DataSunrise Achieves AWS DevOps Competency Status in AWS DevSecOps and Monitoring, Logging, Performance

Information Security Legislation

Information Security Legislation

As the value of information increases, the number of cyber crimes goes up too. The more cyber crimes are committed, the more regulatory agencies try to prevent them by creating new laws and regulations which companies storing sensitive data are obliged to comply with. Here you can find the most important U.S. regulatory acts regarding information security.

Sarbanes-Oxley Act (SOX)

Who it is for:  Public company boards, public accounting, and management firms.

What it covers: After accounting scandals at Enron, Tyco and Worldcom corporations, which lead to stock market collapse, Sarbanes-Oxley Act (SOX) was created. It is aimed to prevent investors from accounting fraud by assuring that all the reports on financial activities contain reliable information that can be verified by independent auditors. The Act sets standards and rules for audit reports and implies greater financial disclosures. A special agent inspects, investigates and enforces compliance with the requirements. Non-compliance comes with significant penalties.

Payment Card Industry Data Security Standard (PCI DSS)

Who it is for: Any company handling credit card data, the standard is in force not only in the US but in most of the countries.

What it covers: PCI DSS was instituted by major payment card brands (Visa, MasterCard, American Express, JCB and Discover). It is a set of requirements for reducing fraud and protecting customer credit card information.

Main requirements:

  1. Install a firewall and router configuration to protect cardholder data.
  2. Default system passwords supplied by the vendor must be changed.
  3. Protect stored cardholder data. In general, no cardholder data should ever be stored unless it’s essential for business purposes.
  4. Encrypt transmission of cardholder data across open, public networks. Encryption is a technology used to encode data in a way that only authorized person can read it.
  5. Anti-virus software must be installed and regularly updated.
  6. Licensed security software must be installed.
  7. Restrict access to cardholder data by need-to-know access.
  8. Assign a unique ID to each person with the computer.
  9. Restrict physical access to cardholder data.
  10. Track and monitor all access to network resources and cardholder.
  11. Regularly test security systems and processes.
  12. Build a security system addressing information security for all employees.


Health Insurance Portability and Accountability Act (HIPAA)

Who it is for: Health insurance companies, health care providers, and medical clearinghouses.

What it covers: HIPAA is United States legislation that requires data privacy and security provisions for medical information. According to the Act subjects have to protect health information (ePHI) from being misused or exposed by unauthorized individuals.

 Main requirements and provisions:

  1. Providers who do business electronically are required to use the same health care transactions, code sets, and identifiers
  2. Federal protection for personal health information is provided. The disclosure of personal health information is permitted only if required for patient care or other important purposes.
  3. The act specifies administrative, physical, and technical safeguards for affected entities for assuring the integrity, availability, and confidentiality of electronic protected health information.
  4. Health care providers, health plans, and employers are required to have standard national numbers that identify them on standard transactions.
 

The Gramm-Leach-Bliley Act (GLB)

Who it is for: Financial institutions (banks, stock exchange companies, insurance companies); companies providing financial services, such as lending, brokering, transferring money, preparing tax returns, providing financial advice, etc.

What it covers: GBL Act is a federal law enacted to protect consumers’ personal financial information held by financial institutions. According to the privacy component, financial institutions are obliged to provide their customers an annual notice of their privacy practices and give the opportunity to choose not to share that information. The Safeguards Rule requires that financial institutions establish a comprehensive security system for the confidentiality and integrity protection of private financial data in their records.

Electronic Fund Transfer Act, Regulation E

Who it is forFinancial institutions holding consumer accounts or providing EFT services; payees and merchants.

What it covers: This Act protects customers engaging in electronic fund transfers from errors and fraud. It establishes basic rights, responsibilities, and liabilities of financial institutions that offer EFT services and their consumers. EFT’s include point-of-sale terminal transfers in stores, ATM transfers, telephone bill-payment services, and preauthorized transfers to or from a consumer’s account.

Federal Information Security Management Act (FISMA)

Who it is for: federal agencies

What it covers: This Act deals with matters of national security and obliges federal agencies to develop a method of protecting the information systems.

Main requirements/provisions:  
  1. Information needed to be protected must be categorized
  2. Periodic risk assessment procedures
  3. Continuous monitoring of security controls and assess their effectiveness
  4. Select minimum base controls
  5. Security awareness training for the personnel
  6. Take measures for detecting, reporting, and responding to security incidents
  7. Subordinate plans for networks and facilities information security
 

North American Electric Reliability Corp. (NERC) standards

Who it is forNorth American electric utility systems.

What it coversThe current set of NERC standards was developed to establish reliability standards for the bulk power system of North America, as well as protect the industry’s critical infrastructure from physical and cyber threats.

Title 21 of the Code of Federal Regulations (21 CFR Part 11) Electronic Records

Who it is forAll FDA-regulated industries regulated activities of which stipulate using computers, both in the U.S. and outside the country.

What it covers: Part 11, as it is commonly called, imposes guidelines on electronic records and electronic signatures with the purpose of upholding their reliability and trustworthiness. It was issued in 1997 and is monitored by the U.S. Food and Drug Administration.

European Union Data Protection Directive

Who it is forEuropean organizations and non-European companies to which data is exported.

What it coversEuropean Union Data Protective Directive sets strict limits on the collection and use of personal data and obliges each member state set up an independent national body responsible for the data protection.

Safe Harbor Act

Who it is forU.S. companies having business in Europe.

What it coversThe Safe Harbor Act prohibits the transfer of personal data to non-European Union nations if they do not meet the standard for privacy protection established by the European Union Data Protection Directive. It was enacted to bridge the different privacy approaches of Europe and the U.S.A., enabling U.S.A. companies to engage in trans-Atlantic operations without facing interruptions or prosecutions by European authorities.

Read more about how DataSunrise helps to comply regulatory requirements.

Next

Sensitive Data Discovery to Detect and Manage Confidential Data

Sensitive Data Discovery to Detect and Manage Confidential Data

Learn More

Need Our Support Team Help?

Our experts will be glad to answer your questions.

Countryx
United States
United Kingdom
France
Germany
Australia
Afghanistan
Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bosnia and Herzegovina
Botswana
Bouvet
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Canada
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Congo, Republic of the
Congo, The Democratic Republic of the
Cook Islands
Costa Rica
Cote D'Ivoire
Croatia
Cuba
Cyprus
Czech Republic
Denmark
Djibouti
Dominica
Dominican Republic
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard Island and Mcdonald Islands
Holy See (Vatican City State)
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iran, Islamic Republic Of
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Japan
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Democratic People's Republic of
Korea, Republic of
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libyan Arab Jamahiriya
Liechtenstein
Lithuania
Luxembourg
Macao
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States of
Moldova, Republic of
Monaco
Mongolia
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia, Republic of
Northern Mariana Islands
Norway
Oman
Pakistan
Palau
Palestinian Territory, Occupied
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Helena
Saint Kitts and Nevis
Saint Lucia
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia and Montenegro
Seychelles
Sierra Leone
Singapore
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Georgia and the South Sandwich Islands
Spain
Sri Lanka
Sudan
Suriname
Svalbard and Jan Mayen
Swaziland
Sweden
Switzerland
Syrian Arab Republic
Taiwan, Province of China
Tajikistan
Tanzania, United Republic of
Thailand
Timor-Leste
Togo
Tokelau
Tonga
Trinidad and Tobago
Tunisia
Turkey
Turkmenistan
Turks and Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Venezuela
Viet Nam
Virgin Islands, British
Virgin Islands, U.S.
Wallis and Futuna
Western Sahara
Yemen
Zambia
Zimbabwe
Choose a topicx
General Information
Sales
Customer Service and Technical Support
Partnership and Alliance Inquiries
General information:
info@datasunrise.com
Customer Service and Technical Support:
support.datasunrise.com
Partnership and Alliance Inquiries:
partner@datasunrise.com