• Solutions
  • Other Services
  • Services & Solutions
  • Cloud Services
    • Cloud Services
    • Cloud Strategy
    • Cloud Governance
    • Cloud Migration
    • Multi-Tenant Cloud Dev Ops
    • Big Data
    • Micro Services
    • RPA
  • ERP Integration
    • ERP Integration
    • SAP
    • Oracle
    • Microsoft Dynamics
    • Workday
  • Cyber Security
    • Cyber Security
    • Cyber Security Services
    • Data Privacy
    • Privacy & Compliance
    • GDPR
    • Identity & Access Management
    • Penetration Testing
  • Blockchain
  • Information
  • About Us
    • About Us
    • Our History
    • Our Team
  • Resources
    • Resources
    • Case Studies
    • News & Insights
  • Careers
  • Contact Us
  • Partners & Platforms
  • AWS
  • Azure
  • CSPI
  • SAP
    • SAP
    • Ariba
    • S/4HANA
  • Oracle
  • Microsoft Dynamics
  • Snowflake
  • Workday
Get an Assessment
  • About Us
  • Case Studies
  • Contact Us
954-928-8281
Chestnut Hill Technologies LogoChestnut Hill Technologies Logo
Menu
  • Cloud Services
    • Cloud Data StrategyCloud Strategy – Outlining the role cloud will play for your organization.
    • Cloud EnablementCloud Governance – Ensure your cloud services are effectively managed.
    • Cloud TransformationCloud Migration – Transitioning to the cloud.
    • Multi Tenant Dev OpsMulti-Tenant Cloud Dev Ops – Host multiple, virtual instances of your cloud service.
    • Big DataBig Data – Quickly and effectively process large data.
    • Micro ServicesMicro Services – Independent services that operate as a whole.
    • RoboticsRPA – Where engineering and technology becomes one.
  • ERP Integration
    • SAPSAP – System Applications and Products in Data Processing.
    • OracleOracle – Oracle Fusion Cloud ERP.
    • Microsoft DynamicsMicrosoft Dynamics – Microsoft’s ERP & CRM software.
    • WorkdayWorkday – Finance, HR, and planning system.
  • Cyber Security
    • Cyber Security ServicesCyber Security Services – Top notch defense for all of your data.
    • Data PrivacyData Privacy – If or how your data is shared with third parties.
    • Privacy CompliancePrivacy & Compliance – Keeping your data is protected and follows legal guidelines.
    • GDPRGDPR – General Data Protection Regulation.
    • Identity Access ManagementIdentity & Access Management – Defining and managing roles and access of your data.
    • Penetration TestingPenetration Testing – Uncovering and fixing security holes.
  • Blockchain
Get an Assessment
Back to Case Studies

Helping a Leading Cruise Line Sail to GDPR Safe Harbors

A large, U.S. cruise line company required an adaptation of existing data implementation and safeguarding strategies in order to abide by new GDPR requirements and ensure their customers’ data privacy and security is maintained.

Client Key Challenge

The client’s existing sensitive data was not housed in a manner to meet the GDPR standards. The client needed help with securing customer data and limiting unnecessary access to it as an effort to successfully prevent unsafe customer data storage. The client required implementation of database files data encryption, augmentation of the company operation in the development stage, limited and anonymized developer data, prevention of unauthorized users from accessing sensitive information in the production environment, and pseudonymized sensitive data for unauthorized users.

CHT Engagement 

CHT was chosen as an addition to the existing team due to our experience in the IT field and vast knowledge in the areas of data security and data protection. We brought superior understanding of GDPR data protection and best practices for implementing GDPR into the company’s existing framework.

CHT Solutions 

CHT devised and introduced a plan that created a framework for sensitive data housing.

Solution components: 

  • Security gaps assessment
  • Plan proposal and design for securing environments and implementation of pseudonymization and anonymization in production and non production systems.
  • Development and implementation of sensitive data discovery, data subsetting and data masking tools along with robust data masking software and data archiving.

Success Outcomes / Results

After GDPR data protection implementation is achieved, the prevention against data leaks is established within the company. The successful implementation of sensitive data discovery tool, data encryption, Data subsetting, data masking, and data generation tool and Robust data masking software allows the locating, assessing and securing of sensitive data fields. This guarantees that only authorized users access sensitive data and that customer information is not easily accessible. Privileged Access Manager and Password Access Management continuously generate new passwords and create a barrier between users and sensitive information as a further level of security.

Successful GDPR implementation ensures that the company is not faced with consequences relating to data privacy laws. Also, the solutions stated above are able to transform the company into a more efficient business that protects its customers.

We’re ready to Help

Get an Assessment
AWS Logo AWS Logo
Microsoft Azure Snow Flake Service Partner

Call Us: 954-928-8281

Join the cht team

Customer Care Image

Company

  • About Us
  • Our History
  • Our Team
  • Careers
  • Privacy Policy
  • Contact Us

Services

  • Cloud Services
  • ERP Integration
  • Cyber Security
  • Blockchain
  • View All Services

Resources

  • Case Studies
  • News & Insights
  • Blog
  • View All Resources

Industries we Serve

  • Banking & Capital Markets
  • Bio Life Sciences & Pharma
  • Consumer Products
  • Education
  • Financial Services
  • Government & Defense
  • Healthcare & Life Sciences
  • Hospitality & Travel
  • Insurance
  • Internet Retail/B2C/CPG
  • Manufacturing
  • Telecoms
  • Transportation & Distribution

Partners & Platforms

  • AWS
  • SAP
  • Snowflake
  • Oracle
  • DataBricks
  • Microsoft Dynamics
  • Workday
  • Palo Alto
  • Azure
  • CSPi

Follow CHT

Copy Right

© 2025 Chestnuthill Technologies | All Rights Reserved
This site uses cookies to provide you with a great user experience. By using Chestnuthill Technologies, you accept our privacy policy.Ok