Compliance:: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
Line 9: | Line 9: | ||
<br> | <br> | ||
:3. [[HIPAA_Policy_References:|'''Regulatory Compliance (HIPAA)''']]<br> | :3. [[HIPAA_Policy_References:|'''Regulatory Compliance (HIPAA)''']]<br> | ||
:This section contains a HIPAA Compliance Matrix that details how this system and other services can be used for | :This section contains a HIPAA Compliance Matrix that details how this system and other services can be used for HIPAA compliance.<br> | ||
<br> | <br> | ||
:4. [[SOX_Policy_References:|'''Regulatory Compliance (SOX)''']]<br> | :4. [[SOX_Policy_References:|'''Regulatory Compliance (SOX)''']]<br> | ||
:This section contains a Sarbanes-Oxley Compliance Matrix that details how this system and other services can be used for Sarbanes-Oxley compliance.<br> | :This section contains a Sarbanes-Oxley Compliance Matrix that details how this system and other services can be used for Sarbanes-Oxley compliance.<br> | ||
<br> | <br> | ||
==See Also== | |||
==References== | |||
* ISO 17799/27002 - Code of Practice for Information Security Management. |
Revision as of 12:23, 25 May 2007
Compliance
ISO 17799 defines Compliance objectives to avoid breaches of any criminal or civil law, statutory, regulatory or contractual obligations and of any security requirements; ensure compliance of systems with organizational security policies and standards; and maximize the effectiveness of and to minimize interference to/from the system audit process. This section provides templates for an Information Security Program Charter and supporting policies that are required to comply with ISO Compliance objectives, as well as guidance for complying with regulations such as GLBA and HIPAA.
- 1. ISO Security Policy
- This section provides templates for an Information Security Program Charter and supporting policies that are required to comply with ISO Compliance objectives and clearly state specific requirements for policy compliance and enforcement, as well as actions that may be taken for violations of applicable regulations and laws.
- 2. Regulatory Compliance (GLBA)
- This section contains a GLBA Compliance Matrix that details how this system and other services can be used for GLBA compliance.
- 3. Regulatory Compliance (HIPAA)
- This section contains a HIPAA Compliance Matrix that details how this system and other services can be used for HIPAA compliance.
- 4. Regulatory Compliance (SOX)
- This section contains a Sarbanes-Oxley Compliance Matrix that details how this system and other services can be used for Sarbanes-Oxley compliance.
See Also
References
- ISO 17799/27002 - Code of Practice for Information Security Management.