- International Standard - ISO 17799
- California AB 1950 and SB 1386 - Personal Information Privacy
- Children's Online Privacy Protection Act of 1998
- Director of Central Intelligence Directive series
- Regulation E - Electronic Fund Transfer
- General - EU Directive Applicability
- Federal Information Security Management Act (FISMA)
- The Gramm-Leach-Bliley Act (GLBA) - Act of 1999
- The Health Insurance Portability and Accountability Act (HIPAA) of 1996
- International Standard - ISO 27001
- Japan's Personal Information Protection Act
- MasterCard Site Data Protection Program (SDP)
- North American Electric Reliability Council (NERC) Critical Infrastructure Protection Committee (CIPC) Security Guidelines for the Electricity Sector
- OWASP 10 Most Critical Web Application Security Vulnerabilities
- Payment Card Industry Data Security Standard (PCI)
- Personal Information Protection and Electronic Documents Act (PIPED Act)
- The Privacy Act of 1974
- Safe Harbor
- SANS Top 20 Internet Security Vulnerabilities
- Securities Exchange Act of 1934
- Sarbanes-Oxley Act of 2002
- Title 21 Code of Federal Regulations (21 CFR Part 11) Electronic Records
- UK Data Protection Act 1998
- Visa Cardholder Information Security Program (CISP)
- WASC Web Security Threat Classification
- BASEL II
Tuesday, October 17, 2006
List of security regulations to comply applications to
There are the following regulations that applications have often to comply to:
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment