Information Defense Systems
HOME SERVICES COMPLIANCE CASE STUDIES ANNOUNCEMENTS NEWS PARTNERS ABOUT US
Industry Solutions
Compliance
Services
Company
INFORMATION ASSURANCE DIVISION SOFTWARE DEVELOPMENT DIVISION
>> Compliance
Many organizations are affected by Security and Privacy Laws, Regulations and Directives; these emerging requirements are driving IT Security Governance, Risk Management, Audit and Compliance (GRC). 

We are equipped to guide you through the engineering process of addressing or improving your compliance performance for requirements such as:


Healthcare: HIPAA requirements - The Health Insurance Portability and Accountability Act of 1996 (HIPAA, Title II) required the U.S. Department of Health and Human Services (HHS) to establish national standards for the security of electronic health care information.  The final rule adopting HIPAA standards for security was published in the Federal Register on February 20, 2003. This final rule specifies a series of administrative, technical, and physical security procedures for covered entities to use to assure the confidentiality of electronic protected health information. The standards are delineated into either required or addressable implementation specifications.  Links to HIPAA Resources:

 

Healthcare: Medicaid Information Technology Architecture (MITA) is an IT initiative intended to stimulate an integrated business and IT transformation affecting the Medicaid enterprise in all States. It includes an architecture framework, processes, and planning guidelines that allow State Medicaid enterprises to meet their Medicaid objectives within the MITA Framework while supporting unique local needs. Links to MITA Resources:

 

Federal Government:  FISMA requirements - FISMA requires the head of each federal agency to provide information security protections commensurate with the risk and magnitude of the harm that may result from unauthorized access, use, disclosure, disruption, modification or destruction of its information and information systems. The protection should apply not only within the agency, but also within contractor or other organizations working on behalf of the agency.  FISMA requires that the agency head delegate to the agency Chief Information Officer (CIO) the authority to ensure compliance with the legislation. Further, the CIO must designate a senior agency information security officer whose primary duty is to carry out the CIO’s responsibilities for information security. This information security officer must possess commensurate professional qualifications, training and experience, and head an office with sufficient resources to carry out information security responsibilities. Link to FISMA resources:


Financial: PCI requirements - The Payment Card Industry (PCI) Data Security Standard (DSS), is a set of comprehensive requirements for enhancing payment account data security, that was developed by the founding payment brands of the PCI Security Standards Council, including American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc. Inc. International, to help facilitate the broad adoption of consistent data security measures on a global basis. The PCI DSS is a multifaceted security standard that includes requirements for security management, policies, procedures, network architecture, software design and other critical protective measures. This comprehensive standard is intended to help organizations proactively protect customer account data. Links to PCI DSS Resources:

 
Financial: GLBA requirements - GLBA is designed to protect the private financial information of consumers. The law instructs financial institutions to secure and protect private information from unauthorized use or access and updates the practice and policies for individual consumers to control the use of such data. GLBA was signed into law in 1999 with full compliance required by July 1, 2001. Links to GLBA Resources:

 

Commercial: Sarbanes-Oxley Act (SOX) Security requirements - SOX is currently law, and even smaller companies are now required to comply with Section 404 for fiscal years beginning on or after Dec. 16, 2006.
The combination of the various SOX requirements means that CEOs must attest to having the proper "internal controls" at their companies to protect against data tampering. Links to SOX Security Resources:

 

Utilities: NERC CIP and Cyber Security requirements - The North American Electric Reliability Council (NERC) has issued eight reliability standards on cyber security. These Standards, effective June 1, 2006, provide a cyber security framework for the protection of critical assets to support reliable operations of the bulk electric system. Standard CIP-007, "Systems Security Management," "requires responsible entities to define methods, processes, and procedures for securing those systems determined to be critical assets, as well as the non-critical assets within the electronic security perimeter. Link to NERC CIP and Cyber Security Resources:

 

Defense: DIACAP requirements - Department of Defense Information Assurance Certification and Accreditation Process. It is the new process by which systems are certified as meeting security requirements and then accredited for operation. DIACAP has recently replaced DITSCAP (DOD Information Technology Security Certification and Accreditation Process) as the standard process under which all DOD systems will achieve and maintain their Authority to Operate (accreditation). Links to DIACAP Resources:

© 2020 Information Defense Systems - All Rights Reserved | Headquarters: 103 Commerce Street, Suite 100, Lake Mary, FL 32746
Phone: 407-215-1737 | Email: info@idefsys.com