SlideShare a Scribd company logo
1 of 1
Download to read offline
As data breaches become more frequent, security
and compliance issues are becoming the
cornerstone of information security. What do you
need to know about the different certifications?
#1 Only hospitals and insurance carriers
need to worry about HIPPA.
Myth
#3
Only public companies need to worry
about financial control compliance like
SSAE 163
SOC 14
, SOC 25
and ISAE 34026
Myth
#4
All Data Centers offer Certified
Compliant Solutions
Myth
Why you care about HIPAA1
?
Because you trust health care providers
to protect your privacy. Private health data is
exposed to dozens of different organizations
in today’s healthcare systems.
Goal of HIPAA – Protecting personal health
information. There is a perfect HIPAA storm
brewing, which is fueled by increasing:
These reports demonstrate your company is accountable for the secure handling of data
in order to protect the public from accounting errors and fraud. Adherence to the
guidelines is becoming increasingly important as companies move to the Cloud or SaaS
models where sensitive corporate data is held by third parties.
Numbers of Data Breaches (2 major
insurance carriers were hacked in
2015 resulting in the largest
healthcare data breaches in history
Costs of HIPAA violations
As the number of providers
increases – so do the risks of failure:
Hospitals
PHR
Application
Providers
PhysiciansHealth Plans
Device
ManufacturerEmployersLaboratories
Healthcare
information
Exchange (HIE)
Why you care about PCI DSS2
Compliance
Because online customers put trust in you every time they make a purchase
Goal of PCI DSS is to process online payments securely
05
-
Sponsored
Bank
Payment Card
Industry
Payment Network
Credit Card
Processor
Merchant
Card Holder
Issuing Bank
Payment Card
Industry (PCI)
Transaction
Cash Flow
The statistics are alarming:
80% 45% 69%of Companies are
failing PCI validation
assessments in 2014
(Verizon PCI
Compliance Report)
of Americans report they
have been notified that
their credit card
information has been
stolen in a breach.
of consumers are less
inclined to do business
with a breached
organization (Quirks
Radius Global Marketing
Research, 6/14)
SOC 1 SOC 2
Internal controls
over financial
reporting
Used by User’s
auditors and
users’ controller’s
office
Security
The system is protected against unauthorized access (both
physical and logical
Availability
The system is available for operation and use as
unauthorized or agreed
Processing Integrity
System processing is complete accurate timely, and
authorized
Confidentiality
Information designated as confidential is protected as
committed or agreed.
Privacy
Personal Information is collected, used, retained, disclosed
and destroyed in conformity with the commitments in the
entities privacy notice
Used by Management, regulators & other.
Shared under NDA
How are SSAE 16 and ISAE used?
The Truth about SSAE 16 and ISAE
3402 Compliance
A service provider can undertake its own SSAE 16/ISAE-3402 assessment, and provides
copies of the auditor’s report to their customer’s auditors upon request. Because it’s an
“auditor-to-auditor” report, a customer’s auditors rely on the report to verify the quality
of your company’s controls without assessing them directly.
1. Required to perform outsourced services for Public Companies
2. Proves your company can be trusted to handle data of your clients
3. Third party review of your control and activities ensure they are functioning properly
4. It is required in many RFPs
#2
Only Large Online Retailers need to
worry about PCI DSS
Myth
Security
Safeguards
• Information Access
Management
• Security Incident
Procedures
• Contingency Plans
Administrative
Safeguards
Physical
Safeguards
Disaster
Recovery
Planning
Technical
Safeguards
100% COMPLIANCE
365 Data Centers is the first national colocation provider to achieve
compliance with several of the most stringent industry standards across
100% of its facilities nationwide.
HIPAA
3.0
365 DATA CENTERS IS CERTIFIED FOR:
For 365 to successfully pass the certification audits, it needed to present a consistent
environment, operational framework and measures across all of its facilities.
systems operational processes security measures
“ “Certifying compliance across all facilities is a significant
accomplishment and an uncommon feat these days. 365 continues
to raise the bar for client services.
Scott G. Price, CPA/CISA/CIA, Managing Director, A-lign
About 365 Data Centers
365 Data Centers connects carriers, content publishers, cloud providers and their
customers, at the edge, in a media-rich world. Through its 15 U.S. data centers, 100%
uptime SLA, and national network of carriers and content providers, 365 Data Centers
offers colocation and cloud solutions that are tailored to meet the needs of its
customers. For more information, visit 365datacenters.com
1. Health Insurance Portability and Accountability Act
2. Payment Card Industry Data Security Standard
3. Statement on Standards for Attestation Engagements
4. SOC 1 Service Organization Control audits regarding internal control over financial reporting
5. SOC 2 are Service Organization Controls Reports audits to evaluate controls around security, availability, processing integrity and privacy
6. International Standards for Assurance Engagements a global standard for reporting on controls at service organizations in response to Sarbanes-Oxley Act
Four Myths about Security
Compliance That Every IT
Pro Needs to Know
FACT: Simple mistakes can equal big
fines. Even small practices must comply.
The Truth is: According to the PCI Security Standards Council, if your business registers
one credit card transaction or six million, you must be compliant. Businesses are
liable for the credit card data of their customers and can face penalties of up to
$100,000 for each violation
The Truth is that few data centers offer compliant solution across multiple locations
although the services they offer are fundamental to achieving security compliance.

More Related Content

What's hot

Strategies for Enterprise Grade Azure-based Analytics
Strategies for Enterprise Grade Azure-based AnalyticsStrategies for Enterprise Grade Azure-based Analytics
Strategies for Enterprise Grade Azure-based Analytics
Cloudera, Inc.
 
Security and governance
Security and governanceSecurity and governance
Security and governance
DataWorks Summit
 
Moving beyond Big Data, BAE Systems Detica
Moving beyond Big Data, BAE Systems Detica Moving beyond Big Data, BAE Systems Detica
Moving beyond Big Data, BAE Systems Detica
Internet World
 

What's hot (20)

Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva4 ways to cut your e discovery costs in half-webinar-exterro-druva
4 ways to cut your e discovery costs in half-webinar-exterro-druva
 
Strategies for Enterprise Grade Azure-based Analytics
Strategies for Enterprise Grade Azure-based AnalyticsStrategies for Enterprise Grade Azure-based Analytics
Strategies for Enterprise Grade Azure-based Analytics
 
Security and governance
Security and governanceSecurity and governance
Security and governance
 
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...Conférence  - Les enjeux et la vision de Veritas sur la protection des donnée...
Conférence - Les enjeux et la vision de Veritas sur la protection des donnée...
 
All Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of EverythingAll Together Now: Connected Analytics for the Internet of Everything
All Together Now: Connected Analytics for the Internet of Everything
 
Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18Delivering improved patient outcomes through advanced analytics 6.26.18
Delivering improved patient outcomes through advanced analytics 6.26.18
 
The 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: ExposedThe 5 Biggest Data Myths in Telco: Exposed
The 5 Biggest Data Myths in Telco: Exposed
 
Cloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and RecoveryCloud Computing Stats - Security and Recovery
Cloud Computing Stats - Security and Recovery
 
Foundational Strategies for Trusted Data: Getting Your Data to the Cloud
Foundational Strategies for Trusted Data: Getting Your Data to the CloudFoundational Strategies for Trusted Data: Getting Your Data to the Cloud
Foundational Strategies for Trusted Data: Getting Your Data to the Cloud
 
Multi Cloud Data Integration- Retail
Multi Cloud Data Integration- RetailMulti Cloud Data Integration- Retail
Multi Cloud Data Integration- Retail
 
Equinix Big Data Platform and Cassandra - A view into the journey
Equinix Big Data Platform and Cassandra - A view into the journeyEquinix Big Data Platform and Cassandra - A view into the journey
Equinix Big Data Platform and Cassandra - A view into the journey
 
Fast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital TransformationFast Data Flow Is the Secret to Accelerating Digital Transformation
Fast Data Flow Is the Secret to Accelerating Digital Transformation
 
Moving beyond Big Data, BAE Systems Detica
Moving beyond Big Data, BAE Systems Detica Moving beyond Big Data, BAE Systems Detica
Moving beyond Big Data, BAE Systems Detica
 
WHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of ThingsWHITE PAPER▶ Insecurity in the Internet of Things
WHITE PAPER▶ Insecurity in the Internet of Things
 
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the CloudCut End-to-End eDiscovery Time in Half: Leveraging the Cloud
Cut End-to-End eDiscovery Time in Half: Leveraging the Cloud
 
New Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data ProtectionNew Strategies for More Effective Remote/Branch Office Data Protection
New Strategies for More Effective Remote/Branch Office Data Protection
 
Optimizing Oracle Cloud Infrastructure through Interconnection
Optimizing Oracle Cloud Infrastructure through Interconnection Optimizing Oracle Cloud Infrastructure through Interconnection
Optimizing Oracle Cloud Infrastructure through Interconnection
 
90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?90% of Enterprises are Using DataOps. Why Aren’t You?
90% of Enterprises are Using DataOps. Why Aren’t You?
 
Cloud Brokering Brochure
Cloud Brokering BrochureCloud Brokering Brochure
Cloud Brokering Brochure
 

Similar to 365 infographic-compliance

Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Cheryl Goldberg
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Cheryl Goldberg
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
amburyj3c9
 

Similar to 365 infographic-compliance (20)

The Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOTThe Most Wonderful Time of the Year for Health-IT...NOT
The Most Wonderful Time of the Year for Health-IT...NOT
 
Identity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare ProvidersIdentity Management: Front and Center for Healthcare Providers
Identity Management: Front and Center for Healthcare Providers
 
Cyber Security Certifications.pdf
Cyber Security Certifications.pdfCyber Security Certifications.pdf
Cyber Security Certifications.pdf
 
About SOC 2 Compliance
 About SOC 2 Compliance About SOC 2 Compliance
About SOC 2 Compliance
 
About SOC 2 Compliance
 About SOC 2 Compliance About SOC 2 Compliance
About SOC 2 Compliance
 
Soc 2 Compliance.pdf
Soc 2 Compliance.pdfSoc 2 Compliance.pdf
Soc 2 Compliance.pdf
 
Soc 2 Compliance.pdf
Soc 2 Compliance.pdfSoc 2 Compliance.pdf
Soc 2 Compliance.pdf
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_CloudPerspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
Perspecsys_Best_Practices_Guide_for_Protecting_Healthcare_Data_in_the_Cloud
 
Master Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security FundamentalsMaster Data in the Cloud: 5 Security Fundamentals
Master Data in the Cloud: 5 Security Fundamentals
 
Untitled document (4).docx
Untitled document (4).docxUntitled document (4).docx
Untitled document (4).docx
 
Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT Executive Brief- 4 Critical Risks for Healthcare IT
Executive Brief- 4 Critical Risks for Healthcare IT
 
Privacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service RepresentativesPrivacy Do's and Don'ts for Customer Service Representatives
Privacy Do's and Don'ts for Customer Service Representatives
 
HIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future ExpectationsHIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future Expectations
 
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014Gaining assurance over 3rd party soc 1 and soc 2   reporting 7-2014
Gaining assurance over 3rd party soc 1 and soc 2 reporting 7-2014
 
Account Right SOC Services brochure.pptx
Account Right SOC Services brochure.pptxAccount Right SOC Services brochure.pptx
Account Right SOC Services brochure.pptx
 
Cloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor RiskCloud Cybersecurity: Strategies for Managing Vendor Risk
Cloud Cybersecurity: Strategies for Managing Vendor Risk
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
Verizon 2014 pci compliance report
Verizon 2014 pci compliance reportVerizon 2014 pci compliance report
Verizon 2014 pci compliance report
 
Verizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance ReportVerizon 2014 PCI Compliance Report
Verizon 2014 PCI Compliance Report
 

Recently uploaded

VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 

Recently uploaded (20)

VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
VVIP Pune Call Girls Mohammadwadi WhatSapp Number 8005736733 With Elite Staff...
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts ServiceReal Escorts in Al Nahda +971524965298 Dubai Escorts Service
Real Escorts in Al Nahda +971524965298 Dubai Escorts Service
 
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
VVIP Pune Call Girls Sinhagad WhatSapp Number 8005736733 With Elite Staff And...
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 

365 infographic-compliance

  • 1. As data breaches become more frequent, security and compliance issues are becoming the cornerstone of information security. What do you need to know about the different certifications? #1 Only hospitals and insurance carriers need to worry about HIPPA. Myth #3 Only public companies need to worry about financial control compliance like SSAE 163 SOC 14 , SOC 25 and ISAE 34026 Myth #4 All Data Centers offer Certified Compliant Solutions Myth Why you care about HIPAA1 ? Because you trust health care providers to protect your privacy. Private health data is exposed to dozens of different organizations in today’s healthcare systems. Goal of HIPAA – Protecting personal health information. There is a perfect HIPAA storm brewing, which is fueled by increasing: These reports demonstrate your company is accountable for the secure handling of data in order to protect the public from accounting errors and fraud. Adherence to the guidelines is becoming increasingly important as companies move to the Cloud or SaaS models where sensitive corporate data is held by third parties. Numbers of Data Breaches (2 major insurance carriers were hacked in 2015 resulting in the largest healthcare data breaches in history Costs of HIPAA violations As the number of providers increases – so do the risks of failure: Hospitals PHR Application Providers PhysiciansHealth Plans Device ManufacturerEmployersLaboratories Healthcare information Exchange (HIE) Why you care about PCI DSS2 Compliance Because online customers put trust in you every time they make a purchase Goal of PCI DSS is to process online payments securely 05 - Sponsored Bank Payment Card Industry Payment Network Credit Card Processor Merchant Card Holder Issuing Bank Payment Card Industry (PCI) Transaction Cash Flow The statistics are alarming: 80% 45% 69%of Companies are failing PCI validation assessments in 2014 (Verizon PCI Compliance Report) of Americans report they have been notified that their credit card information has been stolen in a breach. of consumers are less inclined to do business with a breached organization (Quirks Radius Global Marketing Research, 6/14) SOC 1 SOC 2 Internal controls over financial reporting Used by User’s auditors and users’ controller’s office Security The system is protected against unauthorized access (both physical and logical Availability The system is available for operation and use as unauthorized or agreed Processing Integrity System processing is complete accurate timely, and authorized Confidentiality Information designated as confidential is protected as committed or agreed. Privacy Personal Information is collected, used, retained, disclosed and destroyed in conformity with the commitments in the entities privacy notice Used by Management, regulators & other. Shared under NDA How are SSAE 16 and ISAE used? The Truth about SSAE 16 and ISAE 3402 Compliance A service provider can undertake its own SSAE 16/ISAE-3402 assessment, and provides copies of the auditor’s report to their customer’s auditors upon request. Because it’s an “auditor-to-auditor” report, a customer’s auditors rely on the report to verify the quality of your company’s controls without assessing them directly. 1. Required to perform outsourced services for Public Companies 2. Proves your company can be trusted to handle data of your clients 3. Third party review of your control and activities ensure they are functioning properly 4. It is required in many RFPs #2 Only Large Online Retailers need to worry about PCI DSS Myth Security Safeguards • Information Access Management • Security Incident Procedures • Contingency Plans Administrative Safeguards Physical Safeguards Disaster Recovery Planning Technical Safeguards 100% COMPLIANCE 365 Data Centers is the first national colocation provider to achieve compliance with several of the most stringent industry standards across 100% of its facilities nationwide. HIPAA 3.0 365 DATA CENTERS IS CERTIFIED FOR: For 365 to successfully pass the certification audits, it needed to present a consistent environment, operational framework and measures across all of its facilities. systems operational processes security measures “ “Certifying compliance across all facilities is a significant accomplishment and an uncommon feat these days. 365 continues to raise the bar for client services. Scott G. Price, CPA/CISA/CIA, Managing Director, A-lign About 365 Data Centers 365 Data Centers connects carriers, content publishers, cloud providers and their customers, at the edge, in a media-rich world. Through its 15 U.S. data centers, 100% uptime SLA, and national network of carriers and content providers, 365 Data Centers offers colocation and cloud solutions that are tailored to meet the needs of its customers. For more information, visit 365datacenters.com 1. Health Insurance Portability and Accountability Act 2. Payment Card Industry Data Security Standard 3. Statement on Standards for Attestation Engagements 4. SOC 1 Service Organization Control audits regarding internal control over financial reporting 5. SOC 2 are Service Organization Controls Reports audits to evaluate controls around security, availability, processing integrity and privacy 6. International Standards for Assurance Engagements a global standard for reporting on controls at service organizations in response to Sarbanes-Oxley Act Four Myths about Security Compliance That Every IT Pro Needs to Know FACT: Simple mistakes can equal big fines. Even small practices must comply. The Truth is: According to the PCI Security Standards Council, if your business registers one credit card transaction or six million, you must be compliant. Businesses are liable for the credit card data of their customers and can face penalties of up to $100,000 for each violation The Truth is that few data centers offer compliant solution across multiple locations although the services they offer are fundamental to achieving security compliance.