Aadhaar – an Indian Megatrend

Total Page:16

File Type:pdf, Size:1020Kb

Aadhaar – an Indian Megatrend Report Aadhaar – An Indian Megatrend Leveraging the Potential The Boston Consulting Group (BCG) is a global management consulting firm and the world’s leading advisor on business strategy. We partner with clients from the private, public, and not–for–profit sectors in all regions to identify their highest–value opportunities, address their most critical challenges, and transform their enterprises. Our customized approach combines deep insight into the dynamics of companies and markets with close collaboration at all levels of the client organization. This ensures that our clients achieve sustainable competitive advantage, build more capable organizations, and secure lasting results. Founded in 1963, BCG is a private company with 75 offices in 42 countries. For more information, please visit bcg.com. Aadhaar – An Indian Megatrend Leveraging the Potential Neeraj Aggarwal Seema Bansal Sushma Vasudevan March 2012 bcg.com © The Boston Consulting Group, Inc. 2012. All rights reserved. For information or permission to reprint, please contact BCG at: E–mail: bcg–[email protected] Fax: +1 617 850 3901, attention BCG / Permissions Mail: BCG / Permissions The Boston Consulting Group, Inc. One Beacon Street Boston, MA 02108 USA Contents Executive Summary 4 Introduction to Aadhaar 6 Need for Aadhaar 6 Characteristics of Aadhaar and the Enrolment Process 7 Roll–out and Ramp–up Plan 8 Convergence with Other Key Indian Megatrends 9 Lever to Transformational Opportunities 10 Increasing Effectiveness of Social Welfare Delivery 12 Existing Issues in Social Welfare Delivery 12 Interventions to Control Social Leakages 13 Potential Benefits in the Delivery of Social Welfare Schemes 14 Ecosystem Required to Leverage Aadhaar 15 Revolutionizing the Development Infrastructure 17 Education and Skills Platform 17 Health–care Applications 20 Residential Energy Monitoring Enabler 24 Aadhaar as Part of Social Development Infrastructure Fabric 26 Enhancing Factor Productivity and Reducing Transaction Costs 27 Improving Efficiency in Supply Chain Management 27 Spurring Rapid Growth in Electronic and Mobile Payments 29 Heralding the Change 32 Comprehensive Impact on Consumers 32 Potential for Cross Sector Collaboration and New Business Opportunities 33 The Way Forward 34 Note to the Reader 36 For Further Reading 38 Aadhaar – An Indian Megatrend — Leveraging the Potential 3 Executive Summary n important and unmet need exists in delivery of social welfare programs is more effective. India for a nationally accepted and verified Besides the tremendous economic benefits, intangible identity number that both service providers benefits such as facilitating faster integration of and consumers can use with ease and beneficiaries will also emerge. Putting this in place will confidence. This need is accentuated in the require a well–planned and coordinated effort that will Acase of the poor, where the lack of identity is denying include revamping and customising existing systems and them the ability to avail of basic products and services. It processes used for schemes. However, the recurring is this need that Aadhaar caters to, by providing a unique benefits involved in such a venture will far outweigh the identity number that meets three criteria — ensures one–time cost. universality, avoids duplication and provides biometric authentication. Aadhaar has the potential to enable several mainstream applications that are essential for the social and economic Aadhaar’s importance lies in the fact that it is concurrent development of the country. Several common challenges with many other trends, such as ubiquitous connectivity that these sectors face are infrastructure shortages and and content availability, urbanization, rising income, and stretched resources. Aadhaar can help alleviate some of consumerism, among others. This convergence sets the these challenges by providing a platform for information platform for business innovation and opens up many capturing and identification. opportunities. The report focuses on a few key opportunities — such as setting up basic infrastructure, developing ◊ In the health–care sector, Aadhaar can facilitate initial applications for social welfare delivery, enabling creation of digitized medical records. This can, in turn, mainstream applications for fostering national facilitate electronic/mobile health applications that development, and facilitating next generation applications can cater to the needs of different segments of the for improving productivity and reducing costs. population: improve accessibility and affordability of health care for the ‘un–served’, provide convenience However, as Aadhaar rolls out further and Aadhaar– and affordability for the ‘under–served’ and provide based applications evolve, many other opportunities will value–added services that will increase compliance emerge. and convenience for the ‘quasi–served’. Aadhaar can help reduce leakages in social welfare ◊ In the education and skilling sector, Aadhaar–based schemes by ensuring accurate identification of records on educational and vocational courses that an beneficiaries and controlling false reporting and individual takes has the potential to impact the entire payments. Aadhaar–based interventions could improve value chain: smoothening the enrolment process by effectiveness in the delivery of social welfare schemes by digitizing certificates and reducing frauds due to shifting to direct benefits and verifying if the intended duplication, enhancing service provision by monitoring beneficiaries actually receive subsidies. It can help in the attendance of students and teachers, and increasing bringing down transaction costs for poor and can ensure post–education employment opportunities by creating 4 The Boston Consulting Group a soft–employment exchange with nationwide reach. depending on the category of use, data sharing norms Specifically in vocational training, an Aadhaar–based will need to be defined: skills database can fill an existing void by providing a qualification basis to recruit, up–skill, and train ◊ Areas such as social welfare delivery where the resources. application becomes the norm and the benefits are realized post individual authentication ◊ In the energy sector, Aadhaar can be used to create and foster ‘energy consciousness’ in individuals. By ◊ Areas where the enrolment is registry based and is tracking energy consumption across time at the maintained with high levels of privacy and will need individual / household level, systems and processes individual authentication to release each time over can be developed to incentivize ‘energy conscious’ and above the registry behaviour. Another benefit is controlling leakage of subsidies in this sector, by enabling direct subsidies ◊ Areas where the usage is completely voluntary, where and right identification of beneficiaries. people make the trade–offs at each occasion of use based on benefits that can be realized. Further, Aadhaar can also facilitate development of some next generation applications to enhance productivity of As India stands poised to be an economic force, it is operations and reduce transaction costs for organizations. important to understand and leverage the full potential of Aadhaar, in these cases, could aid in the ease and speed Aadhaar. It can be a very critical part of building the with which these applications are put in place. These enabling digital infrastructure and it can be the harbinger include, but are not limited to, improving supply chain of new things. The applications, that it spurs, have the infrastructure and enabling e–commerce and m–commerce potential to influence every facet in a consumer’s life. payments. They can also foster significant entrepreneurial and cross– sector collaboration opportunities. However, all this would ◊ Aadhaar can fundamentally improve the supply chain be possible only if all stakeholders and enablers, including infrastructure, especially for small– and medium–sized the government, corporates, institutions and consumers, firms with fragmented sourcing and distribution among others, incorporate Aadhaar into their strategic chains, by identification and tracking of its supplier agenda and start acting on it. and distributor network. Aadhaar can, in a way, be equated to the emergence of ◊ On electronic and mobile payments, Aadhaar can the Internet. As we stand at the point of its evolution, it influence rural distribution infrastructure by providing is very difficult to predict how wide and diverse its usage alternate business models as well as enhance the e/m– will be. However, what we can be sure of is that it will commerce experience and provide an impetus to the change the social and business infrastructure of this already growing urban e/m–commerce story. nation — affecting government–to–resident, business– to–business, and business–to–consumer interactions in a Handling individual privacy needs appropriately is revolutionary manner. paramount across these different applications. Hence, Aadhaar – An Indian Megatrend — Leveraging the Potential 5 Introduction to Aadhaar “There is nothing more powerful than an idea whose for a mobile and nationally recognized identity becomes time has come” even more imperative. — Victor Hugo Be it opening a bank account, getting a mobile connection Need for Aadhaar or applying for a government food subsidy program, millions of Indians are unable to avail of services from the government and financial services sectors because India has never had a unique and universal identity they lack proper
Recommended publications
  • FATCA-CRS-Faqs.Pdf
    FATCA/CRS FAQs:- 1. What is FATCA? The Foreign Account Tax Compliance Act (FATCA) is a United States federal law that requires United States persons, including US persons who live outside the United States, to report their financial accounts held outside of the United States, and requires foreign financial institutions to report to the Internal Revenue Service (IRS) about their U.S. clients. Government of India (GOI) has signed a Model 1 Inter-Governmental Agreement (IGA) with US on July 9, 2015 which necessitates financial institutions in India to comply with FATCA. 2. What is CRS? CRS is known as Common Reporting Standards. It is an information standard for the automatic exchange of information (AEoI), developed in the context of the Organisation for Economic Co-operation and Development (OECD). The Government of India has also joined the Multilateral Competent Authority Agreement (MCAA) on June 3, 2015 and financial institutions in india to comply with CRS. 3. Why do we need to ask the FATCA/CRS declaration from the customer? Government of India (GOI) has signed a Model 1 Inter-Governmental Agreement (IGA) with US on July 9, 2015. The IGA provides that the Indian FIs will provide the necessary information to Indian tax authority i.e. Central Board of Direct Taxes (CBDT), which will then be transmitted to USA automatically in case of FATCA. The Government of India has also joined the Multilateral Competent Authority Agreement (MCAA) on June 3, 2015, for exchanging information with respective tax authorities from 63 partner jurisdictions which are signatories to MCAA. To enable this, CBDT has issued a notification to all financial institutions in India to comply with the CRS and FATCA regulations.
    [Show full text]
  • Trend Micro Data Protection Lists (Release 3.0)
    Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro Web site at: http://docs.trendmicro.com/ Trend Micro, the Trend Micro t-ball logo, and OfficeScan are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2014. Trend Micro Incorporated. All rights reserved. Document Part No. LPEM55806/121205 Release Date: September 2014 Document Version No.: 3.0 Protected by U.S. Patent No.: 5,623,600; 5,889,943; 5,951,698; 6,119,165 This document contains information common to all Trend Micro products that support data protection features. Detailed information about how to use specific features within your product may be available in the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base at the Trend Micro website. Read through the documentation before installing or using the product. Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp Table of Contents Chapter 1: Data Loss Prevention - Predefined Data Identifiers and Templates Predefined Expressions ................................................................................
    [Show full text]
  • ISSN: 2320-5407 Int. J. Adv. Res. 5(9), 958-965
    ISSN: 2320-5407 Int. J. Adv. Res. 5(9), 958-965 Journal Homepage: - www.journalijar.com Article DOI: 10.21474/IJAR01/5409 DOI URL: http://dx.doi.org/10.21474/IJAR01/5409 RESEARCH ARTICLE NATIONAL IDENTIFICATION SYSTEM IN THE COUNTRIES AROUND THE GLOBE: AN OUTSIDE REVIEW FROM ETHIOPIAN PERSPECTIVE. Dr. Gavendra Singh1, Mr Ashenafi Chalchissa2 and Mulugeta Kejela3. 1. Assistant Professor, Deptt. of Software Engineering, College of Computing and Informatics, Haramaya University, 138, Dire Dawa, Ethiopia. 2. HOD ,Deptt. of Software Engineering, College of Computing and Informatics, Haramaya University, 138, Dire Dawa, Ethiopia. 3. Deptt. of Software Engineering, College of Computing and Informatics, Haramaya University, 138, Dire Dawa, Ethiopia. …………………………………………………………………………………………………….... Manuscript Info Abstract ……………………. ……………………………………………………………… Manuscript History A national identification numberor national identity number is used by the governments of many countries as a means of tracking Received: 12 July 2017 their citizens, permanent residents, and temporary residents for the Final Accepted: 14 August 2017 purposes ofvarious e-governmentally-related functions. Published: September 2017 The ways in which such a system is implemented vary among Key words:- countries, but in most cases citizens are issued an identification e-ID, e-Government, Capitals, System, number upon reaching legal age, or when they are born.Identification is Identification, internet, face-to-face routinely used to help facilitate commercial and government transaction transactions [1].Such as taking out a loan or applying for government benefits. While individuals can use traditional forms of identification in face-to-face transactions, these forms of identification are less useful for conducting business on the Internet. Individuals can use an National Identification System to authenticate to online services, securely communicate online, purchase goods and services, and create legally-binding electronic signatures, such as to sign a contract.
    [Show full text]
  • Trend Micro Data Protection Lists (Release 2.0)
    Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes, and the latest version of the applicable user documentation, which are available from the Trend Micro Web site at: http://docs.trendmicro.com/ Trend Micro, the Trend Micro t-ball logo, and OfficeScan are trademarks or registered trademarks of Trend Micro Incorporated. All other product or company names may be trademarks or registered trademarks of their owners. Copyright © 2012. Trend Micro Incorporated. All rights reserved. Document Part No. LPEM55806/121205 Release Date: September 2014 Document Version No.: 2.0 Protected by U.S. Patent No.: 5,623,600; 5,889,943; 5,951,698; 6,119,165 This document contains information common to all Trend Micro products that support data protection features. Detailed information about how to use specific features within your product may be available in the Trend Micro Online Help Center and/or the Trend Micro Knowledge Base at the Trend Micro website. Read through the documentation before installing or using the product. Trend Micro is always seeking to improve its documentation. Your feedback is always welcome. Please evaluate this documentation on the following site: http://www.trendmicro.com/download/documentation/rating.asp Table of Contents Chapter 1: Data Loss Prevention - Predefined Data Identifiers and Templates Predefined Expressions ................................................................................
    [Show full text]
  • Code INSEE Code Postal Commune Mairie EPCI 38003 38150 Agnin
    Code INSEE Code Postal Commune Mairie EPCI 38003 38150 Agnin CC du Pays Roussillonnais 38005 38114 Allemont CC de l'Oisans 38006 38580 Allevard CC du Pays du Grésivaudan 38008 38970 Ambel CC Matheysine, P de Corps et vallées du Valbonnais 38010 38460 Annoisin-Chatelans CC Balcons du Dauphiné 38012 38490 Aoste CC Les Vals du Dauphiné 38013 38140 Apprieu CC de Bièvre Est 38014 38510 Arandon/Arandon-Passins CC Balcons du Dauphiné 38015 38440 Artas CC Bièvre Isère 38019 38550 Auberives-sur-Varèze CC du Pays Roussillonnais 38020 38142 Auris CC de l'Oisans 38023 38650 Avignonet CC du Trièves 38025 38260 Balbins CC Bièvre Isère 38027 38530 Barraux CC du Pays du Grésivaudan 38030 38140 Beaucroissant CC de Bièvre Est 38032 38270 Beaufort CC Bièvre Isère 38034 38270 Beaurepaire CC du Territoire de Beaurepaire 38035 38440 Beauvoir-de-Marc CC Bièvre Isère 38037 38270 Bellegarde-Poussieu CC du Territoire de Beaurepaire 38039 38190 Bernin CC du Pays du Grésivaudan 38041 38160 Bessins Saint Marcellin Vercors Isère 38042 38690 Bevenais CC de Bièvre Est 38044 38690 Biol CC Les Vals du Dauphiné 38048 38090 Bonnefamille CC des Collines du Nord Dauphiné 38049 38260 Bossieu CC Bièvre Isère 38051 38150 Bouge-Chambalud CC du Pays Roussillonnais 38053 38300 Bourgoin-Jallieu CA Porte de l'Isère (CAPI) 38058 38590 Brezins CC Bièvre Isère 38060 38590 Brion CC Bièvre Isère 38064 38110 Cessieu CC Les Vals du Dauphiné 38070 38190 Champ-Près-Froges CC du Pays du Grésivaudan 38072 38150 Chanas CC du Pays Roussillonnais 38081 38790 Charantonnay CC des Collines du Nord
    [Show full text]
  • Developer Guide Table of Contents
    SAP Data Quality Management SDK Document Version: 4.2 Support Package 3 (14.2.3.0) - 2014-09-05 Developer Guide Table of Contents 1 Data Quality Management SDK overview............................................10 1.1 Installing Data Quality Management SDK..............................................10 1.1.1 Upgrading.............................................................11 1.1.2 Installing the SDK on Windows...............................................11 1.1.3 Installing the SDK on Unix..................................................11 2 Directory data................................................................13 2.1 Directory listing and update schedule................................................ 13 2.2 U.S. directory expiration..........................................................14 2.2.1 U.S. National and Auxiliary files..............................................15 2.3 Where to copy directories.........................................................15 2.4 To install and set up SAP Download Manager...........................................16 2.5 To download directory files........................................................16 2.6 Extracting directory files..........................................................16 3 Samples.....................................................................18 3.1 Sample program files............................................................18 3.2 Building samples...............................................................18 3.3 Running samples...............................................................19
    [Show full text]
  • Forcepoint DLP Predefined Policies and Classifiers
    Forcepoint DLP Predefined Policies and Classifiers Predefined Policies and Classifiers | Forcepoint DLP | 8.7.1 For your convenience, Forcepoint DLP includes hundreds of predefined policies and content classifiers. ● Predefined policies help administrators quickly and easily define what type of content is considered a security breach at their organization. While choosing a policy or policy category, some items are set “off” by default. They can be activated individually in the Forcepoint Security Manager. ■ Data Loss Prevention policies, page 2 ■ Discovery policies, page 116 ● Predefined classifiers can be used to detect events and threats involving secured data. This article provides a list of all the predefined content classifiers that Forcepoint DLP provides for detecting events and threats involving secured data. This includes: ■ File-type classifiers ■ Script classifiers ■ Dictionaries ■ Pattern classifiers The predefined policies and classifiers are constantly being updated and improved. See Updating Predefined Policies and Classifiers for instructions on keeping policies and classifiers current. © 2020 Forcepoint LLC Data Loss Prevention policies Predefined Policies and Classifiers | Forcepoint DLP | 8.7.1 Use the predefined data loss prevention policies to detect sensitive content, compliance violations, and data theft. For acceptable use policies, see: ● Acceptable Use, page 3 The content protection policies fall into several categories: ● Company Confidential and Intellectual Property (IP), page 4 ● Credit Cards, page 9 ● Financial
    [Show full text]
  • Micro Focus IDOL PII Package 12.8 Technical Note Add Your Feedback to the Email and Click Send
    IDOL PII Package Software Version 12.8 Technical Note Document Release Date: February 2021 Software Release Date: February 2021 Technical Note Legal notices Copyright notice © Copyright 2020 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are as may be set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To check for updated documentation, visit https://www.microfocus.com/support-and-services/documentation/. Support Visit the MySupport portal to access contact information and details about the products, services, and support that Micro Focus offers. This portal also provides customer self-solve capabilities. It gives you a fast and efficient way to access interactive technical support tools needed to manage your business. As a valued support customer, you can benefit by using the MySupport portal to: l Search for knowledge documents of interest l Access product documentation l View software vulnerability alerts l Enter into discussions with other software customers l Download software patches l Manage software licenses, downloads, and support contracts l Submit and track service requests l Contact customer support l View information about all services that Support offers Many areas of the portal require you to sign in.
    [Show full text]
  • Peoplesoft 8.8 Application Fundamentals for HRMS Peoplebook
    PeopleSoft 8.8 Application Fundamentals for HRMS PeopleBook December 2002 PeopleSoft 8.8 Application Fundamentals for HRMS PeopleBook SKU HRMS88HAF-B 1202 PeopleBooks Contributors: Teams from PeopleSoft Product Documentation and Development. Copyright 1988-2002 PeopleSoft, Inc. All rights reserved. Printed in the United States. All material contained in this documentation is proprietary and confidential to PeopleSoft, Inc. ("PeopleSoft"), protected by copyright laws and subject to the nondisclosure provisions of the applicable PeopleSoft agreement. No part of this documentation may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, including, but not limited to, electronic, graphic, mechanical, photocopying, recording, or otherwise without the prior written permission of PeopleSoft. This documentation is subject to change without notice, and PeopleSoft does not warrant that the material contained in this documentation is free of errors. Any errors found in this document should be reported to PeopleSoft in writing. The copyrighted software that accompanies this document is licensed for use only in strict accordance with the applicable license agreement which should be read carefully as it governs the terms of use of the software and this document, including the disclosure thereof. PeopleSoft, PeopleTools, PS/nVision, PeopleCode, PeopleBooks, PeopleTalk, and Vantive are registered trademarks, and Pure Internet Architecture, Intelligent Context Manager, and The Real-Time Enterprise are trademarks of PeopleSoft, Inc. All other company and product names may be trademarks of their respective owners. The information contained herein is subject to change without notice. Open Source Disclosure This product includes software developed by the Apache Software Foundation (http://www.apache.org/).
    [Show full text]
  • IDOL PII Package 12.6 Technical Note
    IDOL PII Package Software Version 12.6 Technical Note Document Release Date: June 2020 Software Release Date: June 2020 Technical Note Legal notices Copyright notice © Copyright 2020 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To check for updated documentation, visit https://www.microfocus.com/support-and-services/documentation/. Support Visit the MySupport portal to access contact information and details about the products, services, and support that Micro Focus offers. This portal also provides customer self-solve capabilities. It gives you a fast and efficient way to access interactive technical support tools needed to manage your business. As a valued support customer, you can benefit by using the MySupport portal to: l Search for knowledge documents of interest l Access product documentation l View software vulnerability alerts l Enter into discussions with other software customers l Download software patches l Manage software licenses, downloads, and support contracts l Submit and track service requests l Contact customer support l View information about all services that Support offers Many areas of the portal require you to sign in.
    [Show full text]
  • Avant-Propos
    AVANT-PROPOS L'information statistique sur les questions économiques et sociales est indispensable à tous ceux qui s'intéressent à la vie de la région. Les Tableaux Économiques de Haute-Normandie (TEHN) vous proposent les derniers chiffres disponibles. Ils offrent une image globale de la région et de ses départements. Une structure identique pour chacun des vingt domaines présentés facilite l’accès aux données, définitions et références bibliographiques. Document de base pour une bonne connaissance de la région, TEHN 2008-2009 est construit à l’image des autres tableaux économiques régionaux réalisés par chaque direction régionale de l’Insee. L’utilisateur pourra ainsi trouver, dans chaque ouvrage régional, un grand nombre de tableaux semblables permettant des comparaisons utiles. Le lecteur intéressé trouvera également sur le site www.insee.fr et sur sa déclinaison régionale www.insee.fr/haute-normandie de très nombreuses autres informations, tableaux et analyses. L'équipe de rédaction remercie les organismes statistiques qui ont contribué à la réalisation de ce document, et souhaite que cette édition 2008-2009 réponde aux attentes des utilisateurs. S O M M A I R E ESPACE - POPULATION 1 - ESPACE RÉGIONAL 1.1 - Climat, relief et infrastructures . 8 1.2 - Circonscriptions administratives . 12 1.3 - Villes . 14 1.4 - Espaces urbains, espaces ruraux. 16 1.5 - La Haute-Normandie et la France . 18 1.6 - La Haute-Normandie et l’Europe . 20 1.7 - Territoires . 22 2 - ENVIRONNEMENT 2.1 - Milieu naturel . 26 2.2 - Déchets, air et eau . 28 2.3 - Risques naturels et technologiques. 30 3 - POPULATION 3.1 - Évolution de la population .
    [Show full text]
  • Forcepoint DLP Predefined Policies and Classifiers
    Forcepoint DLP Predefined Policies and Classifiers Predefined Policies and Classifiers | Forcepoint DLP | 8.7.x For your convenience, Forcepoint DLP includes hundreds of predefined policies and content classifiers. ● Predefined policies help administrators quickly and easily define what type of content is considered a security breach at their organization. While choosing a policy or policy category, some items are set “off” by default. They can be activated individually in the Forcepoint Security Manager. ■ Data Loss Prevention policies, page 2 ■ Discovery policies, page 115 ● Predefined classifiers can be used to detect events and threats involving secured data. This article provides a list of all the predefined content classifiers that Forcepoint DLP provides for detecting events and threats involving secured data. This includes: ■ File-type classifiers ■ Script classifiers ■ Dictionaries ■ Pattern classifiers The predefined policies and classifiers are constantly being updated and improved. See Updating Predefined Policies and Classifiers for instructions on keeping policies and classifiers current. © 2019 Forcepoint LLC Data Loss Prevention policies Predefined Policies and Classifiers | Forcepoint DLP | 8.7.x Use the predefined data loss prevention policies to detect sensitive content, compliance violations, and data theft. For acceptable use policies, see: ● Acceptable Use, page 3 The content protection policies fall into several categories: ● Company Confidential and Intellectual Property (IP), page 4 ● Credit Cards, page 9 ● Financial
    [Show full text]