Compliance Tag Directory

Browse Alphabetically:

Featured Compliance Questions

Experience with Change Management Software
Currently evaluating solutions for iSeries, WDSC & Websphere running on Linux on PCs. Down to Aldon & Turnover. Anyone have enough experience with these products to compare strengths & weaknesses in production?

Answer Question   |  January 23, 2014  2:34 PM
Development, Lifecycle development, Project management, Sarbanes-Oxley Act, Software Quality Assurance
asked by:
0 pts.

Checklists for Router, Firewall and Switch security
I have recently been shifted to Information security audit department. I need some checklists to check the security compliance for Router, Switch, and Firewall. Please provide me some checklists to audit the same.

Answer Question   |  December 12, 2013  6:03 AM
Audit and compliance, Auditing (compliance), Compliance checklist, ISMS, Security audits, Security compliance
asked by:
130 pts.

Security Audit
what form or procedeure would you use for a final security Audit after the Avaya system is installed?

Answer Question   |  November 18, 2013  9:04 PM
Audit and compliance, Auditing, Avaya, IT audit, Security audits
asked by:
20 pts.

What is the biggest way data centers can help with PCI?
What is the biggest way data centers can help with PCI?

Answer Question   |  October 16, 2013  3:21 PM
Data Center Compliance
asked by:
5 pts.

Controls
Is trust a Sarbanes Oxley control?  If not, can you point me to the section of SOX that defines this?

Answer Question   |  October 7, 2013  3:24 PM
SOX, SOX compliance
asked by:
RDA
5 pts.

508 Compliance
Is Siebel considered to be 508 Compliant?

Answer Question   |  September 20, 2013  6:19 PM
508 Compliance, Siebel
asked by:
5 pts.

What do you think of the NSA programs that monitor Internet activity and phone records?
After news broke of the U.S. National Security Agencies (NSA) access to information from a large segment of Internet traffic (social media and domestic companies), discussions about national security and online privacy issues have reached a new high. What do you think of the NSA programs that monitor Internet activity and phone records? Is it...

Answer Question   |  July 2, 2013  7:57 PM
cybersecurity, NSA, Privacy rights, Security
asked by:
25,225 pts.

Information on IT Auditing
Where can I get the information on IT auditing from this site? Thank You.

Answer Question   |  June 24, 2013  8:48 AM
Audit and compliance, Auditing, Auditing (systems operations), IT audit, IT auditing, Security Audit
asked by:
5 pts.

What Next?
We received a notice from NSA saying the specifics on how to handle our encryption program.   The public version has been limited to use of a public key and the software has a built in data integrity algorithm such that any modification of the key disables the use of the software for encryption. The software uses...

Answer Question   |  April 18, 2013  5:18 PM
Encryption Software, FIPS, regulatory compliance, Secure Coding, Web Access Management
asked by:
15 pts.

PDCA with conflicting laws
Hello, I’m a student at the University of Advancing Technology (UAT) and this week we’ve been learning about the Plan, Do, Check, Act methodology for implementing an information management security system. Our reading explains about PDCA and how an organization should use it to obtain an ISO 27001 certification. In our reading there was a...

Answer Question   |  April 15, 2013  2:34 AM
Laws, Legal, PDCA
asked by:
30 pts.

Governance of IT Assets
I’m looking for example templates that could be used to provide an IT Governance Board with the assurance that it’s IT assets are being managed appropriately and not exposed to any unnecessary risks.

Answer Question   |  February 5, 2013  9:56 PM
Governance Risk and Compliance, IT Governance
asked by:
5 pts.

EU security directive
Where can I find implementation details for complying with EU directive 95/46/ec?

Answer Question   |  December 17, 2012  4:29 PM
EU directive 95/46
asked by:
5 pts.

Regulations that apply to ILECs
I am researching whether my county can create its own ILEC (Independent Local Exchange Carrier). I am clear on the state laws that apply, but am curious as to what federal regulations apply to ILEC and what steps would need to be taken on the federal level. I know the FCC regulates ILECs, but that...

Answer Question   |  December 6, 2012  6:51 PM
ILEC, Regulations
asked by:
5 pts.

EXCED 13
Which brand is EXCEED 13 , Hummingbird or Open Text

Answer Question   |  October 1, 2012  1:40 PM
Compliance mapping
asked by:
15 pts.

Windows Foundation Server 2008 R2 License and Domain issues
We have joined 2 Foundation servers to an existing domain as members in a Forest to a Server 2008 R2 Standard DC as the parent. Regularly on startup we get a message “Check for Licensing Compliance is Incomplete”. I need to know how serious this error is? and are we going to experience problems if...

Answer Question   |  August 6, 2012  8:46 AM
Check for License Compliance, Foundation Server, server 2008 r2
asked by:
10 pts.

Which encryption algorithm is the most recommended by the PCI standard?
Does anyone know if AKA ver 2 protocol is PCI compliance?

Answer Question   |  April 9, 2012  5:08 PM
Encryption, PCI
asked by:
5 pts.

Agile SDLC SOX Controls
We are implementing Agile SDLC in our company. Has anybody identified Agile SDLC controls that are tested as part of their SOX complinance program? Would appreciate any examples of controls that you can offer

Answer Question   |  March 31, 2012  3:13 PM
Agile, Agile SDLC SOX controls, SDLC, SOX
asked by:
5 pts.

virus malware spyware
I want to how to conduct a risk assessment to protect our pcs, networks

Answer Question   |  January 30, 2012  7:24 AM
Information security governance, malware, Risk analysis, Risk assessment, Security threats, Spyware, Viruses
asked by:
5 pts.

checklist for moving datacenter
Hello. Our company have a plan to move datacenter in a month and my boss ordered me to make out the plan for it. But I don’t know how to do it, especially I have no idea about what I should check for moving datacenter. Help me! How can I get the process, checklist…. for...

Answer Question   |  January 9, 2012  10:30 AM
Budgeting, Cabling, DataCenter, Power management, Project management, Remote management, ROI & cost justification, standards, Thermal controls, Updates from SearchDataCenter staff
asked by:
0 pts.

Encryption by Law? If so, what strength or type?
Should encryption be explicitly proscribed in Data Security and Provacy legislation like the Massachusetts Data Prvacy Law and the White House cybersecurity initiative? If so, what strength or method? Should there be a minimum strength? What do you think?

Answer Question   |  November 30, 2011  1:28 AM
cybersecurity, Encryption, Massachusetts Data Privacy Law, privacy, Security, White House Cybersecurity Initiative
asked by:
30 pts.

Browse Alphabetically:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: