{"id":2526,"date":"2017-07-13T15:05:49","date_gmt":"2017-07-13T15:05:49","guid":{"rendered":"https:\/\/tsisupport.com\/?p=2526"},"modified":"2021-07-07T05:06:25","modified_gmt":"2021-07-07T09:06:25","slug":"security-awareness-training-compliance-requirements","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=2526","title":{"rendered":"Data Security Compliance: Security Awareness Training &#038; Compliance Requirements"},"content":{"rendered":"<p>Did you know there are over 8,500 different Local, State, and Federal standards &amp; requirements your organization may be required to comply with? This staggering number can come as a surprise to many. That&#8217;s why we\u2019ve taken the time to compile a list of the most common standards which may require your organization to implement a security awareness program.<!--more--><\/p>\n<p><span style=\"color: #800000;\"><strong><em>Does Your Business Accept Credit Cards?<\/em><\/strong><\/span><\/p>\n<p>If so, you are required by law to comply with PCI security standards.\u00a0<a href=\"https:\/\/www.pcisecuritystandards.org\/document_library\" target=\"_blank\" rel=\"noopener noreferrer\">PCI DSS<\/a> applies to any business that processes credit cards or any other form of electronic payment. Standards include educating employees on the importance of cardholder information security.\u00a0 It also requires employees to acknowledge in writing that they have read and understood the company\u2019s security policy and procedures. Note, you should already have a written security and procedure policy for your organization.\u00a0 You can learn more about security standards <a href=\"https:\/\/www.pcisecuritystandards.org\/document_library\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p><span style=\"color: #800000;\"><strong><em>Is Your Company Public?<\/em><\/strong><\/span><\/p>\n<p>The <a href=\"https:\/\/www.sec.gov\/about\/laws\/soa2002.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Sarbanes-Oxley Act<\/a>, also known as the \u201cPublic Company Accounting Reform &amp; Investor Protection Act\u201d was established to set and expand requirements for all U.S. publicly traded companies.\u00a0 Rules include every annual report to contain an internal control report &#8211; which shall state the responsibility of management for developing and maintaining adequate internal control structure &amp; procedures for financial reporting. Even if you are planning to go public sometime in the future, start working on a security awareness training plan now.<\/p>\n<p><span style=\"color: #800000;\"><strong><em>Are You In The Healthcare Sector?<\/em><\/strong><\/span><\/p>\n<p>For organizations within the healthcare sector, the Health Insurance Portability &amp; Accountability Act or HIPAA as it is more commonly known, is a very important rule that affects the way you store &amp; protect patient information.\u00a0 HIPAA requires the implementation of a security awareness and training program for all your workforce, including consultants.\u00a0 Learn more <a href=\"https:\/\/www.hhs.gov\/hipaa\/for-professionals\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p><span style=\"color: #800000;\"><strong>Other Noteworthy Governance\u2026<\/strong><\/span><\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/ISO\/IEC_27002\" target=\"_blank\" rel=\"noopener noreferrer\">ISO\/IEC 27001 &amp; 27002<\/a> \u2013 Requires that all employees of an organization, as well as contractors or third party users, should receive awareness training &amp; regular updates in organizational policies, as relevant to their job function.<\/p>\n<p><a href=\"https:\/\/www.ftc.gov\/tips-advice\/business-center\/guidance\/fighting-identity-theft-red-flags-rule-how-guide-business\" target=\"_blank\" rel=\"noopener noreferrer\">FACTA \u2013 FTC Red Flags Rule<\/a> \u2013 Under FACTA, which is an amendment to the Fair Credit Reporting Acts, the FTC created the Red Flags Rule. The ruling requires training as part of an Identity Theft Prevention Program.\u00a0 16 CFR 681.1:\u00a0 <em>Employees should be trained about the various red flags to look out for, and\/or any other relevant aspect of the organization\u2019s Identity Theft Prevention Program.<\/em><\/p>\n<p><a href=\"https:\/\/www.ftc.gov\/tips-advice\/business-center\/privacy-and-security\/gramm-leach-bliley-act\" target=\"_blank\" rel=\"noopener noreferrer\">Gramm-Leach Bliley Act<\/a> \u2013 6801.(b).(1)-(3) <em>In furtherance of the policy in subsection (a) of this section, each agency or authority described in section 6805(a) if this title shall establish appropriate standards for the financial institutions subject to their jurisdiction relating to administrative, technical &amp; physical safeguards:<\/em><\/p>\n<ul class=\"ULStyle\">\n<li><em>To insure the security and confidentiality of consumer records &amp; information<\/em><\/li>\n<li><em>To protect against any anticipated threats or hazards to the security or integrity of such records<\/em><\/li>\n<li><em>To protect against unauthorized access to or use of such records or information which could result in substantial harm or inconvenience to any customer<\/em><\/li>\n<\/ul>\n<p><a href=\"http:\/\/www.isaca.org\/Knowledge-Center\/COBIT\/Pages\/Overview.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">CobiT<\/a> \u2013 PO7.4 Provide IT employees with appropriate orientation when hired and ongoing training to maintain their knowledge, skills, abilities, internal controls, and security awareness as the level required to achieve organizational goals. Section DS7 Management of the process to educate and train users that satisfies the business requirement for IT of effectively and efficiently using application and technology solutions and ensuring user compliance with policies and procedures is defined when a training and education program is instituted and communicated, and employees and managers identify and document training needs.\u00a0Training and education processes are standardized and documented.\u00a0 Budgets, resources, facilities, and trainers are being established to support the training and education program.\u00a0 Formal classes are given to employees on ethical conduct and system awareness and practices.\u00a0 Most training and education processes are monitored, but not all deviations are likely to be detected by management.\u00a0 Analysis of training and education problems is only occasionally applied.<\/p>\n<p><a href=\"http:\/\/csrc.nist.gov\/drivers\/documents\/FISMA-final.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Federal Information Security Management Act (FISMA)<\/a> \u2013 3544.(b).(4).(A).(B) Securing awareness training is required to inform personnel, including contractors and other users of information systems on how to support the operations and assets of the agency, of information security risks associated with their activities; and their responsibilities in complying with agency policies and procedures designed to reduce these risks.<\/p>\n<p><span style=\"color: #800000;\"><strong>US State Specific Privacy Laws<\/strong><\/span><\/p>\n<p>Many states in the U.S. have their own privacy laws.\u00a0 For example, one of the most robust privacy laws is here in the state of Massachusetts. <a href=\"http:\/\/www.mass.gov\/ocabr\/docs\/idtheft\/201cmr1700reg.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">201 CMR 17.03<\/a> \u2013 the Massachusetts privacy law mandates training to maintain a comprehensive information security program.\u00a0 The training must focus on reasonably foreseeable internal and external risks to the security, confidentiality, and\/or integrity of any electronic, paper, or other records containing personal information.\u00a0 Training must be ongoing and must be given for not only permanent employees but also temporary or contract employees.<\/p>\n<p>Want to better understand how an effective security awareness program can prevent incurring regulatory fines as well as help to protect your organization from new security threats? <a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\">Contact Us<\/a> today!<\/p>\n<div class=\"fl-builder-content fl-builder-content-8352 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8352\"><div class=\"fl-row fl-row-full-width fl-row-bg-photo fl-node-5ecccdbce25c0 fl-row-default-height fl-row-align-center fl-row-bg-overlay BlogCTA\" data-node=\"5ecccdbce25c0\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecccdbce2d8e fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecccdbce2d8e\">\n\t\t\t<div class=\"fl-col fl-node-5ecccdbce2f49 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecccdbce2f49\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5eccce25ec3d2 sec-title title-img-none\" data-node=\"5eccce25ec3d2\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Confident with Your IT Strategy?<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5eccce77546d9\" data-node=\"5eccce77546d9\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you found the information in this blog post helpful and you'd like to discuss your business' technology strategy, then we'd be happy to hear from you.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecccec3237e8 primary-btn\" data-node=\"5ecccec3237e8\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecccf1e8a49c fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecccf1e8a49c\">\n\t<div class=\"fl-col-content fl-node-content\"><\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Did you know there are over 8,500 different Local, State, and Federal standards &amp; requirements your organization may be required to comply with? This staggering number can come as a surprise to many. That&#8217;s why we\u2019ve taken the time to compile a list of the most common standards which may require your organization to implement&hellip;<\/p>\n","protected":false},"author":2,"featured_media":8576,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[7],"tags":[239,319,173,343,344,345,346,338],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Compliance | Security Awareness Training and Compliance | TSI<\/title>\n<meta name=\"description\" content=\"Learn about some of the most common data security compliance standards so you and your business can keep track of important regulations.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Compliance | Security Awareness Training and Compliance | TSI\" \/>\n<meta property=\"og:description\" content=\"Learn about some of the most common data security compliance standards so you and your business can keep track of important regulations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=2526\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-13T15:05:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T09:06:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Security-Compliance-Header-Site.fw_-1140x380-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roger Murray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Murray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2526\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2526\",\"name\":\"Data Compliance | Security Awareness Training and Compliance | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2526#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2526#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Security-Compliance-Header-Site.fw_-1140x380-1.png\",\"datePublished\":\"2017-07-13T15:05:49+00:00\",\"dateModified\":\"2021-07-07T09:06:25+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\"},\"description\":\"Learn about some of the most common data security compliance standards so you and your business can keep track of important regulations.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2526#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=2526\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2526#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Security-Compliance-Header-Site.fw_-1140x380-1.png\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Security-Compliance-Header-Site.fw_-1140x380-1.png\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=2526#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Security Compliance: Security Awareness Training &#038; Compliance Requirements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9\",\"name\":\"Roger Murray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g\",\"caption\":\"Roger Murray\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Compliance | Security Awareness Training and Compliance | TSI","description":"Learn about some of the most common data security compliance standards so you and your business can keep track of important regulations.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Data Compliance | Security Awareness Training and Compliance | TSI","og_description":"Learn about some of the most common data security compliance standards so you and your business can keep track of important regulations.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=2526","og_site_name":"TSI Support","article_published_time":"2017-07-13T15:05:49+00:00","article_modified_time":"2021-07-07T09:06:25+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Security-Compliance-Header-Site.fw_-1140x380-1.png","type":"image\/png"}],"author":"Roger Murray","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Murray","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2526","url":"https:\/\/tsisupport.com\/tsistaging\/?p=2526","name":"Data Compliance | Security Awareness Training and Compliance | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2526#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2526#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Security-Compliance-Header-Site.fw_-1140x380-1.png","datePublished":"2017-07-13T15:05:49+00:00","dateModified":"2021-07-07T09:06:25+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9"},"description":"Learn about some of the most common data security compliance standards so you and your business can keep track of important regulations.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2526#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=2526"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2526#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Security-Compliance-Header-Site.fw_-1140x380-1.png","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2017\/07\/Security-Compliance-Header-Site.fw_-1140x380-1.png","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=2526#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Data Security Compliance: Security Awareness Training &#038; Compliance Requirements"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/5eed34ada00b62f24100bd841a4f62e9","name":"Roger Murray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/02eb44ce8ff599f733f8d322316f904d?s=96&d=mm&r=g","caption":"Roger Murray"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=2"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2526"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2526"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/2526\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8576"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}