Blog
Page 28 of 152
What Is ISO 14001?
ISO 14001 is the international standard that specifies requirements for an effective environmental management system to achieve ISO compliance. An environmental management system consists of policies, processes, plans, practices, and records that govern how an organization interacts with the environment. That system should be tailored to each organization because the legal requirements and environmental interactions […]
November 28, 2023
What is the HIPAA Privacy Rule?
The HIPAA Privacy Rule, formally known as the Standards for Privacy of Individually Identifiable Health Information, is a cornerstone of healthcare compliance. Enacted under the Health Insurance Portability and Accountability Act (HIPAA), this rule is the bedrock for safeguarding sensitive health records and protecting Individually Identifiable Health Information (IIHI). Its scope is comprehensive, encompassing all […]
Tags: HIPAA
What is GDPR?
The GDPR (General Data Protection Regulation) is a data protection law that mandates all companies doing business within the European Union (EU) member states to comply with strict new rules protecting the personal data and privacy of people living in the EU (data subjects). Effective May 25, 2018, the General Data Protection Regulation replaces the […]
Tags: GDPR
What is PCI DSS certification?
Understanding PCI DSS Certification vs. Compliance There is no “PCI DSS certificate” in the traditional sense because payment card data security is an ongoing process, not a one-time achievement. However, larger merchants must obtain an annual Report on Compliance (ROC) from a Qualified Security Assessor (QSA) or Internal Security Assessor to demonstrate their PCI DSS […]
Why is FedRAMP Important for State and Local Agencies?
The Federal Risk and Authorization Management Program (FedRAMP) was launched by a group of federal agencies that realized the efficiency of having a single risk-based standard for Cloud Service Providers (CSPs) rather than each federal agency developing its security assessment program from scratch when forging a business relationship with an industry partner. As all organizations […]
What is PCI PA-DSS?
The Payment Application Data Security Standard (PA-DSS) is a program designed to help companies like software vendors build secure payment applications that don’t store “prohibited data,” such as full magnetic stripe, PIN data, or CVV2. PA-DSS makes sure payment applications support PCI DSS compliance. But, the use of a PA-DSS-compliant application by itself isn’t the […]
To Whom Does the CCPA Apply?
The California Consumer Privacy Act (CCPA) applies to certain for-profit businesses that collect or have collected the personal information of California residents, whether or not those businesses are located in California. Often compared to the European Union’s General Data Protection Regulation (GDPR), the CCPA is the most stringent data privacy law in the United States. […]
Tags: Audit Management, CCPA
What is COSO?
The Committee of Sponsoring Organizations of the Treadway Commission (COSO) was formed initially to enable the National Commission on Fraudulent Financial Reporting. It was founded by five significant professional associations: The American Accounting Association (AAA), the American Institute of Certified Public Accountants (AICPA), Financial Executives International (FEI), the Institute of Internal Auditors (IIA), and the […]
Tags: Audit Management, COSO
PCI Scope: What Is it & Best Practices
E-commerce is a huge commercial realm, with some 2.14 billion digital buyers worldwide by the end of 2021. At the heart of e-commerce is the ability to keep payment card data secure during online transactions, and at the heart of payment card security is Payment Card Industry (PCI) compliance. Technically, PCI compliance is not required […]
What Is a SOC 2 Readiness Assessment and Why Do You Need It?
SOC 2 audits are independent assessments of your company’s cybersecurity posture, and those audits are no walk in the park. Hence it would be wise for your company first to undertake its own SOC 2 readiness assessment: so that you can identify and correct problems before the external auditors find those issues for you. First, […]
Page 28 of 152