Each of these IDM Related Compliance Items are an Indirect Tax due to the burden of Compliance
Regulations regarding Compliance is growing all the time and you should do your own due diligence to determine what your organization may need to be in compliance.
Regulations such as:
Regulations such as:
require stronger security, to protect the privacy of investors, patients, consumers and citizens, respectively.Adjusting total cost by organizational headcount (size) yields a per capita compliance cost of $222 per employee.
In addition, the average cost for organizations that experience non-compliance problems was nearly $9.4 million. [2]
#
, is an auditing statement issued by the Auditing Standards Board of the American Institute of Certified Public Accountants (AICPA), officially titled "Reports on the Processing of Transactions by Service Organizations".
SAS 70 defines the professional standards used by a service auditor to assess the internal controls of a service organization and issue a service auditor’s report. Service organizations are typically entities that provide outsourcing services that impact the control environment of their customers.
Examples of service organizations are insurance and medical claims processors, trust companies, hosted data centers, application service providers (ASPs), managed security providers, credit processing organizations and clearinghouses.
#
(otherwise known as the Financial Modernization Act of 1999).
In basic terms GLBA requires financial institutions to implement Information Technology controls to maintain the confidentiality and privacy of consumer information.
The GLB Act was established primarily to repeal restrictions on banks affiliated with securities firms, but it also requires financial institutions — including any organization that works with people such as:
Following are key areas in information security that the GLB Act requires financial institutions to address:
#"Wide variations in the quality and security of forms of identification used to gain access to secure Federal and other facilities where there is potential for terrorist attacks need to be eliminated. Therefore, it is the policy of the United States to enhance security, increase Government efficiency, reduce identity fraud, and protect personal privacy by establishing a mandatory, Government-wide standard for secure and reliable forms of identification issued by the Federal Government to its employees and contractors (including contractor employees)."
Homeland Security Presidential Directive #12 (HSPD-12) affects all executive branch federal employees and contractors. It requires all agencies to conduct a thorough background investigation and to issue tamperproof credentials. HSPD-12 federated credentials are now required for federal executive-branch employees and contractors. NIST FIPS 201—guidance for implementing HSPD-12—establishes consistent guidelines for:
#In basic terms, HIPAA regulates the security and privacy of health data, including patient records and all individually identifiable health information.
Also known as the Kennedy-Kassebaum Act, the Act includes a section, Title II, entitled Administrative Simplification, requiring:
More specifically, HIPAA called upon the Department of Health and Human Services (HHS) to publish new rules that will ensure:
Effective compliance requires organization-wide implementation. Compliance requirements include:
#In basic terms, the Payment Card Industry (PCI) mandates the protection of customer information residing with merchants, safe from hackers, viruses and other potential security risks.
The PCI Data Security Standard represents a common set of industry tools and measurements to help ensure the safe handling of sensitive information. Initially created by aligning:
The DSS standard
is available from the PCI Web Site.
#The basis is a strategic initiative to modernize the regulation of pharmaceutical manufacturing and product quality. This initiative aims at ensuring that regulatory review, compliance and inspection policies are based on state-of-the-art pharmaceutical science, and do not impede rapid adoption of new technological advances by the pharmaceutical industry.
It also promises to enhance safety and quality in drug manufacturing while increasing efficiencies. Its achievements reflect valuable advice provided to FDA through many public workshops and meetings, and written comments from experts and interested parties in academics, industry, and other groups.
#First, it requires the university to keep those records private. There are exceptions for emergencies, court orders, university officials who have a need to know, etc.
Second, it provides that students have the right to inspect records about themselves that are maintained by the university.
#The purpose of CALEA is to preserve the ability of law enforcement to conduct electronic surveillance in the face of rapid advances in telecommunications technology. Further details can be found at H.R. Rep. No. 103-827, 103d Cong., 2d Sess.(1994), reprinted in 1994 U.S.C.C.A.N. 3489
#
is based on balancing an individual's right to the privacy of personal information with the need of organizations to collect, use or disclose personal information for legitimate business purposes. The Act also established the Privacy Commissioner of Canada as the ombudsman for privacy complaints.
| Build and Maintain a Secure Network | |
|---|---|
| Requirement 1 | Install and maintain a firewall configuration to protect cardholder data |
| Requirement 2 | Do not use vendor-supplied defaults for system passwords and other security parameters |
| Protect Cardholder Data | |
| Requirement 3 | Protect stored Cardholder Data |
| Requirement 4 | Encrypt transmission of Cardholder Data] across open, public networks |
| Maintain a Vulnerability Management Program | |
| Requirement 5 | Use and regularly update anti-virus software |
| Requirement 6 | Develop and maintain secure systems and applications |
| Implement Strong Access Control Measures | |
| Requirement 7 | Restrict access to Cardholder Data] by business Need to know |
| Requirement 8 | Assign a Unique Identifier to each person with computer access |
| Requirement 9 | Restrict physical access to Cardholder Data] |
| Regularly Monitor and Test Networks | |
| Requirement 10 | Track and monitor all access to network resources and Cardholder Data] |
| Requirement 11 | Regularly test security systems and processes |
| Maintain an Information Security Policy | |
| Requirement 12 | Maintain a policy that addresses information security |
#Within each section, information security controls and their objectives are specified and outlined. The information security controls are generally regarded as best practice means of achieving those objectives. For each of the controls, implementation guidance is provided. Specific controls are not mandated since:
#
is the second of the Basel Accords, which are recommendations on banking laws and regulations issued by the Basel Committee on Banking Supervision. The purpose of Basel II, which was initially published in June 2004, is to create an international standard that banking regulators can use when creating regulations about how much capital banks need to put aside to guard against the types of financial and operational risks banks face. Advocates of Basel II believe that such an international standard can help protect the international financial system from the types of problems that might arise should a major bank or a series of banks collapse. In practice, Basel II attempts to accomplish this by setting up rigorous risk and capital management requirements designed to ensure that a bank holds capital reserves appropriate to the risk the bank exposes itself to through its lending and investment practices. Generally speaking, these rules mean that the greater risk to which the bank is exposed, the greater the amount of capital the bank needs to hold to safeguard its solvency and overall economic stability. Read more...
#
is a formal interagency body empowered to prescribe uniform principles, standards, and report forms for the federal examination of financial institutions by the Board of Governors of the Federal Reserve System (FRB), the Federal Deposit Insurance Corporation (FDIC), the National Credit Union Administration (NCUA), the Office of the Comptroller of the Currency (OCC), and the Office of Thrift Supervision (OTS), and to make recommendations to promote uniformity in the supervision of financial institutions. In 2006, the State Liaison Committee (SLC) was added to the Council as a voting member. The SLC includes representatives from the Conference of State Bank Supervisors (CSBS), the American Council of State Savings Supervisors (ACSSS), and the National Association of State Credit Union Supervisors (NASCUS).
In basic terms, FISMA requires that federal agencies establish risk-based information security programs to secure federal information.
The act recognized the importance of information security to the economic and national security interests of the United States.[1] The act requires each federal agency to develop, document, and implement an agency-wide program to provide information security for the information and information systems that support the operations and assets of the agency, including those provided or managed by another agency, contractor, or other source.[1]
#
[#2] In-depth conversations with 160 business leaders spanning 46 multinational companies in multiple verticals revealed that dedicated investments in compliance activities.