Skip to main content
Image
purple hex pattern

Comply with Mexico's Data Protection Law (Ley Federal de Protección de Datos Personales en Posesión de los Particulares)

The law requires data controllers to have in place appropriate administrative, technical and physical safeguards to ensure the protection of personal data.

Entrust can help organizations comply with these laws and avoid stiff penalties through:

  • Hardware Security Modules

Regulation

Regulation Summary

Mexico's Data Protection Law (Ley Federal de Protección de Datos Personales en Posesión de los Particulares) Compliance

Intent

According to El Economista, “the objective of the General Law for the Protection of Personal Data is to establish the foundational principles and procedures to guarantee the right of all people to protect their personal information in possession of other subjects.”

Areli Cano Guadiana, Commissioner for the Institute on Transparency, Access to Information and Protection of Personal Data stated in El Financiero, “the approval of the General Law for the Protection of Personal Data by Mexico’s Legislature represents a significant advancement for the right of people to control the handling of their personal information.”

Penalties

According to the resolution enacted by the Honorary Representative Council of the National Commission on Minimum Salaries, infractions and sanctions dictated by Chapter X of the General Law for the Protection of Personal Data are set between 100 and 320,000 days of minimum salary within the Federal District, which can amount to 6,500 to 20,700,000 Mexican pesos.

Compliance

Compliance Summary

Complying with Mexico’s Data Protection Law (Ley Federal de Protección de Datos Personales en Posesión de los Particulare) and avoiding fines and breach notifications requires best-practice data security that is state-of-the-art.

Entrust nShield® HSMs essential offerings in this area consists of:

  • Hardware security modules to provide a hardened, tamper- resistant environment for secure cryptographic processing, key generation and protection, encryption and more

Hardware Security Modules (HSMs)

Entrust nShield HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more. Available in three FIPS 140-2 certified form factors, nShield HSMs support a variety of deployment scenarios. nShield Connect and Solo HSMs also provide a secure environment for running sensitive applications. The CodeSafe option lets you execute code within nShield HSM boundaries, protecting your applications and the data they process.

In addition nShield HSMs:

  • Generate and protect root and certificate authority (CA) keys, providing support for PKIs across a variety of use cases
  • Sign your application code so you can ensure that your software remains secure, unaltered and authentic
  • Create digital certificates for credentialing and authenticating proprietary electronic devices for IoT applications and other network deployments.

Resources

Brochures: Entrust nShield HSM Family Brochure

Entrust nShield® HSMs provide a hardened, tamper-resistant environment for secure cryptographic processing, key generation and protection, encryption and more. Available in three FIPS 140-2 certified form factors, Entrust nShield HSMs support a variety of deployment scenarios.

Entrust nShield HSM Family Brochure

Related Products