Tuesday, October 17, 2006

List of security regulations to comply applications to

There are the following regulations that applications have often to comply to:
  1. International Standard - ISO 17799
  2. California AB 1950 and SB 1386 - Personal Information Privacy
  3. Children's Online Privacy Protection Act of 1998
  4. Director of Central Intelligence Directive series
  5. Regulation E - Electronic Fund Transfer
  6. General - EU Directive Applicability
  7. Federal Information Security Management Act (FISMA)
  8. The Gramm-Leach-Bliley Act (GLBA) - Act of 1999
  9. The Health Insurance Portability and Accountability Act (HIPAA) of 1996
  10. International Standard - ISO 27001
  11. Japan's Personal Information Protection Act
  12. MasterCard Site Data Protection Program (SDP)
  13. North American Electric Reliability Council (NERC) Critical Infrastructure Protection Committee (CIPC) Security Guidelines for the Electricity Sector
  14. OWASP 10 Most Critical Web Application Security Vulnerabilities
  15. Payment Card Industry Data Security Standard (PCI)
  16. Personal Information Protection and Electronic Documents Act (PIPED Act)
  17. The Privacy Act of 1974
  18. Safe Harbor
  19. SANS Top 20 Internet Security Vulnerabilities
  20. Securities Exchange Act of 1934
  21. Sarbanes-Oxley Act of 2002
  22. Title 21 Code of Federal Regulations (21 CFR Part 11) Electronic Records
  23. UK Data Protection Act 1998
  24. Visa Cardholder Information Security Program (CISP)
  25. WASC Web Security Threat Classification
  26. BASEL II

1 comment:

John said...

If you are looking for reliable security guards who can act as doorkeepers for your company with devotion and effectiveness, then without further delay, come in touch with http://www.servelsecurity.net .Just approach servel security online and find the right security guard.