ID and access management for compliance

Email Alerts

Register now to receive SearchCompliance.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • privacy impact assessment (PIA)

    A privacy impact assessment (PIA) is an analysis of how an individual's or groups of individuals' personally identifiable information is collected, used, shared and maintained by an organization. 

  • ISO 27002 (International Organization for Standardization 27002)

    The ISO 27002 standard is a collection of information security guidelines that are intended to help an organization implement, maintain, and improve its information security management. 

  • access list (AL)

    An access list (AL) is a list of permissions used in physical and information technology (IT) security to control who is allowed contact with a corporate asset.  The asset can be a building, a room or a computer file.  

  • database activity monitoring (DAM)

    Database activity monitoring (DAM) systems monitor and record activity in a database and then generate alerts for anything unusual. 

About ID and access management for compliance

Compliance requires knowledge of who's accessing your information, and how and when they're doing it. Keep up with identity (ID) and access management technologies with the latest news and resources on encryption, PCI DSS, FFIEC compliance and multi-factor authentication.