SearchCompliance

New & Notable

Get Started

How to evaluate CSPs on cloud compliance standards efforts

Get guidance on how to select relevant cloud compliance standards, along with tips on evaluating third-party providers' cloud compliance and governance efforts.

News

HHS proposes changes to HIPAA privacy rule

HHS wants to modify the HIPAA privacy rule to encourage better care coordination and make it easier for patients to access their health data.

Manage

The 3 types of open source GRC tools to know about

All organizations need to meet a variety of regulatory compliance requirements, but they don't all have the budget for GRC software. Learn about seven free, open source options.

Get Started

Use these 7 controls for an enterprise IoT audit

To effectively prepare for and conduct an IoT audit, organizations need to understand which IT controls are in scope. Get actionable guidance on the audit process in this tip.

Find Solutions For Your Project

Pro+ Compliance Downloads

View All

Compliance Management Basics

  • Get Started

    compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.

  • Get Started

    information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.

  • Get Started

    enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: IT Compliance Advisor

Sections from across SearchCompliance

SearchCIO

SearchHealthIT

SearchCloudComputing

SearchDataCenter

SearchDataManagement

SearchSecurity

Close