Microsoft Authority Document template Library

Microsoft.AuthorityDocument.Library :: 7.5.1500.4 (Management Pack)

Management Pack Elements

Enumerations (1)

 IDParentAccessibility
AuthorityDocumentTemplateLibraryAuthorityDocumentTemplateLibraryMicrosoft.EnterpriseManagement.ServiceManager.ManagementPack.SolutionPublic

Categories (1)

 IDTarget
AuthorityDocumentTemplateLibraryIDAuthorityDocumentTemplateLibraryID

Object Templates (383)

 DisplayNameIDType
ID_00ede05b_f9d9_4f2d_8038_5905b4280443National Incident Management System (NIMS), Department of Homeland Security, December 2008ID_00ede05b_f9d9_4f2d_8038_5905b4280443System.Compliance.AuthorityDocumentProjection
ID_01b0b3df_f7cc_481e_92e5_385efb9fbbc7Korea Act on the Protection of Personal Information Maintained by Public Agencies 1994ID_01b0b3df_f7cc_481e_92e5_385efb9fbbc7System.Compliance.AuthorityDocumentProjection
ID_02c9fb94_ba1b_4900_98a1_9f999bd38af1BIS Sound Practices for the Management and Supervision of Operational RiskID_02c9fb94_ba1b_4900_98a1_9f999bd38af1System.Compliance.AuthorityDocumentProjection
ID_031b35ad_9e46_4d68_962c_3d1f05d6c804Utah Protection of Personal Information Act, Utah Code § Title 13-44. Protection of Personal Information ActID_031b35ad_9e46_4d68_962c_3d1f05d6c804System.Compliance.AuthorityDocumentProjection
ID_0345f34a_aa1c_4914_919c_a9f423250859Federal Information Security Management ActID_0345f34a_aa1c_4914_919c_a9f423250859System.Compliance.AuthorityDocumentProjection
ID_03f2bdbe_d7fa_4c20_a22a_13aa2a90736bISO/IEC 20000-1 Information technology - Service Management Part 1ID_03f2bdbe_d7fa_4c20_a22a_13aa2a90736bSystem.Compliance.AuthorityDocumentProjection
ID_04005d6e_dbba_40ed_8bf0_8172390fc462Code of Alabama, Article 10 The Consumer Identity Protection Act, § 13A-8-190 thru § 13A-8-201ID_04005d6e_dbba_40ed_8bf0_8172390fc462System.Compliance.AuthorityDocumentProjection
ID_048247f6_c742_4e1d_b45d_8709bbe073c042 CFR Parts 412, 413, 422 et al., Medicare and Medicaid Programs; Electronic Health Record Incentive ProgramID_048247f6_c742_4e1d_b45d_8709bbe073c0System.Compliance.AuthorityDocumentProjection
ID_049ebce4_c204_4b6c_b450_21d777f325bfHouse Legislative Counsel's Manual on Drafting StyleID_049ebce4_c204_4b6c_b450_21d777f325bfSystem.Compliance.AuthorityDocumentProjection
ID_056c1c52_4e2e_4ab9_97e4_8f55270094b7IIA Global Technology Audit Guide (GTAG) 9: Identity and Access ManagementID_056c1c52_4e2e_4ab9_97e4_8f55270094b7System.Compliance.AuthorityDocumentProjection
ID_05f66dc9_a2f3_49ff_a6cd_24e59f231247PCI DSS (Payment Card Industry Data Security Standard)ID_05f66dc9_a2f3_49ff_a6cd_24e59f231247System.Compliance.AuthorityDocumentProjection
ID_07723250_61aa_4eb8_9953_6e395fcd0889Greece Law Protection of personal data and privacy in electronic telecommunications sector (Law 3471)ID_07723250_61aa_4eb8_9953_6e395fcd0889System.Compliance.AuthorityDocumentProjection
ID_08ac9938_6259_4290_a10a_106e41007f7dAICPA Suitable Trust Services Principles and CriteriaID_08ac9938_6259_4290_a10a_106e41007f7dSystem.Compliance.AuthorityDocumentProjection
ID_08edb7b8_abe4_439b_82bd_f6d473b3b432Italy Personal Data Protection CodeID_08edb7b8_abe4_439b_82bd_f6d473b3b432System.Compliance.AuthorityDocumentProjection
ID_092f7467_2a1e_4158_a777_13451dc1fe7fNew Zealand Privacy Act 1993ID_092f7467_2a1e_4158_a777_13451dc1fe7fSystem.Compliance.AuthorityDocumentProjection
ID_09ed39b2_52d7_427b_a8c9_ec830259c92aMulti-Function Device (MFD) and Printer Checklist for Sharing Peripherals Across the Network Security Technical Implementation GuideID_09ed39b2_52d7_427b_a8c9_ec830259c92aSystem.Compliance.AuthorityDocumentProjection
ID_0af25a96_d712_4054_bb0b_1d014e7ded9dResponsible Care Security Code of Management Practices, American Chemistry CouncilID_0af25a96_d712_4054_bb0b_1d014e7ded9dSystem.Compliance.AuthorityDocumentProjection
ID_0c58cfe2_4e9f_43cf_8f03_fe4778ddda45US Export Administration Regulations DatabaseID_0c58cfe2_4e9f_43cf_8f03_fe4778ddda45System.Compliance.AuthorityDocumentProjection
ID_0e05fb33_2079_4d6d_8111_db30387fc53bIowa Code Annotated § 614.4aID_0e05fb33_2079_4d6d_8111_db30387fc53bSystem.Compliance.AuthorityDocumentProjection
ID_0e7e279c_0e54_40d8_8e1e_38b29d3671d5Maine Legislative Drafting ManualID_0e7e279c_0e54_40d8_8e1e_38b29d3671d5System.Compliance.AuthorityDocumentProjection
ID_0f2e36a8_b6c8_4536_ad8c_5ddad9db62a3IIA Global Technology Audit Guide (GTAG) 2:Change and Patch Management Controls: Critical for Organizational SuccessID_0f2e36a8_b6c8_4536_ad8c_5ddad9db62a3System.Compliance.AuthorityDocumentProjection
ID_0f7b2a07_b78b_4ae4_a23a_1811ca1cacdaHungary Protection of Personal Data and Disclosure of Data of Public InterestID_0f7b2a07_b78b_4ae4_a23a_1811ca1cacdaSystem.Compliance.AuthorityDocumentProjection
ID_10073211_9f40_400f_bc0b_6b8ffd414360Equal Credit Opportunity Act (Reg. B)ID_10073211_9f40_400f_bc0b_6b8ffd414360System.Compliance.AuthorityDocumentProjection
ID_1068f70b_5ce5_43f8_a160_1f3a44ac5eabMinnesota Statute § 13.055 State Agencies; Disclosure of Breach in SecurityID_1068f70b_5ce5_43f8_a160_1f3a44ac5eabSystem.Compliance.AuthorityDocumentProjection
ID_109ccd97_a1d8_48e7_b06f_bb5941660a41PCAOB Auditing Standard No. 5ID_109ccd97_a1d8_48e7_b06f_bb5941660a41System.Compliance.AuthorityDocumentProjection
ID_121a01b1_41dd_4a63_ad5b_b5922c445613The Cloud Security Alliance Controls MatrixID_121a01b1_41dd_4a63_ad5b_b5922c445613System.Compliance.AuthorityDocumentProjection
ID_12bac0e4_c0f3_40ac_90f1_2575683a1cd5California OPP Recommended Practices on Notification of Security BreachID_12bac0e4_c0f3_40ac_90f1_2575683a1cd5System.Compliance.AuthorityDocumentProjection
ID_13afe3a6_26da_4841_b95c_a1074956ccbaUS Department of Energy Cyber Security Program Media Clearing, Purging, and Destruction Guidance: DOE CIO Guidance CS-11ID_13afe3a6_26da_4841_b95c_a1074956ccbaSystem.Compliance.AuthorityDocumentProjection
ID_140b89bb_817b_4830_a495_fd2ae44fe852Computer Fraud and Abuse ActID_140b89bb_817b_4830_a495_fd2ae44fe852System.Compliance.AuthorityDocumentProjection
ID_15fe1bb8_fbbc_4156_9bcd_6cf3239c166fOGC ITIL: Security ManagementID_15fe1bb8_fbbc_4156_9bcd_6cf3239c166fSystem.Compliance.AuthorityDocumentProjection
ID_16dbf912_80df_40f1_9b43_898bb54e0011Payment Card Industry (PCI) Payment Application Data Security StandardID_16dbf912_80df_40f1_9b43_898bb54e0011System.Compliance.AuthorityDocumentProjection
ID_17296f07_43df_42f5_bdf5_34c69e5bd82eTurnbull Guidance on Internal Control, UK FRCID_17296f07_43df_42f5_bdf5_34c69e5bd82eSystem.Compliance.AuthorityDocumentProjection
ID_1986cec2_7685_4bb5_80e8_b8133226a7fdFFIEC IT Examination Handbook – Business Continuity PlanningID_1986cec2_7685_4bb5_80e8_b8133226a7fdSystem.Compliance.AuthorityDocumentProjection
ID_19b209b8_8dfe_4fd9_a1ed_4d8d9649b0bbCalifornia Civil Code Title 1.81 Customer Records §§ 1798.80-1798.84ID_19b209b8_8dfe_4fd9_a1ed_4d8d9649b0bbSystem.Compliance.AuthorityDocumentProjection
ID_19e0d84a_c8d6_4876_994e_dfedcbc59daf42 CFR Part 3, Patient Safety and Quality ImprovementsID_19e0d84a_c8d6_4876_994e_dfedcbc59dafSystem.Compliance.AuthorityDocumentProjection
ID_1a626c6b_b9d2_475e_a041_51e94e54a92fVISA CISP: What to Do If Compromised Visa Fraud Control and Investigation ProceduresID_1a626c6b_b9d2_475e_a041_51e94e54a92fSystem.Compliance.AuthorityDocumentProjection
ID_1b3ab077_b6c5_4919_9a99_7d558fa0f92aAustralia Spam ActID_1b3ab077_b6c5_4919_9a99_7d558fa0f92aSystem.Compliance.AuthorityDocumentProjection
ID_1b5138c8_18f2_4d4a_88d1_e9b13bc4a9b4Korea Act Relating to Use and Protection of Credit InformationID_1b5138c8_18f2_4d4a_88d1_e9b13bc4a9b4System.Compliance.AuthorityDocumentProjection
ID_1c5f208e_d668_423c_a67c_58709a4c1981Argentina Personal Data Protection ActID_1c5f208e_d668_423c_a67c_58709a4c1981System.Compliance.AuthorityDocumentProjection
ID_1c8f05f4_9599_4468_af5a_48de59e6ac8a17 CFR Part 240.17a-1, Recordkeeping rule for securities exchangesID_1c8f05f4_9599_4468_af5a_48de59e6ac8aSystem.Compliance.AuthorityDocumentProjection
ID_1d1d0d82_81db_41d3_9aa4_3c7fdbd14be3Guide to Protecting the Confidentiality of Personally Identifiable Information (PII), NIST SP 800-122ID_1d1d0d82_81db_41d3_9aa4_3c7fdbd14be3System.Compliance.AuthorityDocumentProjection
ID_1f08c2ed_169a_49b0_b481_efce064e91ceAustralian Government ICT Security Manual (ACSI 33)ID_1f08c2ed_169a_49b0_b481_efce064e91ceSystem.Compliance.AuthorityDocumentProjection
ID_1fb4f73c_6526_42f1_888c_4cd04b4a5f0fGuide to Computer Security Log Management, NIST SP 800-92ID_1fb4f73c_6526_42f1_888c_4cd04b4a5f0fSystem.Compliance.AuthorityDocumentProjection
ID_23a38da7_dffa_4f9a_b9bd_38960befb3f0AICPA Incident Response Plan: Template for Breach of Personal InformationID_23a38da7_dffa_4f9a_b9bd_38960befb3f0System.Compliance.AuthorityDocumentProjection
ID_23bf4549_1460_45b7_ab3c_d7f88d5c6243Corporate Law Economic Reform Program (Audit Reform and Corporate Disclosure) Act 2004ID_23bf4549_1460_45b7_ab3c_d7f88d5c6243System.Compliance.AuthorityDocumentProjection
ID_23e039a6_36cd_4d35_933f_c916742c3e48Corporate Information Security Working Group: Report of the best practices and metrics teams; subcommittee on technology, information policy, intergovernmental relations and the census; Government Reform Committee, United States House of RepresentativesID_23e039a6_36cd_4d35_933f_c916742c3e48System.Compliance.AuthorityDocumentProjection
ID_2401b40c_160a_44b4_8b6c_f0a8e86b82a3Virginia Identity theft; penalty; restitution; victim assistance, VA HB 872ID_2401b40c_160a_44b4_8b6c_f0a8e86b82a3System.Compliance.AuthorityDocumentProjection
ID_24617dc7_5ac5_4717_80fc_b3d52a7bce0dNISPOM - National Industrial Security Program Operating Manual (DoD 5220.22-M) February 26, 2006ID_24617dc7_5ac5_4717_80fc_b3d52a7bce0dSystem.Compliance.AuthorityDocumentProjection
ID_24b1ff92_8467_461e_9191_e07b03dbe9d1Contingency Planning Guide for Information Technology Systems, NIST SP 800-34ID_24b1ff92_8467_461e_9191_e07b03dbe9d1System.Compliance.AuthorityDocumentProjection
ID_2502dd4e_34bb_457a_a6ee_d0bc20302d28ISO 15489-1:2001, Information and Documentation: Records management: Part 1: GeneralID_2502dd4e_34bb_457a_a6ee_d0bc20302d28System.Compliance.AuthorityDocumentProjection
ID_25213e89_67a5_413b_a8e1_4bca2eccedf2Finland Act on the Protection of Privacy in Electronic CommunicationsID_25213e89_67a5_413b_a8e1_4bca2eccedf2System.Compliance.AuthorityDocumentProjection
ID_254b2a27_fa9d_4456_b8f2_1e1be151ba56Texas Identity Theft Enforcement and Protection Act, TX SB 122ID_254b2a27_fa9d_4456_b8f2_1e1be151ba56System.Compliance.AuthorityDocumentProjection
ID_256fd10a_d718_471e_92e4_56d10300e53cGeorgia Public employees; Fraud, Waste, and Abuse, GA HB 656ID_256fd10a_d718_471e_92e4_56d10300e53cSystem.Compliance.AuthorityDocumentProjection
ID_26683a6a_fcde_48c4_aad1_31c295551baeIllinois Compiled Statutes, Chapter 815, ILCS 530/Personal Information Protection Act.ID_26683a6a_fcde_48c4_aad1_31c295551baeSystem.Compliance.AuthorityDocumentProjection
ID_266846cf_2dec_4a73_bdba_4d5f7f9fd4beNetherlands Personal Data Protection Act, Session 1999-2000 Nr.92ID_266846cf_2dec_4a73_bdba_4d5f7f9fd4beSystem.Compliance.AuthorityDocumentProjection
ID_2752dce2_7b0b_4371_ad0d_260839fc117cColorado Prohibiting Inclusion of Social Security Number, CO HB 04-1311ID_2752dce2_7b0b_4371_ad0d_260839fc117cSystem.Compliance.AuthorityDocumentProjection
ID_284634d2_02bc_4116_9928_ad0e1f61b0eeBS 25999-2, Business continuity management. SpecificationID_284634d2_02bc_4116_9928_ad0e1f61b0eeSystem.Compliance.AuthorityDocumentProjection
ID_29712f98_2ee7_41fa_a4b9_9790bc1946eaISO/IEC 13335-3 Information technology — Guidelines for the management of IT Security — Part 3: Techniques for the management of IT SecurityID_29712f98_2ee7_41fa_a4b9_9790bc1946eaSystem.Compliance.AuthorityDocumentProjection
ID_2b8cc4d5_6284_438e_afb0_ee7d3431a134The Sarbanes-Oxley Act of 2002 (SOX)ID_2b8cc4d5_6284_438e_afb0_ee7d3431a134System.Compliance.AuthorityDocumentProjection
ID_2b936e31_0e25_481a_87a6_9ace272cf742California Civil Code Title 1.8 Personal Data Chapter 1 Information Practices Act of 1977 Article 7. Accounting of Disclosures §§ 1798.25-1798.29ID_2b936e31_0e25_481a_87a6_9ace272cf742System.Compliance.AuthorityDocumentProjection
ID_2ba83765_374b_4c76_8a59_61870ad14629Washington DC Consumer Personal Information Security Breach Notification Act of 2006ID_2ba83765_374b_4c76_8a59_61870ad14629System.Compliance.AuthorityDocumentProjection
ID_2cc3707a_586e_47bd_821d_8135fb8ee8a7FFIEC IT Examination Handbook – Outsourcing Technology ServicesID_2cc3707a_586e_47bd_821d_8135fb8ee8a7System.Compliance.AuthorityDocumentProjection
ID_2ce445b5_81f7_4b99_9c57_ed159a2eaac2ISO/IEC 15408-3 Common Criteria for Information Technology Security Evaluation Part 3ID_2ce445b5_81f7_4b99_9c57_ed159a2eaac2System.Compliance.AuthorityDocumentProjection
ID_2dcb089d_66f2_4333_ae9d_b8c9229f768dRevised Code of Washington Title 19 Chapter 19.215 Disposal of personal information § 19.215.005 thru § 19.215.030ID_2dcb089d_66f2_4333_ae9d_b8c9229f768dSystem.Compliance.AuthorityDocumentProjection
ID_2e7db6ae_ec84_45fe_b9df_a799e47c06edLouisiana Revised Statutes Title 51 §§ 3073-3074 Database Security Breach Notification LawID_2e7db6ae_ec84_45fe_b9df_a799e47c06edSystem.Compliance.AuthorityDocumentProjection
ID_2ee26367_80dc_41ae_b6e6_3a63872f1f2aThe GAIT MethodologyID_2ee26367_80dc_41ae_b6e6_3a63872f1f2aSystem.Compliance.AuthorityDocumentProjection
ID_30ac5818_3756_4e75_aff2_9fe594c970dfMicrosoft Windows Vista Security Guide Appendix A: Security Group Policy SettingsID_30ac5818_3756_4e75_aff2_9fe594c970dfSystem.Compliance.AuthorityDocumentProjection
ID_3146f6a4_1d30_4b67_9eab_32897b5b1d72ISO 15489-2: 2001, Information and Documentation: Records management: Part 2: GuidelinesID_3146f6a4_1d30_4b67_9eab_32897b5b1d72System.Compliance.AuthorityDocumentProjection
ID_314f0437_0bcc_4347_a57a_a7de7057811dPerformance Measurement Guide for Information Security, NIST 800-55ID_314f0437_0bcc_4347_a57a_a7de7057811dSystem.Compliance.AuthorityDocumentProjection
ID_31c241de_bc16_465e_9068_c952d6090c5eSlovak Republic Protection of Personal Data in Information SystemsID_31c241de_bc16_465e_9068_c952d6090c5eSystem.Compliance.AuthorityDocumentProjection
ID_3273c4a7_c68d_42bd_aa20_cda5fbc79a4aDirective 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sectorID_3273c4a7_c68d_42bd_aa20_cda5fbc79a4aSystem.Compliance.AuthorityDocumentProjection
ID_3281a2f7_8337_4881_805c_5778edec5bcdPCAOB Auditing Standard No. 3ID_3281a2f7_8337_4881_805c_5778edec5bcdSystem.Compliance.AuthorityDocumentProjection
ID_33093022_bf9a_43f8_bd75_470321945e59EU 8th Directive (European SOX)ID_33093022_bf9a_43f8_bd75_470321945e59System.Compliance.AuthorityDocumentProjection
ID_33e53324_ff00_44eb_b0d6_a47e05539a3fThe Standard of Good Practice for Information SecurityID_33e53324_ff00_44eb_b0d6_a47e05539a3fSystem.Compliance.AuthorityDocumentProjection
ID_3428cb75_c8b1_4b22_8c5b_9f2c82695bc0Federal Rules of Civil Procedure (2007)ID_3428cb75_c8b1_4b22_8c5b_9f2c82695bc0System.Compliance.AuthorityDocumentProjection
ID_3429a274_b707_403f_a3c6_49f0aa8c5b08Guidelines for Media Sanitization, NIST SP 800-88ID_3429a274_b707_403f_a3c6_49f0aa8c5b08System.Compliance.AuthorityDocumentProjection
ID_3430fd90_6250_4825_8e53_628bd86a0ebe45 CFR Parts 160 and 164, Breach Notification for Unsecured Protected Health InformationID_3430fd90_6250_4825_8e53_628bd86a0ebeSystem.Compliance.AuthorityDocumentProjection
ID_343bc0c8_b4e7_4272_8e0b_9933728edbafIRS Revenue Procedure: Retention of books and records, 97-22ID_343bc0c8_b4e7_4272_8e0b_9933728edbafSystem.Compliance.AuthorityDocumentProjection
ID_347c5046_be7f_4f85_9e32_33c8130b9a73IIA Global Technology Audit Guide (GTAG) 5: Managing and Auditing Privacy RisksID_347c5046_be7f_4f85_9e32_33c8130b9a73System.Compliance.AuthorityDocumentProjection
ID_34a8306c_8bc3_46e4_a58f_f0c78eaf334aPCI Security Standards CouncilID_34a8306c_8bc3_46e4_a58f_f0c78eaf334aSystem.Compliance.AuthorityDocumentProjection
ID_34df3f00_de9e_4131_b7b2_3c20a1e741ea36 CFR Part 1194 Electronic and Information Technology Accessibility StandardsID_34df3f00_de9e_4131_b7b2_3c20a1e741eaSystem.Compliance.AuthorityDocumentProjection
ID_35afddfd_2329_4e52_b832_ab71d55b0a4f16 CFR Part 310, Amendments to the FTC Telemarketing Sales RuleID_35afddfd_2329_4e52_b832_ab71d55b0a4fSystem.Compliance.AuthorityDocumentProjection
ID_360515cd_b456_4700_8c1a_b55ab19694a1C-TPAT Supply Chain Security Best Practices CatalogID_360515cd_b456_4700_8c1a_b55ab19694a1System.Compliance.AuthorityDocumentProjection
ID_373f78c0_1ec6_44a6_964b_37371cf00c0eThe DIRKS Manual: A Strategic Approach to Managing Business InformationID_373f78c0_1ec6_44a6_964b_37371cf00c0eSystem.Compliance.AuthorityDocumentProjection
ID_375b3d3a_ea0a_4cfa_a0a7_437df6d728f1ISO/IEC 27002 Code of practice for information security managementID_375b3d3a_ea0a_4cfa_a0a7_437df6d728f1System.Compliance.AuthorityDocumentProjection
ID_379cd4ab_63e7_4039_ab12_53377196ee6aThe Sedona Principles Addressing Electronic Document ProductionID_379cd4ab_63e7_4039_ab12_53377196ee6aSystem.Compliance.AuthorityDocumentProjection
ID_37c82344_f1db_4f7b_a176_b6523f1abcd8Ohio Revised Code Title XIII Chapter 1349 § 1349.19 Private disclosure of security breach of computerized personal information dataID_37c82344_f1db_4f7b_a176_b6523f1abcd8System.Compliance.AuthorityDocumentProjection
ID_3869d367_9679_49eb_a665_9d2da7179761Wyoming Statute Title 40 Article 5 Breach of the security of the data system § 40-12-501 thru § 40-12-509ID_3869d367_9679_49eb_a665_9d2da7179761System.Compliance.AuthorityDocumentProjection
ID_3925ed35_bc27_4a8f_9ae4_4f1520712618Colorado Disposal of Personal Identifying Documents C.R.S. 6-1-713ID_3925ed35_bc27_4a8f_9ae4_4f1520712618System.Compliance.AuthorityDocumentProjection
ID_3a0696c5_cd56_47e1_8580_6f20a90960d9UN Guidelines for the Regulation of Computerized Personal Data Files (1990)ID_3a0696c5_cd56_47e1_8580_6f20a90960d9System.Compliance.AuthorityDocumentProjection
ID_3be8f6fc_e09a_46f3_b54d_e155f2983cc9Delaware Code TITLE 6 Commerce and Trade, Subtitle II Other Laws Relating to Commerce and Trade ,Chapter 12B. Computer Security Breaches, §§ 12B-101 thru 104ID_3be8f6fc_e09a_46f3_b54d_e155f2983cc9System.Compliance.AuthorityDocumentProjection
ID_3c0849f0_94a9_4c30_b32a_b77a9d0e91e8GAO/PCIE Financial Audit Manual (FAM)ID_3c0849f0_94a9_4c30_b32a_b77a9d0e91e8System.Compliance.AuthorityDocumentProjection
ID_3c093c4b_c123_4c20_9922_af2eade747ceSouth Carolina Code of Laws § 1-11-490 Breach of security of state agency data notificationID_3c093c4b_c123_4c20_9922_af2eade747ceSystem.Compliance.AuthorityDocumentProjection
ID_3cf00872_cf29_4a5e_957a_c5876d224d7fForm I-129, Petition for a Nonimmigrant WorkerID_3cf00872_cf29_4a5e_957a_c5876d224d7fSystem.Compliance.AuthorityDocumentProjection
ID_3e10a7ce_222b_4dd1_83b1_623ce2b4ff0dGeneral Laws of Massachusetts, Part I, Title XV Chapter 93H, Security BreachesID_3e10a7ce_222b_4dd1_83b1_623ce2b4ff0dSystem.Compliance.AuthorityDocumentProjection
ID_3efd6a14_d254_465b_9d25_e412b91cadf2ISO/IEC 27001 Information Security Management Systems - RequirementsID_3efd6a14_d254_465b_9d25_e412b91cadf2System.Compliance.AuthorityDocumentProjection
ID_3f5ac13c_f511_4413_a86a_4e378115e244CISWG Information Security Program ElementsID_3f5ac13c_f511_4413_a86a_4e378115e244System.Compliance.AuthorityDocumentProjection
ID_3f6da061_1f2e_4750_a6be_210461fcab1512 CFR Part 205, Electronic Fund Transfers (Regulation E)ID_3f6da061_1f2e_4750_a6be_210461fcab15System.Compliance.AuthorityDocumentProjection
ID_3f6f449b_276b_427a_be89_82904cda39e1Guidance for Protecting Building Environments from Airborne Chemical, Biological, or Radiological Attacks, NIOSH, May 2002, DHHS (NIOSH) Publication No. 2002-139ID_3f6f449b_276b_427a_be89_82904cda39e1System.Compliance.AuthorityDocumentProjection
ID_3f76b7b7_8747_4e88_85ae_c00fb14b3dd0ISO/IEC 13335-5 Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network securityID_3f76b7b7_8747_4e88_85ae_c00fb14b3dd0System.Compliance.AuthorityDocumentProjection
ID_3fe22991_0d80_4025_a478_a6bbba9c918eNSA Guide to Securing Microsoft Windows 2000 Group PolicyID_3fe22991_0d80_4025_a478_a6bbba9c918eSystem.Compliance.AuthorityDocumentProjection
ID_3feb11a9_687f_411f_a348_de5cc50b21b4Puerto Rico Code Title 10 Subtitle 3 Chapter Citizen Information on Data Banks Security Act, 10 L.P.R.A. § 4051ID_3feb11a9_687f_411f_a348_de5cc50b21b4System.Compliance.AuthorityDocumentProjection
ID_406881e7_a4d2_428e_9164_b656e9d8d1d3Colorado Consumer Credit Solicitation Protection, CO HB 04-1274ID_406881e7_a4d2_428e_9164_b656e9d8d1d3System.Compliance.AuthorityDocumentProjection
ID_407dc32f_e77f_40d1_9222_ea8a795a50dbSecurities Act of 1933ID_407dc32f_e77f_40d1_9222_ea8a795a50dbSystem.Compliance.AuthorityDocumentProjection
ID_407f93f1_349f_469e_9067_52e4e41f0dc7Nebraska Revised Statutes § 87-801 thru § 87-807, Data Protection and Consumer Notification of Data Security Breach Act of 2006ID_407f93f1_349f_469e_9067_52e4e41f0dc7System.Compliance.AuthorityDocumentProjection
ID_41286078_d69e_490e_92f5_2287a9f980feWisconsin Statute Chapter 134 Notice of unauthorized acquisition of personal information § 134.98ID_41286078_d69e_490e_92f5_2287a9f980feSystem.Compliance.AuthorityDocumentProjection
ID_412bbfb7_be1b_4600_af21_ec1c6efcce21Montana Code § 45-6-332. Theft of identityID_412bbfb7_be1b_4600_af21_ec1c6efcce21System.Compliance.AuthorityDocumentProjection
ID_423b0330_1ed1_43f3_ab59_98eb786c85dbPatient Protection and Affordable Care Act, Public Law 111-148, 111th CongressID_423b0330_1ed1_43f3_ab59_98eb786c85dbSystem.Compliance.AuthorityDocumentProjection
ID_42b2a765_f685_411d_b940_2e703bad88d4ISO/IEC 17799 Code of Practice for Information Security ManagementID_42b2a765_f685_411d_b940_2e703bad88d4System.Compliance.AuthorityDocumentProjection
ID_42ef4293_f14d_4e2c_88dc_e76f62c111f8Ireland Consolidated Data Protection Acts of 1988 and 2003ID_42ef4293_f14d_4e2c_88dc_e76f62c111f8System.Compliance.AuthorityDocumentProjection
ID_42ef7936_4261_4816_99d6_e801a887fbc7Sweden Personal Data Act (1998:204)ID_42ef7936_4261_4816_99d6_e801a887fbc7System.Compliance.AuthorityDocumentProjection
ID_44945ac3_f615_4bac_b81f_1239c1c80a14HIPAA HCFA Internet Security PolicyID_44945ac3_f615_4bac_b81f_1239c1c80a14System.Compliance.AuthorityDocumentProjection
ID_46746cf9_f1c3_4147_8022_b9f5dbe77fa7Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance No Electronic Storage, Processing, or Transmission of Cardholder DataID_46746cf9_f1c3_4147_8022_b9f5dbe77fa7System.Compliance.AuthorityDocumentProjection
ID_475f992f_8645_4a12_b400_23fe19888cbdIdaho Code Title 28 Commercial Transactions, Chapter 51 Identity TheftID_475f992f_8645_4a12_b400_23fe19888cbdSystem.Compliance.AuthorityDocumentProjection
ID_484e4658_1550_4edf_af7e_132cee799f13North Dakota Century Code, CHAPTER 51-30 Notice of Security Breach For Personal InformationID_484e4658_1550_4edf_af7e_132cee799f13System.Compliance.AuthorityDocumentProjection
ID_48ca3bd3_304c_4478_96d2_abc1bfaa9504Canadian Marketing Association Code of Ethics and Standards of PracticeID_48ca3bd3_304c_4478_96d2_abc1bfaa9504System.Compliance.AuthorityDocumentProjection
ID_49bc3506_a44c_435c_a583_ff260a55deddForm and Style Manual for Legislative MeasuresID_49bc3506_a44c_435c_a583_ff260a55deddSystem.Compliance.AuthorityDocumentProjection
ID_4a06205e_d782_46a6_b0dd_9271a7334833Montana Code § 30-14-1701 thru § 30-14-1705 and § 30-14-1721 thru § 30-14-1722; Protection of individual privacy and to impede identity theft as prohibited by § 45-6-332ID_4a06205e_d782_46a6_b0dd_9271a7334833System.Compliance.AuthorityDocumentProjection
ID_4bdf924e_314c_47ff_a769_caad60d5ffa8Australia Spam Act 2003: A practical guide for businessID_4bdf924e_314c_47ff_a769_caad60d5ffa8System.Compliance.AuthorityDocumentProjection
ID_4c75b739_ed52_476a_be24_36e4021cff37Payment Card Industry (PCI) Data Security Standard 1.2.1, Requirements and Security Assessment ProceduresID_4c75b739_ed52_476a_be24_36e4021cff37System.Compliance.AuthorityDocumentProjection
ID_4d10f5c4_ab6c_48e2_823d_c4631da14bbcSAS 109, Understanding the Entity and Its Environment and Assessing the Risks of Material MisstatementID_4d10f5c4_ab6c_48e2_823d_c4631da14bbcSystem.Compliance.AuthorityDocumentProjection
ID_4ef1422c_5621_429b_8b29_f58c527ca280DISA WIRELESS SECURITY CHECKLIST, Version 5, Release 2.2ID_4ef1422c_5621_429b_8b29_f58c527ca280System.Compliance.AuthorityDocumentProjection
ID_4f0e2211_99ad_4bd8_a6e9_ee4b11f9a09516 CFR Part 314, Standards for Safeguarding Customer InformationID_4f0e2211_99ad_4bd8_a6e9_ee4b11f9a095System.Compliance.AuthorityDocumentProjection
ID_4f31efcd_489d_4075_9b68_e7c825624b48Austria Telecommunications ActID_4f31efcd_489d_4075_9b68_e7c825624b48System.Compliance.AuthorityDocumentProjection
ID_4fb4de33_55d6_43f9_9c9a_c6782cb6e01dWisconsin Act 138 Notice of unauthorized acquisition of personal informationID_4fb4de33_55d6_43f9_9c9a_c6782cb6e01dSystem.Compliance.AuthorityDocumentProjection
ID_5218c02f_4283_4760_ae56_348cfa7da67bVisa Data Field EncryptionID_5218c02f_4283_4760_ae56_348cfa7da67bSystem.Compliance.AuthorityDocumentProjection
ID_53d77f16_34b5_4cd4_bae6_684e9388484c16 CFR Part 310, Telemarketing Sales Rule (TSR)ID_53d77f16_34b5_4cd4_bae6_684e9388484cSystem.Compliance.AuthorityDocumentProjection
ID_5409427e_7a5d_4333_9c06_9b555ffd1833IIA Global Technology Audit Guide (GTAG) 1: Information Technology ControlsID_5409427e_7a5d_4333_9c06_9b555ffd1833System.Compliance.AuthorityDocumentProjection
ID_556d03db_a2cf_41ad_aadf_e8c145d10ffaGuidelines on Cell Phone and PDA Security, NIST SP 800-124ID_556d03db_a2cf_41ad_aadf_e8c145d10ffaSystem.Compliance.AuthorityDocumentProjection
ID_56338405_846a_4156_a1a9_dd2d0b4fbffcNSA Guide to Security Microsoft Windows XPID_56338405_846a_4156_a1a9_dd2d0b4fbffcSystem.Compliance.AuthorityDocumentProjection
ID_56f261ca_bda2_47ff_8530_1a833c841f1ePayment Card Industry Self-Assessment Questionnaire A and Attestation of Compliance No Electronic StID_56f261ca_bda2_47ff_8530_1a833c841f1eSystem.Compliance.AuthorityDocumentProjection
ID_57e7e09c_6192_4e52_a179_761c7feaab20FFIEC IT Examination Handbook – OperationsID_57e7e09c_6192_4e52_a179_761c7feaab20System.Compliance.AuthorityDocumentProjection
ID_5817537e_3191_4c4e_a737_b46a75ad832bMasterCard Electronic Commerce Security Architecture Best PracticesID_5817537e_3191_4c4e_a737_b46a75ad832bSystem.Compliance.AuthorityDocumentProjection
ID_5862fc92_ed3b_4a2c_bd58_e149faf226caFIPS Pub 200, Minimum Security Requirements for Federal Information and Information SystemsID_5862fc92_ed3b_4a2c_bd58_e149faf226caSystem.Compliance.AuthorityDocumentProjection
ID_59caedb1_9507_4e7b_97f6_3527d401eca7IT Baseline Protection Manual Standard Security Safeguards GermanyID_59caedb1_9507_4e7b_97f6_3527d401eca7System.Compliance.AuthorityDocumentProjection
ID_5c2b0630_c31b_45d0_bb2c_d0990deefbf1OGC ITIL: Service DeliveryID_5c2b0630_c31b_45d0_bb2c_d0990deefbf1System.Compliance.AuthorityDocumentProjection
ID_5cb98ca0_809a_4ad8_ae88_a820425338f7FTC FACT Act Red Flags Rule TemplateID_5cb98ca0_809a_4ad8_ae88_a820425338f7System.Compliance.AuthorityDocumentProjection
ID_5d03499d_8877_46cb_ac17_eb98fab181e2State Prohibitions on Marketing Practices using Medical Information (CA SB1633)ID_5d03499d_8877_46cb_ac17_eb98fab181e2System.Compliance.AuthorityDocumentProjection
ID_5d8deea3_9f33_43bb_ab89_e69ea44ff2e4ACH (Automated Clearing House) Operating Rules OCC Bulletin 2004-58ID_5d8deea3_9f33_43bb_ab89_e69ea44ff2e4System.Compliance.AuthorityDocumentProjection
ID_5f5f2cc5_75d9_440a_bf8f_42a110cf143dVermont Statute Title 9 Chapter 62 Protection of Personal Information § 2430, § 2435, § 2440, § 2445ID_5f5f2cc5_75d9_440a_bf8f_42a110cf143dSystem.Compliance.AuthorityDocumentProjection
ID_5fadb42d_df1f_4e8b_9ab8_17ce6ee68f07Identity Theft Red Flags and Address Discrepancies Under the Fair and Accurate Credit Transactions Act of 2003ID_5fadb42d_df1f_4e8b_9ab8_17ce6ee68f07System.Compliance.AuthorityDocumentProjection
ID_5fd03c43_7ec1_45c6_ba49_d84cbb99e659BS 25999-1, Business continuity management. Code of practiceID_5fd03c43_7ec1_45c6_ba49_d84cbb99e659System.Compliance.AuthorityDocumentProjection
ID_5fff3bed_4456_4d4c_a611_75035f0da0d4DOT Physical Security Survey ChecklistID_5fff3bed_4456_4d4c_a611_75035f0da0d4System.Compliance.AuthorityDocumentProjection
ID_60047dbc_9f24_49d2_9eab_8b8b5add3c7fMissouri Revised Statutes Chapter 407 Merchandising Practices § 407.1500ID_60047dbc_9f24_49d2_9eab_8b8b5add3c7fSystem.Compliance.AuthorityDocumentProjection
ID_631f8a0b_99b9_4960_a5e7_513d499a5ecaColima Personal Data Protection Law (Decree No. 356)ID_631f8a0b_99b9_4960_a5e7_513d499a5ecaSystem.Compliance.AuthorityDocumentProjection
ID_63c9d25b_add6_4a9b_a0a7_7dedc46c24d2FIPS Pub 191, Guideline for the Analysis of Local Area Network (LAN) SecurityID_63c9d25b_add6_4a9b_a0a7_7dedc46c24d2System.Compliance.AuthorityDocumentProjection
ID_6442479a_7fb3_40a7_8fc7_6bc13a503123France Data Processing, Data Files and Individual LibertiesID_6442479a_7fb3_40a7_8fc7_6bc13a503123System.Compliance.AuthorityDocumentProjection
ID_64472a7e_8bb9_47a9_badd_ff270b69c3d6Connecticut law Concerning Nondisclosure of Private Tenant Information, CT HB 5184ID_64472a7e_8bb9_47a9_badd_ff270b69c3d6System.Compliance.AuthorityDocumentProjection
ID_64c77ed4_5f2e_47dd_95f8_784c0b8c338aISO/IEC 20000-2 Information technology - Service Management Part 2ID_64c77ed4_5f2e_47dd_95f8_784c0b8c338aSystem.Compliance.AuthorityDocumentProjection
ID_64eea7a7_ace3_4905_9c95_75365523537cTexas Business and Commercial Code Title 11, Subtitle B, Chapter 521 Subchapter A § 521ID_64eea7a7_ace3_4905_9c95_75365523537cSystem.Compliance.AuthorityDocumentProjection
ID_6574dffa_f565_4a53_b062_33cc2c9ed7eaCalifornia Civil Code § 1798.91 State Prohibitions on Marketing Practices using Medical InformationID_6574dffa_f565_4a53_b062_33cc2c9ed7eaSystem.Compliance.AuthorityDocumentProjection
ID_673c5d8f_ec47_421f_9eff_799174f4951aTITLE 49, Subtitle VII - Aviation ProgramsID_673c5d8f_ec47_421f_9eff_799174f4951aSystem.Compliance.AuthorityDocumentProjection
ID_6908fe9b_6cab_42ca_a6ca_35ac04b4d205OECD Principles of Corporate GovernanceID_6908fe9b_6cab_42ca_a6ca_35ac04b4d205System.Compliance.AuthorityDocumentProjection
ID_69e9be7a_f049_428c_8e21_fdcbc437c1a5Iceland Protection of Privacy as regards the Processing of Personal DataID_69e9be7a_f049_428c_8e21_fdcbc437c1a5System.Compliance.AuthorityDocumentProjection
ID_6acdd08d_dd92_4ace_8537_4937f40de63118 USC § 2710, Wrongful disclosure of video tape rental or sale recordsID_6acdd08d_dd92_4ace_8537_4937f40de631System.Compliance.AuthorityDocumentProjection
ID_6aee15c4_3ede_4c8a_96d9_7cb95d0adb6bDesign Criteria Standard for Electronic Records Management Software Application, DOD 5015.2ID_6aee15c4_3ede_4c8a_96d9_7cb95d0adb6bSystem.Compliance.AuthorityDocumentProjection
ID_6bbb45a9_1e84_405b_9c17_1db2b4f52e8fIRS Publication 1075: TAX INFORMATION SECURITY GUIDELINES FOR FEDERAL, STATE AND LOCAL AGENCIES AND ENTITIES; Safeguards for Protecting Federal Tax Returns and Return InformationID_6bbb45a9_1e84_405b_9c17_1db2b4f52e8fSystem.Compliance.AuthorityDocumentProjection
ID_6c8e3b94_884b_4d2a_bc6e_dc06519f146aMinnesota Statute § 325E.61 Data Warehouses; Notice Required For Certain DisclosuresID_6c8e3b94_884b_4d2a_bc6e_dc06519f146aSystem.Compliance.AuthorityDocumentProjection
ID_6c9587c0_1a45_4201_98c1_f6514206c013OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal DataID_6c9587c0_1a45_4201_98c1_f6514206c013System.Compliance.AuthorityDocumentProjection
ID_6ca2c8f2_669a_4639_b26e_255ee17dc9abCzech Republic ParliamentID_6ca2c8f2_669a_4639_b26e_255ee17dc9abSystem.Compliance.AuthorityDocumentProjection
ID_6ce051d8_9ba6_46af_a157_079d41c17414Rhode Island Security Breach Notification Law, RI HB 6191ID_6ce051d8_9ba6_46af_a157_079d41c17414System.Compliance.AuthorityDocumentProjection
ID_6d08441c_aa54_4459_9cac_f3b618685721MasterCard Wireless LANs - Security Risks and GuidelinesID_6d08441c_aa54_4459_9cac_f3b618685721System.Compliance.AuthorityDocumentProjection
ID_6e29cd1a_07de_4634_92c1_89fd97bda01aRhode Island General Law Chapter 11-49.2 Identity Theft Protection § 11-49.2-1 thru § 11-49. 2-4ID_6e29cd1a_07de_4634_92c1_89fd97bda01aSystem.Compliance.AuthorityDocumentProjection
ID_6e4c8e0e_ab89_403f_a8da_d7b68d1129d9Oregon Revised Statutes Chapter 646a § 646A.600 thru § 646A.624 Identity Theft Protection ActID_6e4c8e0e_ab89_403f_a8da_d7b68d1129d9System.Compliance.AuthorityDocumentProjection
ID_6e549424_3b4d_4e95_8ece_f62e5610a66aIndia Information Technology Act (ITA-2000)ID_6e549424_3b4d_4e95_8ece_f62e5610a66aSystem.Compliance.AuthorityDocumentProjection
ID_7081a018_da4a_4897_b465_c8cb15f62751IIA Global Technology Audit Guide (GTAG) 4: Management of IT AuditingID_7081a018_da4a_4897_b465_c8cb15f62751System.Compliance.AuthorityDocumentProjection
ID_72047ff8_05f7_41ec_b60b_65c2b809c7d3Law of 2 August 2002 on the Protection of Persons with Regard to the Processing of Personal DataID_72047ff8_05f7_41ec_b60b_65c2b809c7d3System.Compliance.AuthorityDocumentProjection
ID_72343c2c_13f9_4990_aea4_316df0b37520Federal Risk and Authorization Management ProgramID_72343c2c_13f9_4990_aea4_316df0b37520System.Compliance.AuthorityDocumentProjection
ID_7256f089_d100_4eec_a6bc_4b7c4da412abCustoms-Trade Partnership Against Terrorism (C-TPAT) Importer Security CriteriaID_7256f089_d100_4eec_a6bc_4b7c4da412abSystem.Compliance.AuthorityDocumentProjection
ID_72849e71_6457_48d9_acea_376219924f71Bosnia Law on Protection of Personal DataID_72849e71_6457_48d9_acea_376219924f71System.Compliance.AuthorityDocumentProjection
ID_733eafb4_03cc_4533_99a8_8a599aec981eControlling the Assault of Non-Solicited Pornography and Marketing Act of 2003ID_733eafb4_03cc_4533_99a8_8a599aec981eSystem.Compliance.AuthorityDocumentProjection
ID_745fcc11_8260_42fe_b606_eb67570aaefaCobiTID_745fcc11_8260_42fe_b606_eb67570aaefaSystem.Compliance.AuthorityDocumentProjection
ID_74aed273_8c36_482a_b387_bf1f9c80446221 CFR Part 820, Subchapter H - Medical Devices, Part 820 Quality System RegulationID_74aed273_8c36_482a_b387_bf1f9c804462System.Compliance.AuthorityDocumentProjection
ID_74c2a82e_9771_4c2e_96a3_48ed20a2b1d9ISSA Generally Accepted Information Security Principles (GAISP)ID_74c2a82e_9771_4c2e_96a3_48ed20a2b1d9System.Compliance.AuthorityDocumentProjection
ID_74d7450a_8aa7_4747_9636_c442f2c05851Microsoft Developer Network Security GlossaryID_74d7450a_8aa7_4747_9636_c442f2c05851System.Compliance.AuthorityDocumentProjection
ID_750f236e_8185_44d9_a8b4_a76a6eef5d9fPoland Protection of Personal Data ActID_750f236e_8185_44d9_a8b4_a76a6eef5d9fSystem.Compliance.AuthorityDocumentProjection
ID_7529560f_f94a_4261_a350_ab7167f197e4CODE OF CORPORATE GOVERNANCE 2005ID_7529560f_f94a_4261_a350_ab7167f197e4System.Compliance.AuthorityDocumentProjection
ID_76362127_5193_4cb4_af6f_89b3936c97deHawaii Revised Statute § 487N. Security Breach of Personal InformationID_76362127_5193_4cb4_af6f_89b3936c97deSystem.Compliance.AuthorityDocumentProjection
ID_76f32415_7131_426f_a8ca_e5aa7a1038beVirginia Code Title 18.2 Chapter 6 Breach of personal information notification § 18.2-186.6ID_76f32415_7131_426f_a8ca_e5aa7a1038beSystem.Compliance.AuthorityDocumentProjection
ID_78c1f226_4694_46e2_9d19_0cf3f92d63f1NIST SCAP Microsoft Internet Explorer Version 7 (fdcc-ie7-xccdf.xml)ID_78c1f226_4694_46e2_9d19_0cf3f92d63f1System.Compliance.AuthorityDocumentProjection
ID_79979517_7e4c_4927_b5b4_c342cd39c3e4Implementation Guide for OMB Circular A-123 Management’s Responsibility for Internal ControlID_79979517_7e4c_4927_b5b4_c342cd39c3e4System.Compliance.AuthorityDocumentProjection
ID_79a58c6a_e2c9_4cc3_8d6c_66d0cd8ba078Massachusetts 201 CMR 17.00: Standards for The Protection of Personal Information of Residents of the Commonwealth of MassachusettsID_79a58c6a_e2c9_4cc3_8d6c_66d0cd8ba078System.Compliance.AuthorityDocumentProjection
ID_79c804b2_8aab_4ab3_8c75_a8ee2395230dGuanajuato Personal Data Protection LawID_79c804b2_8aab_4ab3_8c75_a8ee2395230dSystem.Compliance.AuthorityDocumentProjection
ID_7a3997a9_80d7_4f43_af04_e5f93aac54f1IIA Global Technology Audit Guide (GTAG) 12: Auditing IT ProjectsID_7a3997a9_80d7_4f43_af04_e5f93aac54f1System.Compliance.AuthorityDocumentProjection
ID_7aaceb4b_3c9c_4d5b_b103_4c8484f6f9c0Switzerland Federal Act of 19 June 1992 on Data Protection (FADP)ID_7aaceb4b_3c9c_4d5b_b103_4c8484f6f9c0System.Compliance.AuthorityDocumentProjection
ID_7b87eb6b_fd4f_4845_b533_a35e43968557FFIEC IT Examination Handbook – Information SecurityID_7b87eb6b_fd4f_4845_b533_a35e43968557System.Compliance.AuthorityDocumentProjection
ID_7b88b83f_bd2d_4cab_b0f6_4a3cdac44c3dSmith Guidance on Audit Committees, UK FRCID_7b88b83f_bd2d_4cab_b0f6_4a3cdac44c3dSystem.Compliance.AuthorityDocumentProjection
ID_7ccc86c0_59d3_4efc_894f_17b8783c05c2Guide for Developing Security Plans for Federal Information Systems, NIST SP 800-18ID_7ccc86c0_59d3_4efc_894f_17b8783c05c2System.Compliance.AuthorityDocumentProjection
ID_7cf488d4_c221_42b5_93c0_bbe74d8529feDirective 2003/4/EC Of The European ParliamentID_7cf488d4_c221_42b5_93c0_bbe74d8529feSystem.Compliance.AuthorityDocumentProjection
ID_7cff5842_3f1f_42c6_90a9_f979a82463bd17 CFR Part 210.2-06, Retention of Audit and Review RecordsID_7cff5842_3f1f_42c6_90a9_f979a82463bdSystem.Compliance.AuthorityDocumentProjection
ID_7e1897b8_e908_4228_8448_6018bd0bf1ae12 CFR Part 229 Availability of Funds and Collection (Check Clearing for the 21st Century)ID_7e1897b8_e908_4228_8448_6018bd0bf1aeSystem.Compliance.AuthorityDocumentProjection
ID_7e6784a1_f753_4c49_aeec_01724dc559cbISACA Glossary of TermsID_7e6784a1_f753_4c49_aeec_01724dc559cbSystem.Compliance.AuthorityDocumentProjection
ID_7e822bfa_79fd_4aff_8959_b002c390b633Indiana Code 24, Article 4.9. Disclosure of Security BreachID_7e822bfa_79fd_4aff_8959_b002c390b633System.Compliance.AuthorityDocumentProjection
ID_7f907f0b_87d6_4290_88a4_948a1f357d9bPayment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance All other Merchants and all SAQ-Eligible Service ProvidersID_7f907f0b_87d6_4290_88a4_948a1f357d9bSystem.Compliance.AuthorityDocumentProjection
ID_7ff63992_fb16_4559_af1b_0a067143ffe1Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such dataID_7ff63992_fb16_4559_af1b_0a067143ffe1System.Compliance.AuthorityDocumentProjection
ID_802f27eb_8aa6_4e40_9d67_67f41de89d3334 CFR Part 99, Family Education Rights Privacy Act (FERPA)ID_802f27eb_8aa6_4e40_9d67_67f41de89d33System.Compliance.AuthorityDocumentProjection
ID_8078a827_adc2_40fd_bdfa_798bf53b5c2dDISA Windows VISTA Security ChecklistID_8078a827_adc2_40fd_bdfa_798bf53b5c2dSystem.Compliance.AuthorityDocumentProjection
ID_80eb4802_8aa4_445d_a104_b1347c764841ORGANIC LAW 15/1999 of 13 December on the Protection of Personal DataID_80eb4802_8aa4_445d_a104_b1347c764841System.Compliance.AuthorityDocumentProjection
ID_81074b6f_ac3e_4be4_8e80_9595b26e7a69Australia Better Practice Guide - Business Continuity ManagementID_81074b6f_ac3e_4be4_8e80_9595b26e7a69System.Compliance.AuthorityDocumentProjection
ID_836c2c58_1be9_4831_9373_b74cbd70e817Tlaxcala Law on Access to Public Information and Personal Data ProtectionID_836c2c58_1be9_4831_9373_b74cbd70e817System.Compliance.AuthorityDocumentProjection
ID_838b6ef3_a90d_4445_8e88_b398801fcbecSAS 110, Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence ObtainedID_838b6ef3_a90d_4445_8e88_b398801fcbecSystem.Compliance.AuthorityDocumentProjection
ID_83964bd5_cea3_4f3d_865b_e6bb531797ddLeahy Personal Data Privacy and Security Act of 2009, Senate Bill 1490, 111th CongressID_83964bd5_cea3_4f3d_865b_e6bb531797ddSystem.Compliance.AuthorityDocumentProjection
ID_84270717_8708_43ce_b4e5_5df11bfc8794German Corporate Governance Code ("The Code")ID_84270717_8708_43ce_b4e5_5df11bfc8794System.Compliance.AuthorityDocumentProjection
ID_8503891b_f296_41d4_b6e4_016288eafa06Kentucky Revised Statutes Title III Chapter 15 § 113 Prevention of Identity TheftID_8503891b_f296_41d4_b6e4_016288eafa06System.Compliance.AuthorityDocumentProjection
ID_8553e7ea_2e44_46b5_8a7f_5c5345273c7cFFIEC IT Examination Handbook – AuditID_8553e7ea_2e44_46b5_8a7f_5c5345273c7cSystem.Compliance.AuthorityDocumentProjection
ID_855deadd_b134_45d5_8e84_722ffa11caa7Canada Personal Information Protection Electronic Documents Act (PIPEDA)ID_855deadd_b134_45d5_8e84_722ffa11caa7System.Compliance.AuthorityDocumentProjection
ID_869fa446_89ff_45e4_b6b2_c692b7888df8COSO Enterprise Risk Management (ERM) Integrated Framework (2004)ID_869fa446_89ff_45e4_b6b2_c692b7888df8System.Compliance.AuthorityDocumentProjection
ID_8730d65b_885f_4b5f_89cc_761117360c52DISA Secure Remote Computing Security Technical Implementation GuideID_8730d65b_885f_4b5f_89cc_761117360c52System.Compliance.AuthorityDocumentProjection
ID_87825ba2_0736_439b_8ded_c185c24351a9The Personal Data Protection Law for the Federal District (Mexico City)ID_87825ba2_0736_439b_8ded_c185c24351a9System.Compliance.AuthorityDocumentProjection
ID_8931b49c_5c54_4128_a69a_e8da5cb58633Minnesota Statute § 325E.64 Access Devices; Breach of SecurityID_8931b49c_5c54_4128_a69a_e8da5cb58633System.Compliance.AuthorityDocumentProjection
ID_8973d225_13a4_40ad_bdee_73eae99866ffIowa Code Annotated § 714.16B Civil Cause of ActionID_8973d225_13a4_40ad_bdee_73eae99866ffSystem.Compliance.AuthorityDocumentProjection
ID_89c649d7_ee3f_46a3_bb1d_75fc9be3b86aFFIEC IT Examination Handbook – E-BankingID_89c649d7_ee3f_46a3_bb1d_75fc9be3b86aSystem.Compliance.AuthorityDocumentProjection
ID_89cb6dfb_fdae_4599_a9a6_91b61ec0b1d8Japan Act on the Protection of Personal Information Protection (Law No. 57 of 2003)ID_89cb6dfb_fdae_4599_a9a6_91b61ec0b1d8System.Compliance.AuthorityDocumentProjection
ID_89f1a776_9295_4206_ae19_0ffb545cac83Basel II: International Convergence of Capital Measurement and Capital Standards - A Revised FrameworkID_89f1a776_9295_4206_ae19_0ffb545cac83System.Compliance.AuthorityDocumentProjection
ID_8a8e3567_5e48_46ea_b064_48209638bd2bDefense Industrial Base Information Assurance StandardID_8a8e3567_5e48_46ea_b064_48209638bd2bSystem.Compliance.AuthorityDocumentProjection
ID_8c0dd987_74ad_47e0_babf_44bc6dd76a81MOF Service Management Function PlaceholderID_8c0dd987_74ad_47e0_babf_44bc6dd76a81System.Compliance.AuthorityDocumentProjection
ID_8eaee986_f921_4f1a_9847_e17510c0faf9Italy Protection of Individuals Other Subject with regard to the Processing of Personal DataID_8eaee986_f921_4f1a_9847_e17510c0faf9System.Compliance.AuthorityDocumentProjection
ID_8ffe9ae1_d4a2_4ef1_9da4_93e88dbc7d95Uniform Electronic Transactions Act (UETA) (1999)ID_8ffe9ae1_d4a2_4ef1_9da4_93e88dbc7d95System.Compliance.AuthorityDocumentProjection
ID_9057dd81_878e_4b31_a9c4_44e18f2d53aaFederal Information Security Management Act of 2002ID_9057dd81_878e_4b31_a9c4_44e18f2d53aaSystem.Compliance.AuthorityDocumentProjection
ID_905b4ad4_a8c9_4b53_899e_aff25946fb5616 CFR Part 313, Privacy of Consumer Financial InformationID_905b4ad4_a8c9_4b53_899e_aff25946fb56System.Compliance.AuthorityDocumentProjection
ID_9081cade_ae04_492c_8042_c6779e8bac87Organizational Resilience: Security, Preparedness, and Continuity Management Systems -- Requirements with Guidance for Use, ASIS SPC.1-2009ID_9081cade_ae04_492c_8042_c6779e8bac87System.Compliance.AuthorityDocumentProjection
ID_91de9b7c_1f00_4dc8_a57d_cba74ff7638dDisaster / Emergency Management and Business Continuity, NFPA 1600ID_91de9b7c_1f00_4dc8_a57d_cba74ff7638dSystem.Compliance.AuthorityDocumentProjection
ID_93542993_aae6_460e_8786_bbfa24887fe4Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance Imprint Machines or Stand-alone Dial-out Terminals Only, no Electronic Cardholder Data StorageID_93542993_aae6_460e_8786_bbfa24887fe4System.Compliance.AuthorityDocumentProjection
ID_944838e7_3318_44c9_a9c5_d296178f4cf416 CFR Part 682 Disposal of consumer report information and recordsID_944838e7_3318_44c9_a9c5_d296178f4cf4System.Compliance.AuthorityDocumentProjection
ID_944e6252_d4b0_4aaa_b17c_94c86ec821f7Portuguese Act on the Protection of Personal Data 67/98ID_944e6252_d4b0_4aaa_b17c_94c86ec821f7System.Compliance.AuthorityDocumentProjection
ID_982467b0_255f_45cd_9bbd_c10a31d3b1a318 USC § 2721, Prohibition on release and use of certain personal information from State motor vehicle records (Driver's Privacy Protection Act (DPPA)ID_982467b0_255f_45cd_9bbd_c10a31d3b1a3System.Compliance.AuthorityDocumentProjection
ID_9849977f_2924_4107_90b3_b7dff7375495Introductory Resource Guide for HIPAA NIST SP 800-66ID_9849977f_2924_4107_90b3_b7dff7375495System.Compliance.AuthorityDocumentProjection
ID_98a2c81e_5e1e_4963_b8dc_21589f492a35New Jersey Permanent Statutes Title 56 Security of Personal InformationID_98a2c81e_5e1e_4963_b8dc_21589f492a35System.Compliance.AuthorityDocumentProjection
ID_990988c5_d4b7_4bf4_ab1b_a5942081e081Uniform Rules of Evidence ActID_990988c5_d4b7_4bf4_ab1b_a5942081e081System.Compliance.AuthorityDocumentProjection
ID_992ff892_8502_4d95_9fbd_3ab38f10e986Mexico Federal Personal Data Protection LawID_992ff892_8502_4d95_9fbd_3ab38f10e986System.Compliance.AuthorityDocumentProjection
ID_995e719f_710b_4136_bdab_b1c6d52d9056Alaska Personal Information Protection Act, Chapter 48ID_995e719f_710b_4136_bdab_b1c6d52d9056System.Compliance.AuthorityDocumentProjection
ID_9a3fd57b_5608_49c4_8809_75846fcea364Guidance for Securing Microsoft Windows XP Systems for IT Professionals, NIST SP 800-68ID_9a3fd57b_5608_49c4_8809_75846fcea364System.Compliance.AuthorityDocumentProjection
ID_9af0ef3f_7fa4_4356_a099_07a84816f059Michigan Identity Theft Protection Act, Act 452 of 2004, § 445.61 thru § 445.72aID_9af0ef3f_7fa4_4356_a099_07a84816f059System.Compliance.AuthorityDocumentProjection
ID_9be1e091_b4ee_4bf1_9239_e425c9372bc5ISO/IEC 13335-1 Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security managementID_9be1e091_b4ee_4bf1_9239_e425c9372bc5System.Compliance.AuthorityDocumentProjection
ID_9d0b4d78_e0f7_4a00_a235_462c1edf531517 CFR Part 240.15d-15, Controls and ProceduresID_9d0b4d78_e0f7_4a00_a235_462c1edf5315System.Compliance.AuthorityDocumentProjection
ID_9ddd2c93_6adf_42e1_bfa9_b92fcafc6177Payment Card Industry (PCI) Data Security Standard 2.0, Requirements and Security Assessment ProceduresID_9ddd2c93_6adf_42e1_bfa9_b92fcafc6177System.Compliance.AuthorityDocumentProjection
ID_9e5bcd49_0a0c_4b0a_ad6b_3e84d321c5e217 CFR Part 240.17a-4, Records to be preserved by certain exchange members, brokers, and dealersID_9e5bcd49_0a0c_4b0a_ad6b_3e84d321c5e2System.Compliance.AuthorityDocumentProjection
ID_9f7dc249_0306_4076_8b3c_a428c8b32775Hong Kong Personal Data (Privacy) OrdinanceID_9f7dc249_0306_4076_8b3c_a428c8b32775System.Compliance.AuthorityDocumentProjection
ID_a30120ba_9613_4163_a68f_de1c63f7e67eTaiwan Computer-Processed Personal Data Protection Law 1995ID_a30120ba_9613_4163_a68f_de1c63f7e67eSystem.Compliance.AuthorityDocumentProjection
ID_a366f74e_5242_45e8_b8ed_46428ff4411aISO/IEC 15408-1 Common Criteria for Information Technology Security Evaluation Part 1ID_a366f74e_5242_45e8_b8ed_46428ff4411aSystem.Compliance.AuthorityDocumentProjection
ID_a3c6f07a_5dc3_4e90_b452_fcf5ab3860f3Kentucky Revised Statutes Title XXXVI Chapter 411 § 210 Action for theft of identity or trafficking in stolen identitiesID_a3c6f07a_5dc3_4e90_b452_fcf5ab3860f3System.Compliance.AuthorityDocumentProjection
ID_a3ea29ab_b9ee_437f_ac8c_36ceb2c6e551ISO/IEC 15408-2 Common Criteria for Information Technology Security Evaluation Part 2ID_a3ea29ab_b9ee_437f_ac8c_36ceb2c6e551System.Compliance.AuthorityDocumentProjection
ID_a473d897_a882_45d1_857d_4201060bf65cInternet Security: Distributed Denial of Service Attacks – OCC Alert 2000-1ID_a473d897_a882_45d1_857d_4201060bf65cSystem.Compliance.AuthorityDocumentProjection
ID_a4a2db05_5259_4894_9867_71ed337400aeGenerally Accepted Principles and Practices for Securing Information Technology Systems, NIST SP 800-14ID_a4a2db05_5259_4894_9867_71ed337400aeSystem.Compliance.AuthorityDocumentProjection
ID_a4aee90b_5176_410f_a6a3_3fba40a05e0cAviation and Transportation Security Act, Public Law 107 Released-71, November 2001ID_a4aee90b_5176_410f_a6a3_3fba40a05e0cSystem.Compliance.AuthorityDocumentProjection
ID_a51ea272_43c9_473d_9275_8aecd8370962Indiana Code 24, Notice of Security Breach, Chapter 11ID_a51ea272_43c9_473d_9275_8aecd8370962System.Compliance.AuthorityDocumentProjection
ID_a542df88_b96c_4122_bc8d_6ae16998e0d3DISA Windows Server 2003 Security ChecklistID_a542df88_b96c_4122_bc8d_6ae16998e0d3System.Compliance.AuthorityDocumentProjection
ID_a55dbb27_eb9d_48c1_99b2_5a88077944dfGuide for Developing Performance Metrics for Information Security, NIST SP 800-80ID_a55dbb27_eb9d_48c1_99b2_5a88077944dfSystem.Compliance.AuthorityDocumentProjection
ID_a561593a_8ccd_4c04_a944_9ff7384eb273Belgian Law of 8 December 1992 on the protection of privacy in relation to the processing of personaID_a561593a_8ccd_4c04_a944_9ff7384eb273System.Compliance.AuthorityDocumentProjection
ID_a5bfc261_e90c_464e_82c1_1c2014a4a0a1Austria Data Protection ActID_a5bfc261_e90c_464e_82c1_1c2014a4a0a1System.Compliance.AuthorityDocumentProjection
ID_a5d49ac0_7e04_4ecc_91fa_35401838dc5bThe National Strategy to Secure CyberspaceID_a5d49ac0_7e04_4ecc_91fa_35401838dc5bSystem.Compliance.AuthorityDocumentProjection
ID_a6736727_33f3_4372_86ce_5fd0e79a2a18Australia Privacy Act 1988ID_a6736727_33f3_4372_86ce_5fd0e79a2a18System.Compliance.AuthorityDocumentProjection
ID_a6ff8bf6_3e66_4a0e_817b_53876d5b7cdeGuide for Assessing the Security Controls in Federal Information Systems, NIST SP 800-53AID_a6ff8bf6_3e66_4a0e_817b_53876d5b7cdeSystem.Compliance.AuthorityDocumentProjection
ID_a7523dc1_9279_4947_862e_a55198ab6d3e45 CFR Parts 160 and 164, Standards for Privacy of Individually Identifiable Health InformationID_a7523dc1_9279_4947_862e_a55198ab6d3eSystem.Compliance.AuthorityDocumentProjection
ID_a78186bf_8287_4ba4_9d19_8151caac9179DoD Instruction 8500.2 Information Assurance (IA) ImplementationID_a78186bf_8287_4ba4_9d19_8151caac9179System.Compliance.AuthorityDocumentProjection
ID_a7a48f72_b2bd_4e1f_bc05_fa7f912e5322Clinger-Cohen Act (Information Technology Management Reform Act)ID_a7a48f72_b2bd_4e1f_bc05_fa7f912e5322System.Compliance.AuthorityDocumentProjection
ID_a8517230_b148_4662_ada8_404f5d5ab68cISO/IEC 73, Risk Management - VocabularyID_a8517230_b148_4662_ada8_404f5d5ab68cSystem.Compliance.AuthorityDocumentProjection
ID_a8a9a375_0674_4b4b_8c6b_474d6ae3a74545 CFR Part 170, Health Information Technology: Initial Set of Standards, Implementation Specifications, and Certification Criteria for Electronic Health Record TechnologyID_a8a9a375_0674_4b4b_8c6b_474d6ae3a745System.Compliance.AuthorityDocumentProjection
ID_a8d6894e_8bb1_41ab_8845_51b237b3d319Computer Security Incident Handling Guide, NIST SP 800-61ID_a8d6894e_8bb1_41ab_8845_51b237b3d319System.Compliance.AuthorityDocumentProjection
ID_a929a6b6_66a5_4ce8_a5e0_b8e4682dbcc7Finland act on the amendment of the Personal Data Act (986/2000)ID_a929a6b6_66a5_4ce8_a5e0_b8e4682dbcc7System.Compliance.AuthorityDocumentProjection
ID_a97a1419_0c90_4bff_982b_2badaade2950IIA Global Technology Audit Guide (GTAG) 8: Auditing Application ControlsID_a97a1419_0c90_4bff_982b_2badaade2950System.Compliance.AuthorityDocumentProjection
ID_a9a88d5c_43ca_475b_9846_905f25651079FFIEC IT Examination Handbook – Supervision of Technology Service ProvidersID_a9a88d5c_43ca_475b_9846_905f25651079System.Compliance.AuthorityDocumentProjection
ID_a9d6d8e7_0a2e_4297_b959_e8c00588d5eeUnderlying Technical Models for Information Technology Security, SP 800-33ID_a9d6d8e7_0a2e_4297_b959_e8c00588d5eeSystem.Compliance.AuthorityDocumentProjection
ID_aac49e26_d65a_4f0b_8b64_0a70cd7ccfddISF Security Audit of NetworksID_aac49e26_d65a_4f0b_8b64_0a70cd7ccfddSystem.Compliance.AuthorityDocumentProjection
ID_ad8e7f54_2a48_4b9b_8ebd_f5537561510aISACA IS Standards, Guidelines, and Procedures for Auditing and Control ProfessionalsID_ad8e7f54_2a48_4b9b_8ebd_f5537561510aSystem.Compliance.AuthorityDocumentProjection
ID_aeb44481_2f1c_4612_94d3_c1fb7d9af9e0Florida Statute 817.5681 Breach of security concerning confidential personal information in third-party possessionID_aeb44481_2f1c_4612_94d3_c1fb7d9af9e0System.Compliance.AuthorityDocumentProjection
ID_aec918ba_de5c_416b_8104_95d8befeec09Nevada Revised Statute Chapter 603A, Security of Personal InformationID_aec918ba_de5c_416b_8104_95d8befeec09System.Compliance.AuthorityDocumentProjection
ID_af1c97c4_17b0_4eab_819f_a987b6a0779aThe Dutch corporate governance code, Principles of good corporate governance and best practice provisionsID_af1c97c4_17b0_4eab_819f_a987b6a0779aSystem.Compliance.AuthorityDocumentProjection
ID_b107bf43_24e2_4cc9_b7be_01e284c4433eColorado Revised Statutes 6-1-716, Notice of Security BreachID_b107bf43_24e2_4cc9_b7be_01e284c4433eSystem.Compliance.AuthorityDocumentProjection
ID_b1145382_f38f_4bc7_8020_5f49552abe32FIPS Pub 140-2, Security Requirements for Cryptographic ModulesID_b1145382_f38f_4bc7_8020_5f49552abe32System.Compliance.AuthorityDocumentProjection
ID_b146789a_29c6_45dd_aca1_83b23f20696eAustralia Telecommunications Act 1997ID_b146789a_29c6_45dd_aca1_83b23f20696eSystem.Compliance.AuthorityDocumentProjection
ID_b190b85a_ce4f_4681_97fb_23b6e08df5e8Fair and Accurate Credit Transactions Act of 2003 (FACT Act)ID_b190b85a_ce4f_4681_97fb_23b6e08df5e8System.Compliance.AuthorityDocumentProjection
ID_b27b9b6b_cf68_41aa_bf66_5b1e43fd42b1AICPA Red Flag Rule Identity Theft Prevention ProgramID_b27b9b6b_cf68_41aa_bf66_5b1e43fd42b1System.Compliance.AuthorityDocumentProjection
ID_b2b96c07_4279_49ee_b936_22a864b23294On the Setting of the Standards and Practice Standards for Management Assessment and Audit concerning Internal Control Over Financial ReportingID_b2b96c07_4279_49ee_b936_22a864b23294System.Compliance.AuthorityDocumentProjection
ID_b3ee97bb_eb79_4501_b9b5_9b8b2eddcd75Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance All other Merchants and all SAQ-Eligible Service ProvidersID_b3ee97bb_eb79_4501_b9b5_9b8b2eddcd75System.Compliance.AuthorityDocumentProjection
ID_b611ebfb_50b7_42c7_b5a1_a5d54038a7aaIIA Global Technology Audit Guide (GTAG) 7: Information Technology OutsourcingID_b611ebfb_50b7_42c7_b5a1_a5d54038a7aaSystem.Compliance.AuthorityDocumentProjection
ID_b7840018_867d_47c0_b82c_5b5698765ddbGeorgia Code Title 10 Chapter 1 Article 34 § 10-1-911 thru 10-1-915 Notification required upon breach of security regarding personal informationID_b7840018_867d_47c0_b82c_5b5698765ddbSystem.Compliance.AuthorityDocumentProjection
ID_b7d6185f_11d5_4f5d_9109_9f0f24ca5784Connecticut law Requiring Consumer Credit Bureaus to Offer Security Freezes, CT SB 650ID_b7d6185f_11d5_4f5d_9109_9f0f24ca5784System.Compliance.AuthorityDocumentProjection
ID_b7f4d047_332e_4a7d_8432_dd2c8afba848FFIEC Guidance on Authentication in an Internet Banking EnvironmentID_b7f4d047_332e_4a7d_8432_dd2c8afba848System.Compliance.AuthorityDocumentProjection
ID_b90beb28_50d5_4fee_bb22_570e8d1d97dfIIA Global Technology Audit Guide (GTAG) 11: Developing the IT Audit PlanID_b90beb28_50d5_4fee_bb22_570e8d1d97dfSystem.Compliance.AuthorityDocumentProjection
ID_bcbf8423_8609_4192_9d62_4071348abe90Revised Code of Washington Title 19 Chapter 19.255 Personal information - notice of security breaches § 19.255.010ID_bcbf8423_8609_4192_9d62_4071348abe90System.Compliance.AuthorityDocumentProjection
ID_bd332136_ce42_4a19_9f00_0f795e45606417 CFR Part 240.17Ad-7, Record retentionID_bd332136_ce42_4a19_9f00_0f795e456064System.Compliance.AuthorityDocumentProjection
ID_bd768cf0_6bb2_4232_b1f1_865145d872dbConnecticut State Law Sec. 36a-701b. Breach of security re computerized data containing personal information. Disclosure of breach. Delay for criminal investigation. Means of notice. Unfair trade practiceID_bd768cf0_6bb2_4232_b1f1_865145d872dbSystem.Compliance.AuthorityDocumentProjection
ID_bd860923_bd35_48ed_a11a_1838b5334644Children's Online Privacy Protection Act of 1998ID_bd860923_bd35_48ed_a11a_1838b5334644System.Compliance.AuthorityDocumentProjection
ID_bddd7cf6_0790_4623_830f_cbc936d6fcba17 CFR Part 240.17a-3, Records to be made by certain exchange members, brokers, and dealersID_bddd7cf6_0790_4623_830f_cbc936d6fcbaSystem.Compliance.AuthorityDocumentProjection
ID_be50ef26_2355_4738_97e8_9c7bd3ef4eb5State of Arizona Standard P800-S880, Revision 2.0: Media Sanitation/DisposalID_be50ef26_2355_4738_97e8_9c7bd3ef4eb5System.Compliance.AuthorityDocumentProjection
ID_bf4f1025_b693_49ac_86c7_2b1b134619aeMaryland Code of Commercial Law Subtitle 35. Maryland Personal Information Protection Act §14-3501 thru §14-3508ID_bf4f1025_b693_49ac_86c7_2b1b134619aeSystem.Compliance.AuthorityDocumentProjection
ID_c06ec4cc_650c_41fe_83a0_a65a0e442c50US Department of Commerce EU Safe Harbor Privacy PrinciplesID_c06ec4cc_650c_41fe_83a0_a65a0e442c50System.Compliance.AuthorityDocumentProjection
ID_c0dc1424_9570_4705_b7a9_64ae0e145233OECD / World Bank Technology Risk ChecklistID_c0dc1424_9570_4705_b7a9_64ae0e145233System.Compliance.AuthorityDocumentProjection
ID_c16214d4_30df_4149_a523_6557f4e2f956FIPS Pub 199, Standards for Security Categorization of Federal Information and Information SystemsID_c16214d4_30df_4149_a523_6557f4e2f956System.Compliance.AuthorityDocumentProjection
ID_c16ba030_fd6b_45cf_8dd1_9815e4a7db76NSA Guide to the Secure Configuration of Solaris 9ID_c16ba030_fd6b_45cf_8dd1_9815e4a7db76System.Compliance.AuthorityDocumentProjection
ID_c26dfa4c_676e_44d4_863c_d50225d67b12Information Technology Security Evaluation Manual (ITSEM)ID_c26dfa4c_676e_44d4_863c_d50225d67b12System.Compliance.AuthorityDocumentProjection
ID_c2abb092_a2a8_4ff8_97fd_45f33dd3d706Iowa Code Annotated § 715C Personal Information Security Breach ProtectionID_c2abb092_a2a8_4ff8_97fd_45f33dd3d706System.Compliance.AuthorityDocumentProjection
ID_c409f8c0_9bc7_4a6c_b84a_1e9f5728aeebFTC Electronic Signatures in Global and National Commerce Act (ESIGN)ID_c409f8c0_9bc7_4a6c_b84a_1e9f5728aeebSystem.Compliance.AuthorityDocumentProjection
ID_c4e00d4c_d76e_430e_a856_71fa507c5d8521 CFR Part 11, Electronic Records; Electronic SignaturesID_c4e00d4c_d76e_430e_a856_71fa507c5d85System.Compliance.AuthorityDocumentProjection
ID_c50b08ab_8747_4c87_b2b9_9dc8d2aaeba8Army Regulation 380-19: Information Systems SecurityID_c50b08ab_8747_4c87_b2b9_9dc8d2aaeba8System.Compliance.AuthorityDocumentProjection
ID_c7c426bf_6513_4c5a_bec7_da2b914a04ae49 CFR Part 1542, Airport SecurityID_c7c426bf_6513_4c5a_bec7_da2b914a04aeSystem.Compliance.AuthorityDocumentProjection
ID_c830ae1d_d5ba_4735_8fc7_1dec2d854958FFIEC IT Examination Handbook – Development and AcquisitionID_c830ae1d_d5ba_4735_8fc7_1dec2d854958System.Compliance.AuthorityDocumentProjection
ID_c9b14256_e8b8_4cf5_852e_b466d75965ecComputer Security Incident HandlingID_c9b14256_e8b8_4cf5_852e_b466d75965ecSystem.Compliance.AuthorityDocumentProjection
ID_cadbc19d_5cb5_4919_8b4c_74f176c73058FFIEC IT Examination Handbook – ManagementID_cadbc19d_5cb5_4919_8b4c_74f176c73058System.Compliance.AuthorityDocumentProjection
ID_cc404fc5_098b_442e_8c56_aa46579d1365American Recovery and Reinvestment Act of 2009, Division A Title XIII Health Information TechnologyID_cc404fc5_098b_442e_8c56_aa46579d1365System.Compliance.AuthorityDocumentProjection
ID_cd7c54bd_d229_4a2e_bcfc_dca9fcb3459dSecurity Development LifecycleID_cd7c54bd_d229_4a2e_bcfc_dca9fcb3459dSystem.Compliance.AuthorityDocumentProjection
ID_ce77e3f9_7a2e_4cce_bd2d_f557529c5092Canada Privacy ActID_ce77e3f9_7a2e_4cce_bd2d_f557529c5092System.Compliance.AuthorityDocumentProjection
ID_ce7c58d6_5bcb_48b5_bed2_f42890ceb271Health Insurance Portability and Accountability Act of 1996 (HIPAA), Public Law 104-191, 104th CongressID_ce7c58d6_5bcb_48b5_bed2_f42890ceb271System.Compliance.AuthorityDocumentProjection
ID_ce9bee5b_2666_4b33_9d9d_50d17bd0d8d0Gramm-Leach-Bliley Act (GLB)ID_ce9bee5b_2666_4b33_9d9d_50d17bd0d8d0System.Compliance.AuthorityDocumentProjection
ID_cf58bb16_4c98_47fe_b9e6_97a57fa5df5cGuidelines on Firewalls and Firewall Policy, NIST SP 800-41ID_cf58bb16_4c98_47fe_b9e6_97a57fa5df5cSystem.Compliance.AuthorityDocumentProjection
ID_cf59de8e_5deb_44c7_ad32_b33c6df453ddDefense Information Systems Agency UNIX Security Technical Implementation Guide Version 5 Release 1ID_cf59de8e_5deb_44c7_ad32_b33c6df453ddSystem.Compliance.AuthorityDocumentProjection
ID_cf761a7e_62a6_49da_9c61_d40838f8a03eJapan Handbook Concerning Protection Of Personal DataID_cf761a7e_62a6_49da_9c61_d40838f8a03eSystem.Compliance.AuthorityDocumentProjection
ID_cfb23a8f_7969_41b7_b32d_b12591d9d5f1German Federal Data Protection ActID_cfb23a8f_7969_41b7_b32d_b12591d9d5f1System.Compliance.AuthorityDocumentProjection
ID_cfb93a98_5890_4a3f_bc61_007ca7272463The Cloud Security Alliance Controls MatrixID_cfb93a98_5890_4a3f_bc61_007ca7272463System.Compliance.AuthorityDocumentProjection
ID_d06e1b4f_9fb0_456a_8fd6_f5e17330f54dIIA Global Technology Audit Guide (GTAG) 6: Managing and Auditing IT VulnerabilitiesID_d06e1b4f_9fb0_456a_8fd6_f5e17330f54dSystem.Compliance.AuthorityDocumentProjection
ID_d088989f_f504_4a7d_b111_ad4488cc0571BBBOnline Code of Online Business PracticesID_d088989f_f504_4a7d_b111_ad4488cc0571System.Compliance.AuthorityDocumentProjection
ID_d0e0cd47_e65d_4cef_8966_f905ddf6cfbd17 CFR Part 240.16a-3, Reporting Transactions and HoldingsID_d0e0cd47_e65d_4cef_8966_f905ddf6cfbdSystem.Compliance.AuthorityDocumentProjection
ID_d285bfeb_1e91_46ac_b5ad_6b859608612fPayment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Application Connected to Internet, No Electronic Cardholder Data StorageID_d285bfeb_1e91_46ac_b5ad_6b859608612fSystem.Compliance.AuthorityDocumentProjection
ID_d29cad4d_9303_4688_a7a4_88f19bf5dc55IRS Revenue Procedure: Record retention: automatic data processing, 98-25ID_d29cad4d_9303_4688_a7a4_88f19bf5dc55System.Compliance.AuthorityDocumentProjection
ID_d3255745_3b05_4298_b993_cc56f9e8d002ISO/IEC 18045 Common Methodology for Information Technology Security EvaluationID_d3255745_3b05_4298_b993_cc56f9e8d002System.Compliance.AuthorityDocumentProjection
ID_d396abb4_002b_491d_9633_e7e101afafdaPatient Safety And Quality Improvement Act Of 2005, Public Law 109-41, 109th CongressID_d396abb4_002b_491d_9633_e7e101afafdaSystem.Compliance.AuthorityDocumentProjection
ID_d3f48347_f739_4cc6_883b_709629311bc9Tennessee Security Breach Notification, TN SB 2220ID_d3f48347_f739_4cc6_883b_709629311bc9System.Compliance.AuthorityDocumentProjection
ID_d5756b8f_e477_4cf0_901b_cca2f7a32d5eNASD ManualID_d5756b8f_e477_4cf0_901b_cca2f7a32d5eSystem.Compliance.AuthorityDocumentProjection
ID_d6755e6b_3d89_48e1_aad9_f200aa400f4cSwedish Code of Corporate Governance; A Proposal by the Code GroupID_d6755e6b_3d89_48e1_aad9_f200aa400f4cSystem.Compliance.AuthorityDocumentProjection
ID_d83ba825_5d1a_4b94_a359_eaa0a8693da4Payment Card Industry (PCI) Data Security Standard (DSS) and Payment Application Data Security Standard (PA-DSS) Glossary of Terms, Abbreviations, and AcronymsID_d83ba825_5d1a_4b94_a359_eaa0a8693da4System.Compliance.AuthorityDocumentProjection
ID_d8e536dd_afde_4357_b501_8dd7301f942fDistrict of Columbia (Washington DC)ID_d8e536dd_afde_4357_b501_8dd7301f942fSystem.Compliance.AuthorityDocumentProjection
ID_d9a15d68_53b0_4d7f_8970_54421c5441daIIA Global Technology Audit Guide (GTAG) 10: Business Continuity ManagementID_d9a15d68_53b0_4d7f_8970_54421c5441daSystem.Compliance.AuthorityDocumentProjection
ID_da19ef6b_ad15_4ae0_b29f_2c685abd9f6fDenmark Act on Competitive Conditions and Consumer InterestsID_da19ef6b_ad15_4ae0_b29f_2c685abd9f6fSystem.Compliance.AuthorityDocumentProjection
ID_da4d1095_2ec2_4519_b6e6_079713e2953e12 CFR Part 748, NCUA Guidelines for Safeguarding Member InformationID_da4d1095_2ec2_4519_b6e6_079713e2953eSystem.Compliance.AuthorityDocumentProjection
ID_da567b3d_0802_4edc_9377_d91af71a665dSecurity Metrics Guide for Information Technology Systems, NIST SP 800-55ID_da567b3d_0802_4edc_9377_d91af71a665dSystem.Compliance.AuthorityDocumentProjection
ID_da740818_09a7_432a_94e6_9da663f9a921Corporate Governance in listed Companies – Clause 49 of the Listing AgreementID_da740818_09a7_432a_94e6_9da663f9a921System.Compliance.AuthorityDocumentProjection
ID_db191d42_24c5_4eb3_be10_0950a414c13cBank Secrecy Act (aka The Currency and Foreign Transaction Reporting Act)ID_db191d42_24c5_4eb3_be10_0950a414c13cSystem.Compliance.AuthorityDocumentProjection
ID_db641349_ad2f_44de_8bd1_ba8386137e9fKorea Act on Promotion of Information & Communication Network Utilization and Information Protection, etc.ID_db641349_ad2f_44de_8bd1_ba8386137e9fSystem.Compliance.AuthorityDocumentProjection
ID_db7f78d4_3f57_48cd_9ced_53e255978463Oklahoma State Law Disclosure of breach of security of computerized personal information, §74-3113.1ID_db7f78d4_3f57_48cd_9ced_53e255978463System.Compliance.AuthorityDocumentProjection
ID_dc104c64_1cb0_4345_bb86_758d15644239Information Technology Security Evaluation Criteria (ITSEC)ID_dc104c64_1cb0_4345_bb86_758d15644239System.Compliance.AuthorityDocumentProjection
ID_dcc878fc_39dc_42b4_aa7d_a5a82bc22100Oklahoma Administrative Code Title 375 Chapter 40 Oklahoma Identity Theft Passport Program § 375:40-1-1 thru § 375:40-1-11ID_dcc878fc_39dc_42b4_aa7d_a5a82bc22100System.Compliance.AuthorityDocumentProjection
ID_de09a7f1_8f41_42c2_b082_f42da19d9dfeConsumer Interests in the Telecommunications Market, Act No. 661ID_de09a7f1_8f41_42c2_b082_f42da19d9dfeSystem.Compliance.AuthorityDocumentProjection
ID_de6b479a_d520_412e_89ea_07e521f0d06aFair Credit Reporting Act (FCRA)ID_de6b479a_d520_412e_89ea_07e521f0d06aSystem.Compliance.AuthorityDocumentProjection
ID_dea6f3d5_230b_46c6_abc6_4a5b6edc8c07IIA Global Technology Audit Guide (GTAG) 3: Continuous Auditing: Implications for Assurance, Monitoring, and Risk AssessmentID_dea6f3d5_230b_46c6_abc6_4a5b6edc8c07System.Compliance.AuthorityDocumentProjection
ID_df732490_32fc_4ab6_b833_cc468f1e8669Lithuania Law on Legal Protection of Personal DataID_df732490_32fc_4ab6_b833_cc468f1e8669System.Compliance.AuthorityDocumentProjection
ID_e07f9843_1c76_42d2_a15f_e6e500749cafColorado Revised Statutes Title 16 Article 5 Section 103 Identity theft victims - definitionsID_e07f9843_1c76_42d2_a15f_e6e500749cafSystem.Compliance.AuthorityDocumentProjection
ID_e0a79f07_34f9_4d2b_b3bb_d167ae4ea2d1PAS 77 IT Service Continuity Management. Code of PracticeID_e0a79f07_34f9_4d2b_b3bb_d167ae4ea2d1System.Compliance.AuthorityDocumentProjection
ID_e0bbc338_2a08_46aa_b411_953def84ba3dTransportation Security Administration (TSA) Security Guidelines for General Aviation Airports, Information Publication A-001, May 2004ID_e0bbc338_2a08_46aa_b411_953def84ba3dSystem.Compliance.AuthorityDocumentProjection
ID_e12863d5_4cec_45a9_b31d_a0260baccf4517 CFR Parts 210, 228, 229 and 240, Amendments to Rules Regarding Management's Report on Internal Control Over Financial Reporting; Final RuleID_e12863d5_4cec_45a9_b31d_a0260baccf45System.Compliance.AuthorityDocumentProjection
ID_e201fd85_10c7_4be0_8efd_aa163a2e104c6 CFR Part 27, Chemical Facility Anti-Terrorism Standards (CFATS), Department of Homeland SecurityID_e201fd85_10c7_4be0_8efd_aa163a2e104cSystem.Compliance.AuthorityDocumentProjection
ID_e220424a_8e61_4de3_b5d0_7469f0f569faISO/IEC 13335-4 Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguardsID_e220424a_8e61_4de3_b5d0_7469f0f569faSystem.Compliance.AuthorityDocumentProjection
ID_e3e84576_b6bc_4b64_9ba0_8b70348280caKansas Statutes Chapter 50, Article 7a Protection Of Consumer InformationID_e3e84576_b6bc_4b64_9ba0_8b70348280caSystem.Compliance.AuthorityDocumentProjection
ID_e4d91409_2c18_4950_943c_a6e13ebf65d4Security Self-Assessment Guide, NIST SP 800-26ID_e4d91409_2c18_4950_943c_a6e13ebf65d4System.Compliance.AuthorityDocumentProjection
ID_e50b2f1a_be98_487c_a748_8320855a323aAICPA/CICA Privacy FrameworkID_e50b2f1a_be98_487c_a748_8320855a323aSystem.Compliance.AuthorityDocumentProjection
ID_e57ba67f_c270_464e_9ccf_b9172d4ec5dbUK Data Protection Act of 1998ID_e57ba67f_c270_464e_9ccf_b9172d4ec5dbSystem.Compliance.AuthorityDocumentProjection
ID_e5dbb4c1_5bd5_4c36_84ce_df6ca60e1a95New York State General Business Law Chapter 20, Article 39-F, § 899-aaID_e5dbb4c1_5bd5_4c36_84ce_df6ca60e1a95System.Compliance.AuthorityDocumentProjection
ID_e7d981f1_4fd6_4558_a9bb_3e2a8628db7eNorth American Electric Reliability Corporation Critical Infrastructure Protection Cyber Security StandardsID_e7d981f1_4fd6_4558_a9bb_3e2a8628db7eSystem.Compliance.AuthorityDocumentProjection
ID_e830ae30_08dc_49ac_82a6_0c6e1b75702fOhio Revised Code Title XIII Chapter 1347 § 1347.12 Agency disclosure of security breach of computerized personal information dataID_e830ae30_08dc_49ac_82a6_0c6e1b75702fSystem.Compliance.AuthorityDocumentProjection
ID_e9821dd8_e1ab_4f75_9ca4_db3e7e548f86Protection of Assets Manual, ASIS InternationalID_e9821dd8_e1ab_4f75_9ca4_db3e7e548f86System.Compliance.AuthorityDocumentProjection
ID_e98e3730_47cd_4243_ae69_cf1ce55938d9OMB Circular A-123 Management’s Responsibility for Internal ControlID_e98e3730_47cd_4243_ae69_cf1ce55938d9System.Compliance.AuthorityDocumentProjection
ID_e9f46e50_82a7_4364_a0b6_f2249c19bd29System Security Plan (SSP) ProcedureID_e9f46e50_82a7_4364_a0b6_f2249c19bd29System.Compliance.AuthorityDocumentProjection
ID_ed5ec3c5_5e40_4408_9bf3_cb09f5b1e79dAppendix 1 Correspondence of the System Management Standards – Supplementary Edition to other standardsID_ed5ec3c5_5e40_4408_9bf3_cb09f5b1e79dSystem.Compliance.AuthorityDocumentProjection
ID_ededdaa2_f1fc_4d48_a39e_5c082dac0c8916 CFR Part 312, Children's Online Privacy Protection RuleID_ededdaa2_f1fc_4d48_a39e_5c082dac0c89System.Compliance.AuthorityDocumentProjection
ID_f0ed1cfa_9239_4f1f_8ca4_06c7ca3ae43aJalisco (Civil Code of the State of Jalisco (Article 40 Bis 1 to Article 40 Bis 39)ID_f0ed1cfa_9239_4f1f_8ca4_06c7ca3ae43aSystem.Compliance.AuthorityDocumentProjection
ID_f142c947_000e_4d7a_9bc8_fdb65fadda6aFDCC Windows IE7 SCAP content using OVAL (fdcc-ie7-oval.xml, fdcc-ie7-patches.xml)ID_f142c947_000e_4d7a_9bc8_fdb65fadda6aSystem.Compliance.AuthorityDocumentProjection
ID_f1536af9_d46c_458a_98d1_3d0927a66c46ISO/IEC 24762 Information technology — Security techniques — Guidelines for information and communications technology disaster recovery servicesID_f1536af9_d46c_458a_98d1_3d0927a66c46System.Compliance.AuthorityDocumentProjection
ID_f16c9037_dc92_4057_b780_9832ba8f974fFinancial Reporting Council, Combined Code on Corporate GovernanceID_f16c9037_dc92_4057_b780_9832ba8f974fSystem.Compliance.AuthorityDocumentProjection
ID_f172d7ec_1e61_4aae_a515_57521afb2b8b5 USC § 552a, Records maintained on individuals (Privacy Act of 1974)ID_f172d7ec_1e61_4aae_a515_57521afb2b8bSystem.Compliance.AuthorityDocumentProjection
ID_f1e4f657_edb9_45fc_88eb_fba16b89f188NYSE Listed Company ManualID_f1e4f657_edb9_45fc_88eb_fba16b89f188System.Compliance.AuthorityDocumentProjection
ID_f321498b_de9b_45bb_991b_ca4a3ea47e6fArizona State Law 44-7501. Notification of breach of security systemID_f321498b_de9b_45bb_991b_ca4a3ea47e6fSystem.Compliance.AuthorityDocumentProjection
ID_f4e1a816_35a4_46d4_8131_a9b33a095846ISACA Cross-Border Privacy Impact AssessmentID_f4e1a816_35a4_46d4_8131_a9b33a095846System.Compliance.AuthorityDocumentProjection
ID_f5481109_87a0_413c_905b_80172b7a363710 CFR Part 73.54, Protection of digital computer and communication systems and networksID_f5481109_87a0_413c_905b_80172b7a3637System.Compliance.AuthorityDocumentProjection
ID_f5629b99_7d20_4884_b3ae_028398a3ab8dRecommended Security Controls for Federal Information Systems, NIST SP 800-53ID_f5629b99_7d20_4884_b3ae_028398a3ab8dSystem.Compliance.AuthorityDocumentProjection
ID_f5b0064d_922e_4c45_8c4d_1e0288b3a71bDISA Windows XP Security ChecklistID_f5b0064d_922e_4c45_8c4d_1e0288b3a71bSystem.Compliance.AuthorityDocumentProjection
ID_f64f9ed4_7c2c_4e1b_883d_3f539387cdd1FFIEC IT Examination Handbook – Retail Payment SystemsID_f64f9ed4_7c2c_4e1b_883d_3f539387cdd1System.Compliance.AuthorityDocumentProjection
ID_f66ae455_cdff_4b65_a92b_98902e3e5fdeArkansas Code Title 4 Business and Commercial Law Subtitle 7 Consumer Protection, Chapter 110 Personal Information, §§ 4-110-103 thru 4 -110-105, Personal Information Protection ActID_f66ae455_cdff_4b65_a92b_98902e3e5fdeSystem.Compliance.AuthorityDocumentProjection
ID_f73e3142_abd6_4285_b41b_e0c0559f63d4Guide for Mapping Types of Information and Information Systems to Security Categories, NIST SP 800-60ID_f73e3142_abd6_4285_b41b_e0c0559f63d4System.Compliance.AuthorityDocumentProjection
ID_f7c85921_161e_4632_8667_c8420425efb4New Hampshire Statute Title XXXI, Chapter 359-C Right to Privacy, Notice of Security BreachID_f7c85921_161e_4632_8667_c8420425efb4System.Compliance.AuthorityDocumentProjection
ID_f7f41488_4c44_4d05_ab34_91bb9e9f509aConnecticut Public Act 08-167, An Act Concerning the Confidentiality of Social Security NumbersID_f7f41488_4c44_4d05_ab34_91bb9e9f509aSystem.Compliance.AuthorityDocumentProjection
ID_f8a2e274_f22f_449f_93fc_a7e5e55dced7Appendix of OCC 12 CFR Part 30, Safety and Soundness StandardsID_f8a2e274_f22f_449f_93fc_a7e5e55dced7System.Compliance.AuthorityDocumentProjection
ID_f9595ffe_49d4_4aba_8a63_3ce1615e9b54Cable Communications Privacy Act Title 47 § 551ID_f9595ffe_49d4_4aba_8a63_3ce1615e9b54System.Compliance.AuthorityDocumentProjection
ID_f98edfc1_fd4e_4296_82ac_3e08b6c36b00West Virginia Code Chapter 46A Article 2A Breach of Security of Consumer Information § 46A-2A-101 thru § 46A-2A-105ID_f98edfc1_fd4e_4296_82ac_3e08b6c36b00System.Compliance.AuthorityDocumentProjection
ID_f9b7e432_9180_406b_9a57_fbd23a00d194New York Disposal of Records Containing Personal Identifying Information NY CLS Gen Bus § 399-hID_f9b7e432_9180_406b_9a57_fbd23a00d194System.Compliance.AuthorityDocumentProjection
ID_fb48b9a4_69c6_4d31_87ee_21165b1716d945 CFR Parts 160, 162, and 164, Health Insurance Reform: Security StandardsID_fb48b9a4_69c6_4d31_87ee_21165b1716d9System.Compliance.AuthorityDocumentProjection
ID_fb7bb95e_0291_450f_a016_d0d083b769ceFFIEC IT Examination Handbook – Wholesale Payment SystemsID_fb7bb95e_0291_450f_a016_d0d083b769ceSystem.Compliance.AuthorityDocumentProjection
ID_fd56f1f3_bc86_4c6f_9911_4b1353d34c43Appendix III to OMB Circular No. A-130: Security of Federal Automated Information ResourcesID_fd56f1f3_bc86_4c6f_9911_4b1353d34c43System.Compliance.AuthorityDocumentProjection
ID_fd7d9a55_9611_461c_afee_8187423e4aefDefense Information Systems Agency UNISYS Security Technical Implementation Guide Version 7 Release 2ID_fd7d9a55_9611_461c_afee_8187423e4aefSystem.Compliance.AuthorityDocumentProjection
ID_fe2e5fee_51a1_4cb8_bfa4_0ee5b688090eNorth Carolina Statutes Chapter 75 Article 2A. Identity Theft Protection Act § 75-60 through § 75-66ID_fe2e5fee_51a1_4cb8_bfa4_0ee5b688090eSystem.Compliance.AuthorityDocumentProjection
ID_feb82798_96ca_41ed_bd2e_87914af55f82Finland Personal Data Protection Act (523/1999)ID_feb82798_96ca_41ed_bd2e_87914af55f82System.Compliance.AuthorityDocumentProjection
ID_ff88e666_7dc9_4843_9cac_eb81ed2a80b5The King Committee on Corporate Governance, Executive Summary of the King Report 2002ID_ff88e666_7dc9_4843_9cac_eb81ed2a80b5System.Compliance.AuthorityDocumentProjection
ID_ffa515f8_ca7e_40ad_b79b_898cfb7e56b1Federal Information System Controls Audit Manual (FISCAM)ID_ffa515f8_ca7e_40ad_b79b_898cfb7e56b1System.Compliance.AuthorityDocumentProjection
ID_fff38af7_fcb7_486a_b6cf_645079168d8bVermont Relating to Identity Theft , VT HB 327ID_fff38af7_fcb7_486a_b6cf_645079168d8bSystem.Compliance.AuthorityDocumentProjection