SearchCompliance
New & Notable
Get Started
How to evaluate CSPs on cloud compliance standards efforts
Get guidance on how to select relevant cloud compliance standards, along with tips on evaluating third-party providers' cloud compliance and governance efforts.
News
HHS proposes changes to HIPAA privacy rule
HHS wants to modify the HIPAA privacy rule to encourage better care coordination and make it easier for patients to access their health data.
Manage
The 3 types of open source GRC tools to know about
All organizations need to meet a variety of regulatory compliance requirements, but they don't all have the budget for GRC software. Learn about seven free, open source options.
Get Started
Use these 7 controls for an enterprise IoT audit
To effectively prepare for and conduct an IoT audit, organizations need to understand which IT controls are in scope. Get actionable guidance on the audit process in this tip.
Trending Topics
-
E-discovery and compliance Manage
Governance tide shifts as courts allow digital evidence
Digital, computer-generated records have been used as evidence in recent court cases, and the trend could cause major changes for corporate data governance.
-
Information technology governance Manage
The 3 types of open source GRC tools to know about
All organizations need to meet a variety of regulatory compliance requirements, but they don't all have the budget for GRC software. Learn about seven free, open source options.
-
SOX Manage
SOX data retention and compliance
Data retention policy is inherent to Sarbanes-Oxley Act compliance. In this tip, learn SOX data retention best practices to remain regulatory compliant.
-
Risk management Get Started
How to perform a data protection impact assessment
Conducting a data protection impact assessment is key to evaluating potential risk factors that could pose a serious threat to individuals and their personal information.
-
Content management software Evaluate
Is cloud-based data warehousing worth the risk?
Cloud services have become a popular cost-saving option for businesses, but they must be careful to protect against constantly evolving data risk.
-
Business records management Get Started
The new money: More businesses turn to data as currency
In this tip, learn digital information management strategies to take advantage of the growing data as currency movement.
Topics Covered
-
Assessing your regulatory compliance needs (7) +
-
Evaluating compliance software and solutions (12) +
- Compliance framework software
- Compliance policy management software
- Compliance reporting software
- Compliance services
- Content management software and compliance
- Data retention and compliance software
- Disaster recovery and compliance
- Document management software and compliance
- Encryption software solutions
- Financial and accounting software for compliance
- ID and access management for compliance
- Log management software solutions
-
Managing compliance operations (11) +
- Automating compliance processes
- Business continuity management and compliance
- Business records management
- Enterprise cloud compliance
- Information technology governance
- Managing compliance teams
- Managing governance and compliance
- Regulatory compliance audits
- Regulatory compliance reporting
- Regulatory compliance training
- Risk management and compliance
Find Solutions For Your Project
-
Evaluate
Exploring GRC automation benefits and challenges
Governance, risk and compliance is a crucial enterprise task but can be costly and time-consuming. This is where GRC automation fits in. Learn about its benefits and challenges.
-
CCPA compliance still unclear long past deadline
-
CMMC requirements set to ripple throughout DOD supply chain
-
Use this GRC tools list to find the best option before buying
-
-
Problem Solve
The 3 types of open source GRC tools to know about
All organizations need to meet a variety of regulatory compliance requirements, but they don't all have the budget for GRC software. Learn about seven free, open source options.
-
What to expect from CCPA post-GDPR rollout
-
Risk mitigation strategies for OSI layers
-
ITSM innovation: Align new tech with regulations in mind
-
-
Manage
Achieving compliance with BC, resilience standards
Follow these nine steps to first identify relevant business continuity and resilience standards and, second, launch a successful compliance program at your organization.
-
How compliance provides stakeholders evidence of success
-
SLA compliance requires meticulous monitoring
-
Address security with these PCI DSS best practices
-
-
E-Handbook | November 2019
Designing secure, compliant identity access and management
Download -
E-Handbook | September 2019
Fashion a first-rate customer experience management program
Download -
E-Handbook | June 2019
Can holistic cybersecurity deliver the needed protection?
Download -
E-Handbook | March 2019
AI cybersecurity benefits are real, but not automatic
Download -
E-Handbook | August 2016
Digital governance and compliance tactics for the regulated business
Download
Compliance Management Basics
-
Get Started
compliance risk
Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.
-
Get Started
information governance
Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.
-
Get Started
enterprise document management (EDM)
Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.
Multimedia
Vendor Resources
Blog: IT Compliance Advisor
-
'Gen V' attacks: The next cybersecurity problem?
In a recent online presentation, Check Point Software Technologies founder and CEO Gil Shwed stated that "we are at an inflection point" when it comes to cybersecurity. Shwed's statement came on ...Continue Reading
-
SheHacks hackathon at BU promotes female tech advancement
For 36 hours during the last weekend in January, more than 1,000 attended one of the largest women's hackathons ever at SheHacks Boston. SheHacks Boston organizer Natalie Pienkowska said that the ...Continue Reading
-
More IT Compliance Advisor Posts
Being Cyber Essentials certified will help prep for GDPR
Alphabet unveils Chronicle cybersecurity business unit
Cybersecurity professionals struggle to make their job a priority
-
News
View All -
Managing governance and compliance
HHS proposes changes to HIPAA privacy rule
HHS wants to modify the HIPAA privacy rule to encourage better care coordination and make it easier for patients to access their health data.
-
Financial services compliance requirements
Regulation, education needed for cybercurrency adoption
Daniel Allen explains how a lack of U.S. cryptocurrency regulation increases exploitation vulnerabilities, and shares his ideas for implementing regulatory oversight.
-
Document management software and compliance
Seal Software upgrades its contract analytics software
Seal Software launched version 7 of its contract analytics software, dubbed Seal 7, touted to provide a more seamless user experience, scalability and extensibility.