Securing Data

(OBJ 3.3)

Geographic Restrictions (Geofencing)

Encryption

Hashing

Masking

Tokenization

Obfuscation

Segmentation

Permission Restrictions

Always tailor this methods to an organization's specific needs.