Download this free eBook for an overview of the major regulations, their penalties and the security and monitoring measures that need to be implemented to comply.
Raz-Lee Security Announces Data Discovery A Solution to Locate Regulated or Sensitive Data on IBM i Nanuet, New York – April 15, 2018 – Raz-Lee Security Inc announces the release of Data Discovery for GDPR & PCI, a solution that provides organizations a clear and accurate view of where regulated or sensitive data resides within their organization. Common […]
Compliance with Sarbanes-Oxley The Sarbanes-Oxley Act (SOX) The Sarbanes-Oxley Act, widely know as SOX, is a United States federal law enacted in 2002. SOX relates to the review of dated legislative audit requirements to protect investors by improving the accuracy and reliability of corporate disclosures, establishing a public company accounting oversight board, corporate responsibility, auditor […]
Compliance with PCI-DSS Payment Card Industry Data Security Standard (PCI-DSS) PCI-DSS is a worldwide information security standard assembled in 2004 by the Payment Card Industry Security Standards Council. The standard was created to help organizations that process card payments prevent credit card fraud through increased controls on data. The standard applies to all organizations which […]
Compliance with HIPAA Health Insurance Portability and Accountability Act (HIPAA) HIPAA, the Health Insurance Portability and Accountability Act enacted by the U.S. Congress in 1996, is a group of regulations that work to combat waste, fraud, and abuse in health care delivery and health insurance. Title II of HIPAA, known as the Administrative Simplification (AS) […]
Compliance with GDPR General Data Protection Regulation (GDPR) The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a regulation that reinforces and binds together information security for all people inside the European Union (EU). It is intended to protect personal data and establishes how organizations process, store, and ultimately destroy it when the data […]