The theme of this year’s Data Privacy Week, which kicks off today, is “Take Control of Your Data.” It’s a message for organizations as well as individuals—but the process of managing data privacy is vastly more complex.
It’s a good time of the year to bring challenges around data privacy, like data resilience, to the forefront. Asking questions about how data is managed and protected is a good starting point. Here’s your kickoff list:
1) Do you have a schedule for data resilience processes?
A schedule can be absolutely critical to this aspect of compliance. A retention and deletion policy will cover: The theme of this year’s Data Privacy Week, which kicks off today, is “Take Control of Your Data.” It’s a message for organizations as well as individuals—but the process of managing data privacy is vastly more complex.
- What data sets you can store or archive
- Where these data sets can be stored (e.g., a data-only bunker)
- How long you can retain a data set in storage
- When a data set should be deleted or where it can be moved
2) Do you have the best architecture for a data resilience program?
When storing data sets, one of the best approaches is a tiered backup architecture. It allows you to separate data snapshots that are hot, warm, or cold. A data-only bunker can safely store large amounts of data that aren’t needed for immediate use.
Get started: “Without A Tiered Backup Architecture, Are You Truly Resilient?”
3) Are you compliant with GDPR and DORA?
Adhering to General Data Protection Regulation (GDPR) and the Digital Operational Resilience Act (DORA) is good practice for any organization that doesn’t want to run afoul of regulations or find itself subject to legal action. For example, GDPR addresses an individual’s “right to be forgotten,” which means a company can’t hang on to their data when it’s no longer needed.
Keeping too much data for too long can expose an organization to unnecessary risk. It’s a target for bad actors and compliance officers, and can open your organization up to tremendous legal exposure. The reason for this is that data sitting in archives or graveyards presents more risk for security breaches. If it’s not needed and can be removed, your risk can be substantially lessened.
Get started: “GDPR and the Data Encryption Dilemma”
4) How’s your business resiliency and disaster recovery?
Long gone are the days when bad actors limited their targets to banks or hospitals. The public sector is on the radar: Government facilities were the third largest critical infrastructure sector targeted by ransomware attacks in 2023, according to the Internet Crime Complaint Center. No industry sector wants to suffer downtime that threatens critical business services or contributes to reputation damage.
Get started: “From Ransomware Defense to Cyber Resilience”

Risk, Resilience and Data Storage
Pure Storage’s own Andrew Stone, CTO for the Americas, was featured in a Q&A with the Wall Street Journal. Read his insights on cyber resilience.
How Pure Storage Supports Data Privacy and Resilience Strategies
Pure Storage understands that avoiding downtime is critical to your business success. Our simple replication options keep critical business services online, helping you avoid risk to reputation or revenue generation due to catastrophic outage.
- The creation of tiered retained data with secure, data-only bunkers: Given that communication is established into, but not out of, the bunker, it’s considered a highly secure location.
- Cloud-ready, seamless data mobility: Seamlessly move workloads to support changing business needs, including data sets that no longer have value for processing.
- Data and backups safe from encryption or deletion: SafeMode™ snapshots protect your data, especially critical backups, from accidental deletion, compromised credentials, or encryption during an attack.
- Modern data protection: We deliver the most modern data protection solutions, with security and rapid recovery against ransomware threats.
- A single control pane for visibility: It’s important to have a clear handle on where your most important data lives at any given time. Pure’s simple setup, effortless operations, and unified control pane make it easy to see what workloads are where, so you can move data sets for deletion.
Hacker’s Guide to Ransomware Mitigation and Recovery

FlashArray Security and Compliance
Learn how Pure can help your organization meet security requirements and data compliance regulations.