litigation & Disputes
    • Investigations & Regulatory Response
    • Cybersecurity
    • Global Data Privacy
    • Legal Data & Technology Solutions
    • Professionals
  • Managed Services
  • About
    • About
    • Leadership
    • News
    • Careers
    • Resources
  • Contact
  • Search
  • Menu Menu

Breakwater DSAR Response

Perform DSAR response on unstructured data to drive insight and compliance.

Breakwater DSAR ResponseTM helps organizations comply with GDPR, CCPA/CPRA, and other privacy regulations. It compliments and augments your existing DSAR compliance system by extending your ability to locate and act upon customer data within your enterprise.

Because GPDR allows individuals to request a full list of personal data that an organization stores on them, searching standard databases is not sufficient. Structured data systems, like customer relationship management, marketing automation, ecommerce orders and transactions are relatively easy to search and export targeted customer data. The reality is that this data is often exported by employees for other tasks, typically for importing between systems, or performing data cleansing or analysis on their local computers. As a result, customer data can often be found on laptops, files stores, content repositories, and collaboration systems. This is where Breakwater can help.

Breakwater DSAR Response

Benefits

Comply with your privacy obligations

Adhere to GDPR, CCPA, and any other regulations that require you to know what’s in your data and how it flows through your organization and beyond. Delete all customer data upon request and prove compliance.

Privacy by design

Confirm what’s in your data, where it lives, who’s accessing it, and how it’s being used.

Identify privacy breaches

Immediately identify what’s been breached and notify subjects. Provide personal data and confirm its history to respond to regulators and consumers.

Key Features

Data Identification & Categorization

IDENTIFY ANY CONTENT, ANYWHERE IN YOUR SYSTEM

Examples:

  • Employee data: name, address, email
  • Client data: name, address, email
  • SSN, CCN, acct number, DL number, passport number
  • PHI/HIPAA Data
  • Source code
  • Intellectual property
  • Contracts
  • Financial statements
  • Junk/ROT
  • Database info extracts
Data Lineage

SHOWS DOCUMENT LIFECYCLE

  • Creation, change, and movement
  • Map to people and organizations/groups

IDENTIFIES DATA FLOWS

  • Business processes: aggregate repeated process by time, person, or organization
  • Data flows between organizations, systems, and people

PATENT-PENDING BLOCKCHAIN TECHNOLOGY

  • Chain together documents using:
  • Initial hash
  • Hash on save
  • Hash on open
  • Who accessed the file
  • Who took the action
  • Detect branching
  • Immutable and reliable
  • Centrally tracked
Data Actions

ACTIONABLE INTELLIGENCE

  • Based on custom and built-in policies
  • Actions can be permanent, temporary, user-selected, targeted
  • Actions can be taken on data elements, documents, employees, organizations

ACTION AUTOMATION

  • Mask
  • Delete
  • Alert/report
  • Quarantine
Employee & Organization Mapping

SEE INTO THE PAST

  • Provides a historical record of employees and organizations within your company over time: name changes, email address changes, reporting hierarchy, access rights, system platforms
  • See how employees have moved in and out of roles/organizations, what data they’ve accessed in different roles, and where it’s been stored
  • Reconstruct the organization at any given point in time or track its changes over time

INSIGHT & INTELLIGENCE

  • See how your data is being used by individuals, business units, cross-functional teams, and the entire company
  • Support look-back and forward-looking determinative business decisions
  • Add dimension to your data risk by marrying the who/what/when/where of your organization to the data
  • Go deeper into your data telemetry
  • Inform business scenarios including incident response, Junk/ROT, and legal hold
Data Visualization

YOUR DATA BROUGHT TO LIFE

  • API-based architecture integrates with BI and other reporting applications for a single view
  • Pre-defined widgets for visualization
  • Define criteria for visualization and reporting
  • Know and understand where data resides and flows around the world
  • Real-time and historical visualization
  • Data metrics (# of files, gigabytes, etc.)
Administration

CONTROL YOUR ENVIRONMENT

  • Manage installation centrally
  • Customize by employee and actions
  • Customize by employee
  • Manage resources
  • Manage email templates
  • Add/remove users
  • Inclusion/exclusion

Software Products

Software Overview
StoredIQ for Information Governance
StoredIQ for Legal
StoredIQ InstaScan
Breakwater Cyber Response
Breakwater DSAR Response
Breakwater Inventory
Atlas Policy Management
Atlas eDiscovery Management
eDiscovery Manager

Our Locations

US
Austin, TX (HQ)
Chicago, IL
New York, NY

Switzerland
Basel

Ireland
Dublin

UK
London

Germany
München

Hong Kong

United Arab Emirates

Croatia

India

Worldwide
Remote

Phone

(800) 358-0125
(512) 713-1955

Connect With Us

Legal Notices

Privacy Statement

Cookie Statement

Terms of Use

© 2022 Breakwater Solutions, LLC
Scroll to top
Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}