Many U.S. companies receive what, until recently, were called SAS 70 audit reports from certain types of vendors.
HIPAA Gap Analysis: Critical & Recent Compliance Gaps You Need to Know
Healthcare providers, payers, exchanges, and many service providers to the healthcare industry are under increased pressure to demonstrate their compliance with the security and privacy requirements of HIPAA.
Data Encryption: Use It or Lose It (Your Data)
Have you ever thought about what you would do if someone obtained access to all the information you stored electronically?
The SOC 2 Privacy Audit
The trust services criteria applicable to a SOC 2 privacy audit covering the privacy criteria applies only to personal information such as health records, payment card information, or other personally identifiable information (PII). This is different than for the confidentiality criteria which applies to various types of sensitive information such as customer lists, product specifications, […]
FISMA Compliance: Security Standards & Guidelines Overview
The Federal Information Security Management Act (FISMA) was originally released in December 2002 and established the importance of information security principles and practices within the Federal Government, noting that information security was “critical to the economic and national security interests of the United States.