Mexico Data Protection Law
Comply with Mexico's Data Protection Law (Ley Federal de Protección de Datos Personales en Posesión de los Particulares)
The law requires data controllers to have in place appropriate administrative, technical and physical safeguards to ensure the protection of personal data.
Entrust can help organizations comply with these laws and avoid stiff penalties through:
- Hardware Security Modules
- Click to select...
Regulation
Regulation Summary
Mexico's Data Protection Law (Ley Federal de Protección de Datos Personales en Posesión de los Particulares) Compliance
Intent
According to El Economista, “the objective of the General Law for the Protection of Personal Data is to establish the foundational principles and procedures to guarantee the right of all people to protect their personal information in possession of other subjects.”
Areli Cano Guadiana, Commissioner for the Institute on Transparency, Access to Information and Protection of Personal Data stated in El Financiero, “the approval of the General Law for the Protection of Personal Data by Mexico’s Legislature represents a significant advancement for the right of people to control the handling of their personal information.”
Penalties
According to the resolution enacted by the Honorary Representative Council of the National Commission on Minimum Salaries, infractions and sanctions dictated by Chapter X of the General Law for the Protection of Personal Data are set between 100 and 320,000 days of minimum salary within the Federal District, which can amount to 6,500 to 20,700,000 Mexican pesos.
Compliance
Compliance Summary
Complying with Mexico’s Data Protection Law (Ley Federal de Protección de Datos Personales en Posesión de los Particulare) and avoiding fines and breach notifications requires best-practice data security that is state-of-the-art.
Entrust nShield® HSMs essential offerings in this area consists of:
- Hardware security modules to provide a hardened, tamper- resistant environment for secure cryptographic processing, key generation and protection, encryption and more
Hardware Security Modules (HSMs)
Entrust nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more. Available in three FIPS 140-2 certified form factors, nShield HSMs support a variety of deployment scenarios. nShield Connect and Solo HSMs also provide a secure environment for running sensitive applications. The CodeSafe option lets you execute code within nShield HSM boundaries, protecting your applications and the data they process.
In addition nShield HSMs:
- Generate and protect root and certificate authority (CA) keys, providing support for PKIs across a variety of use cases
- Sign your application code so you can ensure that your software remains secure, unaltered and authentic
- Create digital certificates for credentialing and authenticating proprietary electronic devices for IoT applications and other network deployments.
Resources
Brochures: Entrust nShield HSM Family Brochure
Entrust nShield® HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more. Available in three FIPS 140-2 certified form factors, Entrust nShield HSMs support a variety of deployment scenarios.
Related Solutions
For electronic health information security and the timely disclosure of data breaches
Related Products
Hardened, tamper-resistant environments for secure cryptographic processing and key management.