<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Information Life &#187; Tokenization</title>
	<atom:link href="https://www.informationlife.net/tag/tokenization/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.informationlife.net</link>
	<description>The latest Information Lifecycle Management (ILM) updates</description>
	<lastBuildDate>Wed, 30 Mar 2016 11:17:49 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.0.17</generator>
	<item>
		<title>Considerations for Using Tokenization to Mask Your Sensitive Data</title>
		<link>https://www.informationlife.net/considerations-for-using-tokenization-mask-your-sensitive-data/</link>
		<comments>https://www.informationlife.net/considerations-for-using-tokenization-mask-your-sensitive-data/#comments</comments>
		<pubDate>Tue, 08 Jan 2013 09:33:43 +0000</pubDate>
		<dc:creator><![CDATA[admin]]></dc:creator>
				<category><![CDATA[Spotlight]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Privacy]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[data security]]></category>
		<category><![CDATA[Tokenization]]></category>

		<guid isPermaLink="false">http://www.informationlife.net/?p=2677</guid>
		<description><![CDATA[<p>When companies think of protecting sensitive data, they are most likely to think of encryption as the means to obfuscate the real data. Tokenization can be a good alternative to encryption in some cases, or it can be a complementary solution that works with encryption to provide a very high level of data protection. Check...</p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/considerations-for-using-tokenization-mask-your-sensitive-data/">Considerations for Using Tokenization to Mask Your Sensitive Data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>When companies think of protecting sensitive data, they are most likely to think of encryption as the means to obfuscate the real data. Tokenization can be a good alternative to encryption in some cases, or it can be a complementary solution that works with encryption to provide a very high level of data protection. Check out the guest column by Linda Musthaler. <a href="http://www.informationlife.net/considerations-using-tokenization-mask-your-sensitive-data/">More&gt;&gt;</a></p>
<p>The post <a rel="nofollow" href="https://www.informationlife.net/considerations-for-using-tokenization-mask-your-sensitive-data/">Considerations for Using Tokenization to Mask Your Sensitive Data</a> appeared first on <a rel="nofollow" href="https://www.informationlife.net">Information Life</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://www.informationlife.net/considerations-for-using-tokenization-mask-your-sensitive-data/feed/</wfw:commentRss>
		<slash:comments>9</slash:comments>
		</item>
	</channel>
</rss>
