Default language.

Introduction of File-AID Data Privacy


The 

BMC Compuware File-AID Data Privacy

plug-in for the 

BMC Compuware Topaz Workbench

allows you to address many of your data privacy needs whether you have files or databases on distributed machines or on a mainframe computer.

You can protect your data by concealing sensitive information while maintaining data integrity, table relationships, and data format during processing. For example, a female employee name can be replaced by a recognizable fictitious female name or a nonsensical set of characters.

Data privacy rules are created in the Data Privacy plug-in and stored in a repository. These rules are then available to disguise data from each of the following File-AID products:

  • BMC Compuware File-AID/EX

  • BMC Compuware File-AID/Data Solutions

  • BMC Compuware File-AID for Db2

  • BMC Compuware File-AID/Related Data XPERT

  • BMC Compuware File-AID for IMS

The data to be disguised may reside in z/OS files, IMS databases, or relational database tables in DB2, DB2 UDB, Microsoft SQL Server, Sybase, or Oracle.

With Data Privacy you can:

  • Build rules to disguise data for a defined collection of fields.
  • Apply data encryption to fields for the supported data types.
  • Replace field values with consistent valid data via key encryption (using an encoding key value).
  • Age dates by adding to or subtracting from the date or replacing the date with a specific date.
  • Use translate tables to replace field values. Translate tables substitute data from an external database for the information in the database to be disguised.
  • Use value conversion functions (user-written code) to normalize data to be disguised according to the specified data element and then return disguised data back to the original format.

A number of features make Data Privacy easier to use:

  • A Data Privacy Explorer provides an easy method for accessing a project.
  • A Data Privacy project contains all of the components that you use to disguise data: data elements, source data identifiers, translate tables, encoding keys, metadata, rules, etc. For more information, see Create-a-New-Data-Privacy-Project.
  • Metadata can be imported into your project from COBOL or PL/I layouts on the mainframe or from Oracle, SQL Server, or DB2 tables or schemas on a workstation.
  • Data elements provide a sharable definition of the type of a data field, or of several data fields, that have special conceptual meaning for the user and that the user may intend to use in defining Data Privacy Rules. Data elements can be created for use globally or for a single project. Global data elements can be used in multiple projects through the import process. For more information, see Create-a-New-Data-Element.
  • Source data Identifiers specify what data will be identified as a specified data element and the action to take (include or exclude) when source data fields match this identifier. For more information, see Data-Element-Source-Data-Identifiers.
  • A Rules Repository contains global and/or project-specific data elements and rules. Global data elements and rules are made available for multiple projects while project data elements and rules are available only for the project for which they were created.
  • Other File-AID products can use dynamic privacy rules that you created within 

    File-AID Data Privacy

    in

    Topaz Workbench

    . This means that you can use

    Topaz Workbench

    to create rules that can be used outside of

    Topaz Workbench

    .

The Data Privacy Menu contains stack bars, each of which contains a list of tasks, logically grouped, that you can perform:

  • Resource Administration options:
    • Manage Encryption Keys
    • Manage Translate Tables
    • Manage Data Privacy Repositories
    • Manage Credentials
    • Manage Custom Functions
  • Reports option:
    • Coverage Analysis Report
    • In addition to the reports listed in this stack bar, a project summary is available by right-clicking the project name in the Data Privacy Explorer view and selecting View Project Summary. In addition to the project summary, you access a data elements summary and a rules summary by clicking Summary from their respective tabs.

Who should read this space

This space is written for the end user who will be using

File-AID Data Privacy

.

This space assumes that you are already familiar with the Windows operating system. If you need additional information on Windows, there are many helpful books available for your review. 

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

BMC Compuware Topaz Workbench 20.11