Consider these extracts from various regulations, demonstrating the central theme of protecting identity-based information exchanges:
  • “…unauthorized access to data that may result in destruction of data or improper changes to data, including the recording of unauthorized or nonexistent transactions or inaccurate recording of transactions…” (SOX, SAS 94).
  • “Must implement appropriate technical and organizational measures to protect personal data…” (EU Data Protection Directive).
  • “Provide reasonable assurance regarding prevention or timely detection of unauthorized acquisition, use or disposition of the registrant's assets that could have a material effect on the financial statements,” (SOX, Audit Std. No. 2).

IDM Related Compliance Items#

We also have identified some of the Many IDM Related Compliance Items

More Information#

There might be more information for this subject on one of the following: ...nobody

Add new attachment

Only authorized users are allowed to upload new attachments.
« This page (revision-2) was last changed on 22-Jan-2012 10:23 by jim