Common Compliance Schemes

7 links
From

editione1.0.0

Updated October 9, 2023
Now Available
Security for Everyone

The following are common schemes you may encounter, with resources for further information.

Payment Card Industry Data Security Standard (PCI DSS)

Governs the safe storage and processing of credit card information. This standard applies to all companies that process and handle credit card payments.

resources

Health Insurance Portability and Accountability Act (HIPAA)

A standard development and enforced by the US government for the protection of some types of health information. Most suppliers of health systems are required to meet this standard.

Systems and Organization Controls (SOC)

Covering a wide range of operational aspects of organizations, SOC 2 specifically refers to the controls at a service organization relevant to security, availability, processing integrity, confidentiality, or privacy.

ISO 27001: Information Security Management

Definition ISO 27001 is the International Standard for the Management of Information Security. It covers a range of key domains from policy and standards through to disaster recovery. Certification to this standard implies that you have a well-developed and mature approach to all aspects of information security. This is an optional standard.

What Can Trigger the Need for Compliance Schemes?

For most of us, compliance schemes are a natural part of growing. There are hundreds of different regulations and compliance schemes around the world, and you may find your organization is subject to a number of different schemes depending on elements of your business model and operations.

Let’s take a look at the relationship between your business operations and the compliance schemes it may need to comply with.

Table: Operational Areas that Relate to Compliance

You’re reading a preview of an online book. Buy it now for lifetime access to expert knowledge, including future updates.
If you found this post worthwhile, please share!