SearchCompliance
New & Notable
News
HHS proposes changes to HIPAA privacy rule
HHS wants to modify the HIPAA privacy rule to encourage better care coordination and make it easier for patients to access their health data.
Manage
The 3 types of open source GRC tools to know about
All organizations need to meet a variety of regulatory compliance requirements, but they don't all have the budget for GRC software. Learn about seven free, open source options.
Get Started
Use these 7 controls for an enterprise IoT audit
To effectively prepare for and conduct an IoT audit, organizations need to understand which IT controls are in scope. Get actionable guidance on the audit process in this tip.
Get Started
How to perform a data protection impact assessment
Conducting a data protection impact assessment is key to evaluating potential risk factors that could pose a serious threat to individuals and their personal information.
Trending Topics
-
E-discovery and compliance Manage
Governance tide shifts as courts allow digital evidence
Digital, computer-generated records have been used as evidence in recent court cases, and the trend could cause major changes for corporate data governance.
-
Information technology governance Manage
The 3 types of open source GRC tools to know about
All organizations need to meet a variety of regulatory compliance requirements, but they don't all have the budget for GRC software. Learn about seven free, open source options.
-
SOX Manage
SOX data retention and compliance
Data retention policy is inherent to Sarbanes-Oxley Act compliance. In this tip, learn SOX data retention best practices to remain regulatory compliant.
-
Risk management Get Started
How to perform a data protection impact assessment
Conducting a data protection impact assessment is key to evaluating potential risk factors that could pose a serious threat to individuals and their personal information.
-
Content management software Evaluate
Is cloud-based data warehousing worth the risk?
Cloud services have become a popular cost-saving option for businesses, but they must be careful to protect against constantly evolving data risk.
-
Business records management Get Started
The new money: More businesses turn to data as currency
In this tip, learn digital information management strategies to take advantage of the growing data as currency movement.
Topics Covered
-
Assessing your regulatory compliance needs (7) +
-
Evaluating compliance software and solutions (12) +
- Compliance framework software
- Compliance policy management software
- Compliance reporting software
- Compliance services
- Content management software and compliance
- Data retention and compliance software
- Disaster recovery and compliance
- Document management software and compliance
- Encryption software solutions
- Financial and accounting software for compliance
- ID and access management for compliance
- Log management software solutions
-
Managing compliance operations (11) +
- Automating compliance processes
- Business continuity management and compliance
- Business records management
- Enterprise cloud compliance
- Information technology governance
- Managing compliance teams
- Managing governance and compliance
- Regulatory compliance audits
- Regulatory compliance reporting
- Regulatory compliance training
- Risk management and compliance
Find Solutions For Your Project
-
Evaluate
CCPA compliance still unclear long past deadline
Despite the July 1 CCPA compliance deadline having long past, many executives are still unclear how the law applies to their business. Privacy experts weigh in on the latest enforcements.
-
CMMC requirements set to ripple throughout DOD supply chain
-
Use this GRC tools list to find the best option before buying
-
Is zero trust the spiritual successor to PCI DSS?
-
-
Problem Solve
The 3 types of open source GRC tools to know about
All organizations need to meet a variety of regulatory compliance requirements, but they don't all have the budget for GRC software. Learn about seven free, open source options.
-
What to expect from CCPA post-GDPR rollout
-
Risk mitigation strategies for OSI layers
-
ITSM innovation: Align new tech with regulations in mind
-
-
Manage
Achieving compliance with BC, resilience standards
Follow these nine steps to first identify relevant business continuity and resilience standards and, second, launch a successful compliance program at your organization.
-
How compliance provides stakeholders evidence of success
-
SLA compliance requires meticulous monitoring
-
Address security with these PCI DSS best practices
-
-
E-Handbook | November 2019
Designing secure, compliant identity access and management
Download -
E-Handbook | September 2019
Fashion a first-rate customer experience management program
Download -
E-Handbook | June 2019
Can holistic cybersecurity deliver the needed protection?
Download -
E-Handbook | March 2019
AI cybersecurity benefits are real, but not automatic
Download -
E-Handbook | August 2016
Digital governance and compliance tactics for the regulated business
Download
Compliance Management Basics
-
Get Started
enterprise document management (EDM)
Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.
-
Get Started
How to evaluate CSPs on cloud compliance standards efforts
Get guidance on how to select relevant cloud compliance standards, along with tips on evaluating third-party providers' cloud compliance and governance efforts.
-
Get Started
Use these 7 controls for an enterprise IoT audit
To effectively prepare for and conduct an IoT audit, organizations need to understand which IT controls are in scope. Get actionable guidance on the audit process in this tip.
Multimedia
-
Get Started
Preparing your company for GDPR compliance
-
-
Vendor Resources
Blog: IT Compliance Advisor
-
'Gen V' attacks: The next cybersecurity problem?
In a recent online presentation, Check Point Software Technologies founder and CEO Gil Shwed stated that "we are at an inflection point" when it comes to cybersecurity. Shwed's statement came on ...Continue Reading
-
SheHacks hackathon at BU promotes female tech advancement
For 36 hours during the last weekend in January, more than 1,000 attended one of the largest women's hackathons ever at SheHacks Boston. SheHacks Boston organizer Natalie Pienkowska said that the ...Continue Reading
-
More IT Compliance Advisor Posts
Being Cyber Essentials certified will help prep for GDPR
Alphabet unveils Chronicle cybersecurity business unit
Cybersecurity professionals struggle to make their job a priority
-
News
View All -
Managing governance and compliance
HHS proposes changes to HIPAA privacy rule
HHS wants to modify the HIPAA privacy rule to encourage better care coordination and make it easier for patients to access their health data.
-
Financial services compliance requirements
Regulation, education needed for cybercurrency adoption
Daniel Allen explains how a lack of U.S. cryptocurrency regulation increases exploitation vulnerabilities, and shares his ideas for implementing regulatory oversight.
-
Document management software and compliance
Seal Software upgrades its contract analytics software
Seal Software launched version 7 of its contract analytics software, dubbed Seal 7, touted to provide a more seamless user experience, scalability and extensibility.