| DisplayName | ID | Type |
| National Incident Management System (NIMS), Department of Homeland Security, December 2008 | ID_00ede05b_f9d9_4f2d_8038_5905b4280443 | System.Compliance.AuthorityDocumentProjection |
| Korea Act on the Protection of Personal Information Maintained by Public Agencies 1994 | ID_01b0b3df_f7cc_481e_92e5_385efb9fbbc7 | System.Compliance.AuthorityDocumentProjection |
| BIS Sound Practices for the Management and Supervision of Operational Risk | ID_02c9fb94_ba1b_4900_98a1_9f999bd38af1 | System.Compliance.AuthorityDocumentProjection |
| Utah Protection of Personal Information Act, Utah Code § Title 13-44. Protection of Personal Information Act | ID_031b35ad_9e46_4d68_962c_3d1f05d6c804 | System.Compliance.AuthorityDocumentProjection |
| Federal Information Security Management Act | ID_0345f34a_aa1c_4914_919c_a9f423250859 | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 20000-1 Information technology - Service Management Part 1 | ID_03f2bdbe_d7fa_4c20_a22a_13aa2a90736b | System.Compliance.AuthorityDocumentProjection |
| Code of Alabama, Article 10 The Consumer Identity Protection Act, § 13A-8-190 thru § 13A-8-201 | ID_04005d6e_dbba_40ed_8bf0_8172390fc462 | System.Compliance.AuthorityDocumentProjection |
| 42 CFR Parts 412, 413, 422 et al., Medicare and Medicaid Programs; Electronic Health Record Incentive Program | ID_048247f6_c742_4e1d_b45d_8709bbe073c0 | System.Compliance.AuthorityDocumentProjection |
| House Legislative Counsel's Manual on Drafting Style | ID_049ebce4_c204_4b6c_b450_21d777f325bf | System.Compliance.AuthorityDocumentProjection |
| IIA Global Technology Audit Guide (GTAG) 9: Identity and Access Management | ID_056c1c52_4e2e_4ab9_97e4_8f55270094b7 | System.Compliance.AuthorityDocumentProjection |
| PCI DSS (Payment Card Industry Data Security Standard) | ID_05f66dc9_a2f3_49ff_a6cd_24e59f231247 | System.Compliance.AuthorityDocumentProjection |
| Greece Law Protection of personal data and privacy in electronic telecommunications sector (Law 3471) | ID_07723250_61aa_4eb8_9953_6e395fcd0889 | System.Compliance.AuthorityDocumentProjection |
| AICPA Suitable Trust Services Principles and Criteria | ID_08ac9938_6259_4290_a10a_106e41007f7d | System.Compliance.AuthorityDocumentProjection |
| Italy Personal Data Protection Code | ID_08edb7b8_abe4_439b_82bd_f6d473b3b432 | System.Compliance.AuthorityDocumentProjection |
| New Zealand Privacy Act 1993 | ID_092f7467_2a1e_4158_a777_13451dc1fe7f | System.Compliance.AuthorityDocumentProjection |
| Multi-Function Device (MFD) and Printer Checklist for Sharing Peripherals Across the Network Security Technical Implementation Guide | ID_09ed39b2_52d7_427b_a8c9_ec830259c92a | System.Compliance.AuthorityDocumentProjection |
| Responsible Care Security Code of Management Practices, American Chemistry Council | ID_0af25a96_d712_4054_bb0b_1d014e7ded9d | System.Compliance.AuthorityDocumentProjection |
| US Export Administration Regulations Database | ID_0c58cfe2_4e9f_43cf_8f03_fe4778ddda45 | System.Compliance.AuthorityDocumentProjection |
| Iowa Code Annotated § 614.4a | ID_0e05fb33_2079_4d6d_8111_db30387fc53b | System.Compliance.AuthorityDocumentProjection |
| Maine Legislative Drafting Manual | ID_0e7e279c_0e54_40d8_8e1e_38b29d3671d5 | System.Compliance.AuthorityDocumentProjection |
| IIA Global Technology Audit Guide (GTAG) 2:Change and Patch Management Controls: Critical for Organizational Success | ID_0f2e36a8_b6c8_4536_ad8c_5ddad9db62a3 | System.Compliance.AuthorityDocumentProjection |
| Hungary Protection of Personal Data and Disclosure of Data of Public Interest | ID_0f7b2a07_b78b_4ae4_a23a_1811ca1cacda | System.Compliance.AuthorityDocumentProjection |
| Equal Credit Opportunity Act (Reg. B) | ID_10073211_9f40_400f_bc0b_6b8ffd414360 | System.Compliance.AuthorityDocumentProjection |
| Minnesota Statute § 13.055 State Agencies; Disclosure of Breach in Security | ID_1068f70b_5ce5_43f8_a160_1f3a44ac5eab | System.Compliance.AuthorityDocumentProjection |
| PCAOB Auditing Standard No. 5 | ID_109ccd97_a1d8_48e7_b06f_bb5941660a41 | System.Compliance.AuthorityDocumentProjection |
| The Cloud Security Alliance Controls Matrix | ID_121a01b1_41dd_4a63_ad5b_b5922c445613 | System.Compliance.AuthorityDocumentProjection |
| California OPP Recommended Practices on Notification of Security Breach | ID_12bac0e4_c0f3_40ac_90f1_2575683a1cd5 | System.Compliance.AuthorityDocumentProjection |
| US Department of Energy Cyber Security Program Media Clearing, Purging, and Destruction Guidance: DOE CIO Guidance CS-11 | ID_13afe3a6_26da_4841_b95c_a1074956ccba | System.Compliance.AuthorityDocumentProjection |
| Computer Fraud and Abuse Act | ID_140b89bb_817b_4830_a495_fd2ae44fe852 | System.Compliance.AuthorityDocumentProjection |
| OGC ITIL: Security Management | ID_15fe1bb8_fbbc_4156_9bcd_6cf3239c166f | System.Compliance.AuthorityDocumentProjection |
| Payment Card Industry (PCI) Payment Application Data Security Standard | ID_16dbf912_80df_40f1_9b43_898bb54e0011 | System.Compliance.AuthorityDocumentProjection |
| Turnbull Guidance on Internal Control, UK FRC | ID_17296f07_43df_42f5_bdf5_34c69e5bd82e | System.Compliance.AuthorityDocumentProjection |
| FFIEC IT Examination Handbook – Business Continuity Planning | ID_1986cec2_7685_4bb5_80e8_b8133226a7fd | System.Compliance.AuthorityDocumentProjection |
| California Civil Code Title 1.81 Customer Records §§ 1798.80-1798.84 | ID_19b209b8_8dfe_4fd9_a1ed_4d8d9649b0bb | System.Compliance.AuthorityDocumentProjection |
| 42 CFR Part 3, Patient Safety and Quality Improvements | ID_19e0d84a_c8d6_4876_994e_dfedcbc59daf | System.Compliance.AuthorityDocumentProjection |
| VISA CISP: What to Do If Compromised Visa Fraud Control and Investigation Procedures | ID_1a626c6b_b9d2_475e_a041_51e94e54a92f | System.Compliance.AuthorityDocumentProjection |
| Australia Spam Act | ID_1b3ab077_b6c5_4919_9a99_7d558fa0f92a | System.Compliance.AuthorityDocumentProjection |
| Korea Act Relating to Use and Protection of Credit Information | ID_1b5138c8_18f2_4d4a_88d1_e9b13bc4a9b4 | System.Compliance.AuthorityDocumentProjection |
| Argentina Personal Data Protection Act | ID_1c5f208e_d668_423c_a67c_58709a4c1981 | System.Compliance.AuthorityDocumentProjection |
| 17 CFR Part 240.17a-1, Recordkeeping rule for securities exchanges | ID_1c8f05f4_9599_4468_af5a_48de59e6ac8a | System.Compliance.AuthorityDocumentProjection |
| Guide to Protecting the Confidentiality of Personally Identifiable Information (PII), NIST SP 800-122 | ID_1d1d0d82_81db_41d3_9aa4_3c7fdbd14be3 | System.Compliance.AuthorityDocumentProjection |
| Australian Government ICT Security Manual (ACSI 33) | ID_1f08c2ed_169a_49b0_b481_efce064e91ce | System.Compliance.AuthorityDocumentProjection |
| Guide to Computer Security Log Management, NIST SP 800-92 | ID_1fb4f73c_6526_42f1_888c_4cd04b4a5f0f | System.Compliance.AuthorityDocumentProjection |
| AICPA Incident Response Plan: Template for Breach of Personal Information | ID_23a38da7_dffa_4f9a_b9bd_38960befb3f0 | System.Compliance.AuthorityDocumentProjection |
| Corporate Law Economic Reform Program (Audit Reform and Corporate Disclosure) Act 2004 | ID_23bf4549_1460_45b7_ab3c_d7f88d5c6243 | System.Compliance.AuthorityDocumentProjection |
| Corporate Information Security Working Group: Report of the best practices and metrics teams; subcommittee on technology, information policy, intergovernmental relations and the census; Government Reform Committee, United States House of Representatives | ID_23e039a6_36cd_4d35_933f_c916742c3e48 | System.Compliance.AuthorityDocumentProjection |
| Virginia Identity theft; penalty; restitution; victim assistance, VA HB 872 | ID_2401b40c_160a_44b4_8b6c_f0a8e86b82a3 | System.Compliance.AuthorityDocumentProjection |
| NISPOM - National Industrial Security Program Operating Manual (DoD 5220.22-M) February 26, 2006 | ID_24617dc7_5ac5_4717_80fc_b3d52a7bce0d | System.Compliance.AuthorityDocumentProjection |
| Contingency Planning Guide for Information Technology Systems, NIST SP 800-34 | ID_24b1ff92_8467_461e_9191_e07b03dbe9d1 | System.Compliance.AuthorityDocumentProjection |
| ISO 15489-1:2001, Information and Documentation: Records management: Part 1: General | ID_2502dd4e_34bb_457a_a6ee_d0bc20302d28 | System.Compliance.AuthorityDocumentProjection |
| Finland Act on the Protection of Privacy in Electronic Communications | ID_25213e89_67a5_413b_a8e1_4bca2eccedf2 | System.Compliance.AuthorityDocumentProjection |
| Texas Identity Theft Enforcement and Protection Act, TX SB 122 | ID_254b2a27_fa9d_4456_b8f2_1e1be151ba56 | System.Compliance.AuthorityDocumentProjection |
| Georgia Public employees; Fraud, Waste, and Abuse, GA HB 656 | ID_256fd10a_d718_471e_92e4_56d10300e53c | System.Compliance.AuthorityDocumentProjection |
| Illinois Compiled Statutes, Chapter 815, ILCS 530/Personal Information Protection Act. | ID_26683a6a_fcde_48c4_aad1_31c295551bae | System.Compliance.AuthorityDocumentProjection |
| Netherlands Personal Data Protection Act, Session 1999-2000 Nr.92 | ID_266846cf_2dec_4a73_bdba_4d5f7f9fd4be | System.Compliance.AuthorityDocumentProjection |
| Colorado Prohibiting Inclusion of Social Security Number, CO HB 04-1311 | ID_2752dce2_7b0b_4371_ad0d_260839fc117c | System.Compliance.AuthorityDocumentProjection |
| BS 25999-2, Business continuity management. Specification | ID_284634d2_02bc_4116_9928_ad0e1f61b0ee | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 13335-3 Information technology — Guidelines for the management of IT Security — Part 3: Techniques for the management of IT Security | ID_29712f98_2ee7_41fa_a4b9_9790bc1946ea | System.Compliance.AuthorityDocumentProjection |
| The Sarbanes-Oxley Act of 2002 (SOX) | ID_2b8cc4d5_6284_438e_afb0_ee7d3431a134 | System.Compliance.AuthorityDocumentProjection |
| California Civil Code Title 1.8 Personal Data Chapter 1 Information Practices Act of 1977 Article 7. Accounting of Disclosures §§ 1798.25-1798.29 | ID_2b936e31_0e25_481a_87a6_9ace272cf742 | System.Compliance.AuthorityDocumentProjection |
| Washington DC Consumer Personal Information Security Breach Notification Act of 2006 | ID_2ba83765_374b_4c76_8a59_61870ad14629 | System.Compliance.AuthorityDocumentProjection |
| FFIEC IT Examination Handbook – Outsourcing Technology Services | ID_2cc3707a_586e_47bd_821d_8135fb8ee8a7 | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 15408-3 Common Criteria for Information Technology Security Evaluation Part 3 | ID_2ce445b5_81f7_4b99_9c57_ed159a2eaac2 | System.Compliance.AuthorityDocumentProjection |
| Revised Code of Washington Title 19 Chapter 19.215 Disposal of personal information § 19.215.005 thru § 19.215.030 | ID_2dcb089d_66f2_4333_ae9d_b8c9229f768d | System.Compliance.AuthorityDocumentProjection |
| Louisiana Revised Statutes Title 51 §§ 3073-3074 Database Security Breach Notification Law | ID_2e7db6ae_ec84_45fe_b9df_a799e47c06ed | System.Compliance.AuthorityDocumentProjection |
| The GAIT Methodology | ID_2ee26367_80dc_41ae_b6e6_3a63872f1f2a | System.Compliance.AuthorityDocumentProjection |
| Microsoft Windows Vista Security Guide Appendix A: Security Group Policy Settings | ID_30ac5818_3756_4e75_aff2_9fe594c970df | System.Compliance.AuthorityDocumentProjection |
| ISO 15489-2: 2001, Information and Documentation: Records management: Part 2: Guidelines | ID_3146f6a4_1d30_4b67_9eab_32897b5b1d72 | System.Compliance.AuthorityDocumentProjection |
| Performance Measurement Guide for Information Security, NIST 800-55 | ID_314f0437_0bcc_4347_a57a_a7de7057811d | System.Compliance.AuthorityDocumentProjection |
| Slovak Republic Protection of Personal Data in Information Systems | ID_31c241de_bc16_465e_9068_c952d6090c5e | System.Compliance.AuthorityDocumentProjection |
| Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection of privacy in the electronic communications sector | ID_3273c4a7_c68d_42bd_aa20_cda5fbc79a4a | System.Compliance.AuthorityDocumentProjection |
| PCAOB Auditing Standard No. 3 | ID_3281a2f7_8337_4881_805c_5778edec5bcd | System.Compliance.AuthorityDocumentProjection |
| EU 8th Directive (European SOX) | ID_33093022_bf9a_43f8_bd75_470321945e59 | System.Compliance.AuthorityDocumentProjection |
| The Standard of Good Practice for Information Security | ID_33e53324_ff00_44eb_b0d6_a47e05539a3f | System.Compliance.AuthorityDocumentProjection |
| Federal Rules of Civil Procedure (2007) | ID_3428cb75_c8b1_4b22_8c5b_9f2c82695bc0 | System.Compliance.AuthorityDocumentProjection |
| Guidelines for Media Sanitization, NIST SP 800-88 | ID_3429a274_b707_403f_a3c6_49f0aa8c5b08 | System.Compliance.AuthorityDocumentProjection |
| 45 CFR Parts 160 and 164, Breach Notification for Unsecured Protected Health Information | ID_3430fd90_6250_4825_8e53_628bd86a0ebe | System.Compliance.AuthorityDocumentProjection |
| IRS Revenue Procedure: Retention of books and records, 97-22 | ID_343bc0c8_b4e7_4272_8e0b_9933728edbaf | System.Compliance.AuthorityDocumentProjection |
| IIA Global Technology Audit Guide (GTAG) 5: Managing and Auditing Privacy Risks | ID_347c5046_be7f_4f85_9e32_33c8130b9a73 | System.Compliance.AuthorityDocumentProjection |
| PCI Security Standards Council | ID_34a8306c_8bc3_46e4_a58f_f0c78eaf334a | System.Compliance.AuthorityDocumentProjection |
| 36 CFR Part 1194 Electronic and Information Technology Accessibility Standards | ID_34df3f00_de9e_4131_b7b2_3c20a1e741ea | System.Compliance.AuthorityDocumentProjection |
| 16 CFR Part 310, Amendments to the FTC Telemarketing Sales Rule | ID_35afddfd_2329_4e52_b832_ab71d55b0a4f | System.Compliance.AuthorityDocumentProjection |
| C-TPAT Supply Chain Security Best Practices Catalog | ID_360515cd_b456_4700_8c1a_b55ab19694a1 | System.Compliance.AuthorityDocumentProjection |
| The DIRKS Manual: A Strategic Approach to Managing Business Information | ID_373f78c0_1ec6_44a6_964b_37371cf00c0e | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 27002 Code of practice for information security management | ID_375b3d3a_ea0a_4cfa_a0a7_437df6d728f1 | System.Compliance.AuthorityDocumentProjection |
| The Sedona Principles Addressing Electronic Document Production | ID_379cd4ab_63e7_4039_ab12_53377196ee6a | System.Compliance.AuthorityDocumentProjection |
| Ohio Revised Code Title XIII Chapter 1349 § 1349.19 Private disclosure of security breach of computerized personal information data | ID_37c82344_f1db_4f7b_a176_b6523f1abcd8 | System.Compliance.AuthorityDocumentProjection |
| Wyoming Statute Title 40 Article 5 Breach of the security of the data system § 40-12-501 thru § 40-12-509 | ID_3869d367_9679_49eb_a665_9d2da7179761 | System.Compliance.AuthorityDocumentProjection |
| Colorado Disposal of Personal Identifying Documents C.R.S. 6-1-713 | ID_3925ed35_bc27_4a8f_9ae4_4f1520712618 | System.Compliance.AuthorityDocumentProjection |
| UN Guidelines for the Regulation of Computerized Personal Data Files (1990) | ID_3a0696c5_cd56_47e1_8580_6f20a90960d9 | System.Compliance.AuthorityDocumentProjection |
| Delaware Code TITLE 6 Commerce and Trade, Subtitle II Other Laws Relating to Commerce and Trade ,Chapter 12B. Computer Security Breaches, §§ 12B-101 thru 104 | ID_3be8f6fc_e09a_46f3_b54d_e155f2983cc9 | System.Compliance.AuthorityDocumentProjection |
| GAO/PCIE Financial Audit Manual (FAM) | ID_3c0849f0_94a9_4c30_b32a_b77a9d0e91e8 | System.Compliance.AuthorityDocumentProjection |
| South Carolina Code of Laws § 1-11-490 Breach of security of state agency data notification | ID_3c093c4b_c123_4c20_9922_af2eade747ce | System.Compliance.AuthorityDocumentProjection |
| Form I-129, Petition for a Nonimmigrant Worker | ID_3cf00872_cf29_4a5e_957a_c5876d224d7f | System.Compliance.AuthorityDocumentProjection |
| General Laws of Massachusetts, Part I, Title XV Chapter 93H, Security Breaches | ID_3e10a7ce_222b_4dd1_83b1_623ce2b4ff0d | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 27001 Information Security Management Systems - Requirements | ID_3efd6a14_d254_465b_9d25_e412b91cadf2 | System.Compliance.AuthorityDocumentProjection |
| CISWG Information Security Program Elements | ID_3f5ac13c_f511_4413_a86a_4e378115e244 | System.Compliance.AuthorityDocumentProjection |
| 12 CFR Part 205, Electronic Fund Transfers (Regulation E) | ID_3f6da061_1f2e_4750_a6be_210461fcab15 | System.Compliance.AuthorityDocumentProjection |
| Guidance for Protecting Building Environments from Airborne Chemical, Biological, or Radiological Attacks, NIOSH, May 2002, DHHS (NIOSH) Publication No. 2002-139 | ID_3f6f449b_276b_427a_be89_82904cda39e1 | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 13335-5 Information technology — Guidelines for the management of IT Security — Part 5: Management guidance on network security | ID_3f76b7b7_8747_4e88_85ae_c00fb14b3dd0 | System.Compliance.AuthorityDocumentProjection |
| NSA Guide to Securing Microsoft Windows 2000 Group Policy | ID_3fe22991_0d80_4025_a478_a6bbba9c918e | System.Compliance.AuthorityDocumentProjection |
| Puerto Rico Code Title 10 Subtitle 3 Chapter Citizen Information on Data Banks Security Act, 10 L.P.R.A. § 4051 | ID_3feb11a9_687f_411f_a348_de5cc50b21b4 | System.Compliance.AuthorityDocumentProjection |
| Colorado Consumer Credit Solicitation Protection, CO HB 04-1274 | ID_406881e7_a4d2_428e_9164_b656e9d8d1d3 | System.Compliance.AuthorityDocumentProjection |
| Securities Act of 1933 | ID_407dc32f_e77f_40d1_9222_ea8a795a50db | System.Compliance.AuthorityDocumentProjection |
| Nebraska Revised Statutes § 87-801 thru § 87-807, Data Protection and Consumer Notification of Data Security Breach Act of 2006 | ID_407f93f1_349f_469e_9067_52e4e41f0dc7 | System.Compliance.AuthorityDocumentProjection |
| Wisconsin Statute Chapter 134 Notice of unauthorized acquisition of personal information § 134.98 | ID_41286078_d69e_490e_92f5_2287a9f980fe | System.Compliance.AuthorityDocumentProjection |
| Montana Code § 45-6-332. Theft of identity | ID_412bbfb7_be1b_4600_af21_ec1c6efcce21 | System.Compliance.AuthorityDocumentProjection |
| Patient Protection and Affordable Care Act, Public Law 111-148, 111th Congress | ID_423b0330_1ed1_43f3_ab59_98eb786c85db | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 17799 Code of Practice for Information Security Management | ID_42b2a765_f685_411d_b940_2e703bad88d4 | System.Compliance.AuthorityDocumentProjection |
| Ireland Consolidated Data Protection Acts of 1988 and 2003 | ID_42ef4293_f14d_4e2c_88dc_e76f62c111f8 | System.Compliance.AuthorityDocumentProjection |
| Sweden Personal Data Act (1998:204) | ID_42ef7936_4261_4816_99d6_e801a887fbc7 | System.Compliance.AuthorityDocumentProjection |
| HIPAA HCFA Internet Security Policy | ID_44945ac3_f615_4bac_b81f_1239c1c80a14 | System.Compliance.AuthorityDocumentProjection |
| Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire A and Attestation of Compliance No Electronic Storage, Processing, or Transmission of Cardholder Data | ID_46746cf9_f1c3_4147_8022_b9f5dbe77fa7 | System.Compliance.AuthorityDocumentProjection |
| Idaho Code Title 28 Commercial Transactions, Chapter 51 Identity Theft | ID_475f992f_8645_4a12_b400_23fe19888cbd | System.Compliance.AuthorityDocumentProjection |
| North Dakota Century Code, CHAPTER 51-30 Notice of Security Breach For Personal Information | ID_484e4658_1550_4edf_af7e_132cee799f13 | System.Compliance.AuthorityDocumentProjection |
| Canadian Marketing Association Code of Ethics and Standards of Practice | ID_48ca3bd3_304c_4478_96d2_abc1bfaa9504 | System.Compliance.AuthorityDocumentProjection |
| Form and Style Manual for Legislative Measures | ID_49bc3506_a44c_435c_a583_ff260a55dedd | System.Compliance.AuthorityDocumentProjection |
| Montana Code § 30-14-1701 thru § 30-14-1705 and § 30-14-1721 thru § 30-14-1722; Protection of individual privacy and to impede identity theft as prohibited by § 45-6-332 | ID_4a06205e_d782_46a6_b0dd_9271a7334833 | System.Compliance.AuthorityDocumentProjection |
| Australia Spam Act 2003: A practical guide for business | ID_4bdf924e_314c_47ff_a769_caad60d5ffa8 | System.Compliance.AuthorityDocumentProjection |
| Payment Card Industry (PCI) Data Security Standard 1.2.1, Requirements and Security Assessment Procedures | ID_4c75b739_ed52_476a_be24_36e4021cff37 | System.Compliance.AuthorityDocumentProjection |
| SAS 109, Understanding the Entity and Its Environment and Assessing the Risks of Material Misstatement | ID_4d10f5c4_ab6c_48e2_823d_c4631da14bbc | System.Compliance.AuthorityDocumentProjection |
| DISA WIRELESS SECURITY CHECKLIST, Version 5, Release 2.2 | ID_4ef1422c_5621_429b_8b29_f58c527ca280 | System.Compliance.AuthorityDocumentProjection |
| 16 CFR Part 314, Standards for Safeguarding Customer Information | ID_4f0e2211_99ad_4bd8_a6e9_ee4b11f9a095 | System.Compliance.AuthorityDocumentProjection |
| Austria Telecommunications Act | ID_4f31efcd_489d_4075_9b68_e7c825624b48 | System.Compliance.AuthorityDocumentProjection |
| Wisconsin Act 138 Notice of unauthorized acquisition of personal information | ID_4fb4de33_55d6_43f9_9c9a_c6782cb6e01d | System.Compliance.AuthorityDocumentProjection |
| Visa Data Field Encryption | ID_5218c02f_4283_4760_ae56_348cfa7da67b | System.Compliance.AuthorityDocumentProjection |
| 16 CFR Part 310, Telemarketing Sales Rule (TSR) | ID_53d77f16_34b5_4cd4_bae6_684e9388484c | System.Compliance.AuthorityDocumentProjection |
| IIA Global Technology Audit Guide (GTAG) 1: Information Technology Controls | ID_5409427e_7a5d_4333_9c06_9b555ffd1833 | System.Compliance.AuthorityDocumentProjection |
| Guidelines on Cell Phone and PDA Security, NIST SP 800-124 | ID_556d03db_a2cf_41ad_aadf_e8c145d10ffa | System.Compliance.AuthorityDocumentProjection |
| NSA Guide to Security Microsoft Windows XP | ID_56338405_846a_4156_a1a9_dd2d0b4fbffc | System.Compliance.AuthorityDocumentProjection |
| Payment Card Industry Self-Assessment Questionnaire A and Attestation of Compliance No Electronic St | ID_56f261ca_bda2_47ff_8530_1a833c841f1e | System.Compliance.AuthorityDocumentProjection |
| FFIEC IT Examination Handbook – Operations | ID_57e7e09c_6192_4e52_a179_761c7feaab20 | System.Compliance.AuthorityDocumentProjection |
| MasterCard Electronic Commerce Security Architecture Best Practices | ID_5817537e_3191_4c4e_a737_b46a75ad832b | System.Compliance.AuthorityDocumentProjection |
| FIPS Pub 200, Minimum Security Requirements for Federal Information and Information Systems | ID_5862fc92_ed3b_4a2c_bd58_e149faf226ca | System.Compliance.AuthorityDocumentProjection |
| IT Baseline Protection Manual Standard Security Safeguards Germany | ID_59caedb1_9507_4e7b_97f6_3527d401eca7 | System.Compliance.AuthorityDocumentProjection |
| OGC ITIL: Service Delivery | ID_5c2b0630_c31b_45d0_bb2c_d0990deefbf1 | System.Compliance.AuthorityDocumentProjection |
| FTC FACT Act Red Flags Rule Template | ID_5cb98ca0_809a_4ad8_ae88_a820425338f7 | System.Compliance.AuthorityDocumentProjection |
| State Prohibitions on Marketing Practices using Medical Information (CA SB1633) | ID_5d03499d_8877_46cb_ac17_eb98fab181e2 | System.Compliance.AuthorityDocumentProjection |
| ACH (Automated Clearing House) Operating Rules OCC Bulletin 2004-58 | ID_5d8deea3_9f33_43bb_ab89_e69ea44ff2e4 | System.Compliance.AuthorityDocumentProjection |
| Vermont Statute Title 9 Chapter 62 Protection of Personal Information § 2430, § 2435, § 2440, § 2445 | ID_5f5f2cc5_75d9_440a_bf8f_42a110cf143d | System.Compliance.AuthorityDocumentProjection |
| Identity Theft Red Flags and Address Discrepancies Under the Fair and Accurate Credit Transactions Act of 2003 | ID_5fadb42d_df1f_4e8b_9ab8_17ce6ee68f07 | System.Compliance.AuthorityDocumentProjection |
| BS 25999-1, Business continuity management. Code of practice | ID_5fd03c43_7ec1_45c6_ba49_d84cbb99e659 | System.Compliance.AuthorityDocumentProjection |
| DOT Physical Security Survey Checklist | ID_5fff3bed_4456_4d4c_a611_75035f0da0d4 | System.Compliance.AuthorityDocumentProjection |
| Missouri Revised Statutes Chapter 407 Merchandising Practices § 407.1500 | ID_60047dbc_9f24_49d2_9eab_8b8b5add3c7f | System.Compliance.AuthorityDocumentProjection |
| Colima Personal Data Protection Law (Decree No. 356) | ID_631f8a0b_99b9_4960_a5e7_513d499a5eca | System.Compliance.AuthorityDocumentProjection |
| FIPS Pub 191, Guideline for the Analysis of Local Area Network (LAN) Security | ID_63c9d25b_add6_4a9b_a0a7_7dedc46c24d2 | System.Compliance.AuthorityDocumentProjection |
| France Data Processing, Data Files and Individual Liberties | ID_6442479a_7fb3_40a7_8fc7_6bc13a503123 | System.Compliance.AuthorityDocumentProjection |
| Connecticut law Concerning Nondisclosure of Private Tenant Information, CT HB 5184 | ID_64472a7e_8bb9_47a9_badd_ff270b69c3d6 | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 20000-2 Information technology - Service Management Part 2 | ID_64c77ed4_5f2e_47dd_95f8_784c0b8c338a | System.Compliance.AuthorityDocumentProjection |
| Texas Business and Commercial Code Title 11, Subtitle B, Chapter 521 Subchapter A § 521 | ID_64eea7a7_ace3_4905_9c95_75365523537c | System.Compliance.AuthorityDocumentProjection |
| California Civil Code § 1798.91 State Prohibitions on Marketing Practices using Medical Information | ID_6574dffa_f565_4a53_b062_33cc2c9ed7ea | System.Compliance.AuthorityDocumentProjection |
| TITLE 49, Subtitle VII - Aviation Programs | ID_673c5d8f_ec47_421f_9eff_799174f4951a | System.Compliance.AuthorityDocumentProjection |
| OECD Principles of Corporate Governance | ID_6908fe9b_6cab_42ca_a6ca_35ac04b4d205 | System.Compliance.AuthorityDocumentProjection |
| Iceland Protection of Privacy as regards the Processing of Personal Data | ID_69e9be7a_f049_428c_8e21_fdcbc437c1a5 | System.Compliance.AuthorityDocumentProjection |
| 18 USC § 2710, Wrongful disclosure of video tape rental or sale records | ID_6acdd08d_dd92_4ace_8537_4937f40de631 | System.Compliance.AuthorityDocumentProjection |
| Design Criteria Standard for Electronic Records Management Software Application, DOD 5015.2 | ID_6aee15c4_3ede_4c8a_96d9_7cb95d0adb6b | System.Compliance.AuthorityDocumentProjection |
| IRS Publication 1075: TAX INFORMATION SECURITY GUIDELINES FOR FEDERAL, STATE AND LOCAL AGENCIES AND ENTITIES; Safeguards for Protecting Federal Tax Returns and Return Information | ID_6bbb45a9_1e84_405b_9c17_1db2b4f52e8f | System.Compliance.AuthorityDocumentProjection |
| Minnesota Statute § 325E.61 Data Warehouses; Notice Required For Certain Disclosures | ID_6c8e3b94_884b_4d2a_bc6e_dc06519f146a | System.Compliance.AuthorityDocumentProjection |
| OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data | ID_6c9587c0_1a45_4201_98c1_f6514206c013 | System.Compliance.AuthorityDocumentProjection |
| Czech Republic Parliament | ID_6ca2c8f2_669a_4639_b26e_255ee17dc9ab | System.Compliance.AuthorityDocumentProjection |
| Rhode Island Security Breach Notification Law, RI HB 6191 | ID_6ce051d8_9ba6_46af_a157_079d41c17414 | System.Compliance.AuthorityDocumentProjection |
| MasterCard Wireless LANs - Security Risks and Guidelines | ID_6d08441c_aa54_4459_9cac_f3b618685721 | System.Compliance.AuthorityDocumentProjection |
| Rhode Island General Law Chapter 11-49.2 Identity Theft Protection § 11-49.2-1 thru § 11-49. 2-4 | ID_6e29cd1a_07de_4634_92c1_89fd97bda01a | System.Compliance.AuthorityDocumentProjection |
| Oregon Revised Statutes Chapter 646a § 646A.600 thru § 646A.624 Identity Theft Protection Act | ID_6e4c8e0e_ab89_403f_a8da_d7b68d1129d9 | System.Compliance.AuthorityDocumentProjection |
| India Information Technology Act (ITA-2000) | ID_6e549424_3b4d_4e95_8ece_f62e5610a66a | System.Compliance.AuthorityDocumentProjection |
| IIA Global Technology Audit Guide (GTAG) 4: Management of IT Auditing | ID_7081a018_da4a_4897_b465_c8cb15f62751 | System.Compliance.AuthorityDocumentProjection |
| Law of 2 August 2002 on the Protection of Persons with Regard to the Processing of Personal Data | ID_72047ff8_05f7_41ec_b60b_65c2b809c7d3 | System.Compliance.AuthorityDocumentProjection |
| Federal Risk and Authorization Management Program | ID_72343c2c_13f9_4990_aea4_316df0b37520 | System.Compliance.AuthorityDocumentProjection |
| Customs-Trade Partnership Against Terrorism (C-TPAT) Importer Security Criteria | ID_7256f089_d100_4eec_a6bc_4b7c4da412ab | System.Compliance.AuthorityDocumentProjection |
| Bosnia Law on Protection of Personal Data | ID_72849e71_6457_48d9_acea_376219924f71 | System.Compliance.AuthorityDocumentProjection |
| Controlling the Assault of Non-Solicited Pornography and Marketing Act of 2003 | ID_733eafb4_03cc_4533_99a8_8a599aec981e | System.Compliance.AuthorityDocumentProjection |
| CobiT | ID_745fcc11_8260_42fe_b606_eb67570aaefa | System.Compliance.AuthorityDocumentProjection |
| 21 CFR Part 820, Subchapter H - Medical Devices, Part 820 Quality System Regulation | ID_74aed273_8c36_482a_b387_bf1f9c804462 | System.Compliance.AuthorityDocumentProjection |
| ISSA Generally Accepted Information Security Principles (GAISP) | ID_74c2a82e_9771_4c2e_96a3_48ed20a2b1d9 | System.Compliance.AuthorityDocumentProjection |
| Microsoft Developer Network Security Glossary | ID_74d7450a_8aa7_4747_9636_c442f2c05851 | System.Compliance.AuthorityDocumentProjection |
| Poland Protection of Personal Data Act | ID_750f236e_8185_44d9_a8b4_a76a6eef5d9f | System.Compliance.AuthorityDocumentProjection |
| CODE OF CORPORATE GOVERNANCE 2005 | ID_7529560f_f94a_4261_a350_ab7167f197e4 | System.Compliance.AuthorityDocumentProjection |
| Hawaii Revised Statute § 487N. Security Breach of Personal Information | ID_76362127_5193_4cb4_af6f_89b3936c97de | System.Compliance.AuthorityDocumentProjection |
| Virginia Code Title 18.2 Chapter 6 Breach of personal information notification § 18.2-186.6 | ID_76f32415_7131_426f_a8ca_e5aa7a1038be | System.Compliance.AuthorityDocumentProjection |
| NIST SCAP Microsoft Internet Explorer Version 7 (fdcc-ie7-xccdf.xml) | ID_78c1f226_4694_46e2_9d19_0cf3f92d63f1 | System.Compliance.AuthorityDocumentProjection |
| Implementation Guide for OMB Circular A-123 Management’s Responsibility for Internal Control | ID_79979517_7e4c_4927_b5b4_c342cd39c3e4 | System.Compliance.AuthorityDocumentProjection |
| Massachusetts 201 CMR 17.00: Standards for The Protection of Personal Information of Residents of the Commonwealth of Massachusetts | ID_79a58c6a_e2c9_4cc3_8d6c_66d0cd8ba078 | System.Compliance.AuthorityDocumentProjection |
| Guanajuato Personal Data Protection Law | ID_79c804b2_8aab_4ab3_8c75_a8ee2395230d | System.Compliance.AuthorityDocumentProjection |
| IIA Global Technology Audit Guide (GTAG) 12: Auditing IT Projects | ID_7a3997a9_80d7_4f43_af04_e5f93aac54f1 | System.Compliance.AuthorityDocumentProjection |
| Switzerland Federal Act of 19 June 1992 on Data Protection (FADP) | ID_7aaceb4b_3c9c_4d5b_b103_4c8484f6f9c0 | System.Compliance.AuthorityDocumentProjection |
| FFIEC IT Examination Handbook – Information Security | ID_7b87eb6b_fd4f_4845_b533_a35e43968557 | System.Compliance.AuthorityDocumentProjection |
| Smith Guidance on Audit Committees, UK FRC | ID_7b88b83f_bd2d_4cab_b0f6_4a3cdac44c3d | System.Compliance.AuthorityDocumentProjection |
| Guide for Developing Security Plans for Federal Information Systems, NIST SP 800-18 | ID_7ccc86c0_59d3_4efc_894f_17b8783c05c2 | System.Compliance.AuthorityDocumentProjection |
| Directive 2003/4/EC Of The European Parliament | ID_7cf488d4_c221_42b5_93c0_bbe74d8529fe | System.Compliance.AuthorityDocumentProjection |
| 17 CFR Part 210.2-06, Retention of Audit and Review Records | ID_7cff5842_3f1f_42c6_90a9_f979a82463bd | System.Compliance.AuthorityDocumentProjection |
| 12 CFR Part 229 Availability of Funds and Collection (Check Clearing for the 21st Century) | ID_7e1897b8_e908_4228_8448_6018bd0bf1ae | System.Compliance.AuthorityDocumentProjection |
| ISACA Glossary of Terms | ID_7e6784a1_f753_4c49_aeec_01724dc559cb | System.Compliance.AuthorityDocumentProjection |
| Indiana Code 24, Article 4.9. Disclosure of Security Breach | ID_7e822bfa_79fd_4aff_8959_b002c390b633 | System.Compliance.AuthorityDocumentProjection |
| Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance All other Merchants and all SAQ-Eligible Service Providers | ID_7f907f0b_87d6_4290_88a4_948a1f357d9b | System.Compliance.AuthorityDocumentProjection |
| Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data | ID_7ff63992_fb16_4559_af1b_0a067143ffe1 | System.Compliance.AuthorityDocumentProjection |
| 34 CFR Part 99, Family Education Rights Privacy Act (FERPA) | ID_802f27eb_8aa6_4e40_9d67_67f41de89d33 | System.Compliance.AuthorityDocumentProjection |
| DISA Windows VISTA Security Checklist | ID_8078a827_adc2_40fd_bdfa_798bf53b5c2d | System.Compliance.AuthorityDocumentProjection |
| ORGANIC LAW 15/1999 of 13 December on the Protection of Personal Data | ID_80eb4802_8aa4_445d_a104_b1347c764841 | System.Compliance.AuthorityDocumentProjection |
| Australia Better Practice Guide - Business Continuity Management | ID_81074b6f_ac3e_4be4_8e80_9595b26e7a69 | System.Compliance.AuthorityDocumentProjection |
| Tlaxcala Law on Access to Public Information and Personal Data Protection | ID_836c2c58_1be9_4831_9373_b74cbd70e817 | System.Compliance.AuthorityDocumentProjection |
| SAS 110, Performing Audit Procedures in Response to Assessed Risks and Evaluating the Audit Evidence Obtained | ID_838b6ef3_a90d_4445_8e88_b398801fcbec | System.Compliance.AuthorityDocumentProjection |
| Leahy Personal Data Privacy and Security Act of 2009, Senate Bill 1490, 111th Congress | ID_83964bd5_cea3_4f3d_865b_e6bb531797dd | System.Compliance.AuthorityDocumentProjection |
| German Corporate Governance Code ("The Code") | ID_84270717_8708_43ce_b4e5_5df11bfc8794 | System.Compliance.AuthorityDocumentProjection |
| Kentucky Revised Statutes Title III Chapter 15 § 113 Prevention of Identity Theft | ID_8503891b_f296_41d4_b6e4_016288eafa06 | System.Compliance.AuthorityDocumentProjection |
| FFIEC IT Examination Handbook – Audit | ID_8553e7ea_2e44_46b5_8a7f_5c5345273c7c | System.Compliance.AuthorityDocumentProjection |
| Canada Personal Information Protection Electronic Documents Act (PIPEDA) | ID_855deadd_b134_45d5_8e84_722ffa11caa7 | System.Compliance.AuthorityDocumentProjection |
| COSO Enterprise Risk Management (ERM) Integrated Framework (2004) | ID_869fa446_89ff_45e4_b6b2_c692b7888df8 | System.Compliance.AuthorityDocumentProjection |
| DISA Secure Remote Computing Security Technical Implementation Guide | ID_8730d65b_885f_4b5f_89cc_761117360c52 | System.Compliance.AuthorityDocumentProjection |
| The Personal Data Protection Law for the Federal District (Mexico City) | ID_87825ba2_0736_439b_8ded_c185c24351a9 | System.Compliance.AuthorityDocumentProjection |
| Minnesota Statute § 325E.64 Access Devices; Breach of Security | ID_8931b49c_5c54_4128_a69a_e8da5cb58633 | System.Compliance.AuthorityDocumentProjection |
| Iowa Code Annotated § 714.16B Civil Cause of Action | ID_8973d225_13a4_40ad_bdee_73eae99866ff | System.Compliance.AuthorityDocumentProjection |
| FFIEC IT Examination Handbook – E-Banking | ID_89c649d7_ee3f_46a3_bb1d_75fc9be3b86a | System.Compliance.AuthorityDocumentProjection |
| Japan Act on the Protection of Personal Information Protection (Law No. 57 of 2003) | ID_89cb6dfb_fdae_4599_a9a6_91b61ec0b1d8 | System.Compliance.AuthorityDocumentProjection |
| Basel II: International Convergence of Capital Measurement and Capital Standards - A Revised Framework | ID_89f1a776_9295_4206_ae19_0ffb545cac83 | System.Compliance.AuthorityDocumentProjection |
| Defense Industrial Base Information Assurance Standard | ID_8a8e3567_5e48_46ea_b064_48209638bd2b | System.Compliance.AuthorityDocumentProjection |
| MOF Service Management Function Placeholder | ID_8c0dd987_74ad_47e0_babf_44bc6dd76a81 | System.Compliance.AuthorityDocumentProjection |
| Italy Protection of Individuals Other Subject with regard to the Processing of Personal Data | ID_8eaee986_f921_4f1a_9847_e17510c0faf9 | System.Compliance.AuthorityDocumentProjection |
| Uniform Electronic Transactions Act (UETA) (1999) | ID_8ffe9ae1_d4a2_4ef1_9da4_93e88dbc7d95 | System.Compliance.AuthorityDocumentProjection |
| Federal Information Security Management Act of 2002 | ID_9057dd81_878e_4b31_a9c4_44e18f2d53aa | System.Compliance.AuthorityDocumentProjection |
| 16 CFR Part 313, Privacy of Consumer Financial Information | ID_905b4ad4_a8c9_4b53_899e_aff25946fb56 | System.Compliance.AuthorityDocumentProjection |
| Organizational Resilience: Security, Preparedness, and Continuity Management Systems -- Requirements with Guidance for Use, ASIS SPC.1-2009 | ID_9081cade_ae04_492c_8042_c6779e8bac87 | System.Compliance.AuthorityDocumentProjection |
| Disaster / Emergency Management and Business Continuity, NFPA 1600 | ID_91de9b7c_1f00_4dc8_a57d_cba74ff7638d | System.Compliance.AuthorityDocumentProjection |
| Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire B and Attestation of Compliance Imprint Machines or Stand-alone Dial-out Terminals Only, no Electronic Cardholder Data Storage | ID_93542993_aae6_460e_8786_bbfa24887fe4 | System.Compliance.AuthorityDocumentProjection |
| 16 CFR Part 682 Disposal of consumer report information and records | ID_944838e7_3318_44c9_a9c5_d296178f4cf4 | System.Compliance.AuthorityDocumentProjection |
| Portuguese Act on the Protection of Personal Data 67/98 | ID_944e6252_d4b0_4aaa_b17c_94c86ec821f7 | System.Compliance.AuthorityDocumentProjection |
| 18 USC § 2721, Prohibition on release and use of certain personal information from State motor vehicle records (Driver's Privacy Protection Act (DPPA) | ID_982467b0_255f_45cd_9bbd_c10a31d3b1a3 | System.Compliance.AuthorityDocumentProjection |
| Introductory Resource Guide for HIPAA NIST SP 800-66 | ID_9849977f_2924_4107_90b3_b7dff7375495 | System.Compliance.AuthorityDocumentProjection |
| New Jersey Permanent Statutes Title 56 Security of Personal Information | ID_98a2c81e_5e1e_4963_b8dc_21589f492a35 | System.Compliance.AuthorityDocumentProjection |
| Uniform Rules of Evidence Act | ID_990988c5_d4b7_4bf4_ab1b_a5942081e081 | System.Compliance.AuthorityDocumentProjection |
| Mexico Federal Personal Data Protection Law | ID_992ff892_8502_4d95_9fbd_3ab38f10e986 | System.Compliance.AuthorityDocumentProjection |
| Alaska Personal Information Protection Act, Chapter 48 | ID_995e719f_710b_4136_bdab_b1c6d52d9056 | System.Compliance.AuthorityDocumentProjection |
| Guidance for Securing Microsoft Windows XP Systems for IT Professionals, NIST SP 800-68 | ID_9a3fd57b_5608_49c4_8809_75846fcea364 | System.Compliance.AuthorityDocumentProjection |
| Michigan Identity Theft Protection Act, Act 452 of 2004, § 445.61 thru § 445.72a | ID_9af0ef3f_7fa4_4356_a099_07a84816f059 | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 13335-1 Information technology — Security techniques — Management of information and communications technology security — Part 1: Concepts and models for information and communications technology security management | ID_9be1e091_b4ee_4bf1_9239_e425c9372bc5 | System.Compliance.AuthorityDocumentProjection |
| 17 CFR Part 240.15d-15, Controls and Procedures | ID_9d0b4d78_e0f7_4a00_a235_462c1edf5315 | System.Compliance.AuthorityDocumentProjection |
| Payment Card Industry (PCI) Data Security Standard 2.0, Requirements and Security Assessment Procedures | ID_9ddd2c93_6adf_42e1_bfa9_b92fcafc6177 | System.Compliance.AuthorityDocumentProjection |
| 17 CFR Part 240.17a-4, Records to be preserved by certain exchange members, brokers, and dealers | ID_9e5bcd49_0a0c_4b0a_ad6b_3e84d321c5e2 | System.Compliance.AuthorityDocumentProjection |
| Hong Kong Personal Data (Privacy) Ordinance | ID_9f7dc249_0306_4076_8b3c_a428c8b32775 | System.Compliance.AuthorityDocumentProjection |
| Taiwan Computer-Processed Personal Data Protection Law 1995 | ID_a30120ba_9613_4163_a68f_de1c63f7e67e | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 15408-1 Common Criteria for Information Technology Security Evaluation Part 1 | ID_a366f74e_5242_45e8_b8ed_46428ff4411a | System.Compliance.AuthorityDocumentProjection |
| Kentucky Revised Statutes Title XXXVI Chapter 411 § 210 Action for theft of identity or trafficking in stolen identities | ID_a3c6f07a_5dc3_4e90_b452_fcf5ab3860f3 | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 15408-2 Common Criteria for Information Technology Security Evaluation Part 2 | ID_a3ea29ab_b9ee_437f_ac8c_36ceb2c6e551 | System.Compliance.AuthorityDocumentProjection |
| Internet Security: Distributed Denial of Service Attacks – OCC Alert 2000-1 | ID_a473d897_a882_45d1_857d_4201060bf65c | System.Compliance.AuthorityDocumentProjection |
| Generally Accepted Principles and Practices for Securing Information Technology Systems, NIST SP 800-14 | ID_a4a2db05_5259_4894_9867_71ed337400ae | System.Compliance.AuthorityDocumentProjection |
| Aviation and Transportation Security Act, Public Law 107 Released-71, November 2001 | ID_a4aee90b_5176_410f_a6a3_3fba40a05e0c | System.Compliance.AuthorityDocumentProjection |
| Indiana Code 24, Notice of Security Breach, Chapter 11 | ID_a51ea272_43c9_473d_9275_8aecd8370962 | System.Compliance.AuthorityDocumentProjection |
| DISA Windows Server 2003 Security Checklist | ID_a542df88_b96c_4122_bc8d_6ae16998e0d3 | System.Compliance.AuthorityDocumentProjection |
| Guide for Developing Performance Metrics for Information Security, NIST SP 800-80 | ID_a55dbb27_eb9d_48c1_99b2_5a88077944df | System.Compliance.AuthorityDocumentProjection |
| Belgian Law of 8 December 1992 on the protection of privacy in relation to the processing of persona | ID_a561593a_8ccd_4c04_a944_9ff7384eb273 | System.Compliance.AuthorityDocumentProjection |
| Austria Data Protection Act | ID_a5bfc261_e90c_464e_82c1_1c2014a4a0a1 | System.Compliance.AuthorityDocumentProjection |
| The National Strategy to Secure Cyberspace | ID_a5d49ac0_7e04_4ecc_91fa_35401838dc5b | System.Compliance.AuthorityDocumentProjection |
| Australia Privacy Act 1988 | ID_a6736727_33f3_4372_86ce_5fd0e79a2a18 | System.Compliance.AuthorityDocumentProjection |
| Guide for Assessing the Security Controls in Federal Information Systems, NIST SP 800-53A | ID_a6ff8bf6_3e66_4a0e_817b_53876d5b7cde | System.Compliance.AuthorityDocumentProjection |
| 45 CFR Parts 160 and 164, Standards for Privacy of Individually Identifiable Health Information | ID_a7523dc1_9279_4947_862e_a55198ab6d3e | System.Compliance.AuthorityDocumentProjection |
| DoD Instruction 8500.2 Information Assurance (IA) Implementation | ID_a78186bf_8287_4ba4_9d19_8151caac9179 | System.Compliance.AuthorityDocumentProjection |
| Clinger-Cohen Act (Information Technology Management Reform Act) | ID_a7a48f72_b2bd_4e1f_bc05_fa7f912e5322 | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 73, Risk Management - Vocabulary | ID_a8517230_b148_4662_ada8_404f5d5ab68c | System.Compliance.AuthorityDocumentProjection |
| 45 CFR Part 170, Health Information Technology: Initial Set of Standards, Implementation Specifications, and Certification Criteria for Electronic Health Record Technology | ID_a8a9a375_0674_4b4b_8c6b_474d6ae3a745 | System.Compliance.AuthorityDocumentProjection |
| Computer Security Incident Handling Guide, NIST SP 800-61 | ID_a8d6894e_8bb1_41ab_8845_51b237b3d319 | System.Compliance.AuthorityDocumentProjection |
| Finland act on the amendment of the Personal Data Act (986/2000) | ID_a929a6b6_66a5_4ce8_a5e0_b8e4682dbcc7 | System.Compliance.AuthorityDocumentProjection |
| IIA Global Technology Audit Guide (GTAG) 8: Auditing Application Controls | ID_a97a1419_0c90_4bff_982b_2badaade2950 | System.Compliance.AuthorityDocumentProjection |
| FFIEC IT Examination Handbook – Supervision of Technology Service Providers | ID_a9a88d5c_43ca_475b_9846_905f25651079 | System.Compliance.AuthorityDocumentProjection |
| Underlying Technical Models for Information Technology Security, SP 800-33 | ID_a9d6d8e7_0a2e_4297_b959_e8c00588d5ee | System.Compliance.AuthorityDocumentProjection |
| ISF Security Audit of Networks | ID_aac49e26_d65a_4f0b_8b64_0a70cd7ccfdd | System.Compliance.AuthorityDocumentProjection |
| ISACA IS Standards, Guidelines, and Procedures for Auditing and Control Professionals | ID_ad8e7f54_2a48_4b9b_8ebd_f5537561510a | System.Compliance.AuthorityDocumentProjection |
| Florida Statute 817.5681 Breach of security concerning confidential personal information in third-party possession | ID_aeb44481_2f1c_4612_94d3_c1fb7d9af9e0 | System.Compliance.AuthorityDocumentProjection |
| Nevada Revised Statute Chapter 603A, Security of Personal Information | ID_aec918ba_de5c_416b_8104_95d8befeec09 | System.Compliance.AuthorityDocumentProjection |
| The Dutch corporate governance code, Principles of good corporate governance and best practice provisions | ID_af1c97c4_17b0_4eab_819f_a987b6a0779a | System.Compliance.AuthorityDocumentProjection |
| Colorado Revised Statutes 6-1-716, Notice of Security Breach | ID_b107bf43_24e2_4cc9_b7be_01e284c4433e | System.Compliance.AuthorityDocumentProjection |
| FIPS Pub 140-2, Security Requirements for Cryptographic Modules | ID_b1145382_f38f_4bc7_8020_5f49552abe32 | System.Compliance.AuthorityDocumentProjection |
| Australia Telecommunications Act 1997 | ID_b146789a_29c6_45dd_aca1_83b23f20696e | System.Compliance.AuthorityDocumentProjection |
| Fair and Accurate Credit Transactions Act of 2003 (FACT Act) | ID_b190b85a_ce4f_4681_97fb_23b6e08df5e8 | System.Compliance.AuthorityDocumentProjection |
| AICPA Red Flag Rule Identity Theft Prevention Program | ID_b27b9b6b_cf68_41aa_bf66_5b1e43fd42b1 | System.Compliance.AuthorityDocumentProjection |
| On the Setting of the Standards and Practice Standards for Management Assessment and Audit concerning Internal Control Over Financial Reporting | ID_b2b96c07_4279_49ee_b936_22a864b23294 | System.Compliance.AuthorityDocumentProjection |
| Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire D and Attestation of Compliance All other Merchants and all SAQ-Eligible Service Providers | ID_b3ee97bb_eb79_4501_b9b5_9b8b2eddcd75 | System.Compliance.AuthorityDocumentProjection |
| IIA Global Technology Audit Guide (GTAG) 7: Information Technology Outsourcing | ID_b611ebfb_50b7_42c7_b5a1_a5d54038a7aa | System.Compliance.AuthorityDocumentProjection |
| Georgia Code Title 10 Chapter 1 Article 34 § 10-1-911 thru 10-1-915 Notification required upon breach of security regarding personal information | ID_b7840018_867d_47c0_b82c_5b5698765ddb | System.Compliance.AuthorityDocumentProjection |
| Connecticut law Requiring Consumer Credit Bureaus to Offer Security Freezes, CT SB 650 | ID_b7d6185f_11d5_4f5d_9109_9f0f24ca5784 | System.Compliance.AuthorityDocumentProjection |
| FFIEC Guidance on Authentication in an Internet Banking Environment | ID_b7f4d047_332e_4a7d_8432_dd2c8afba848 | System.Compliance.AuthorityDocumentProjection |
| IIA Global Technology Audit Guide (GTAG) 11: Developing the IT Audit Plan | ID_b90beb28_50d5_4fee_bb22_570e8d1d97df | System.Compliance.AuthorityDocumentProjection |
| Revised Code of Washington Title 19 Chapter 19.255 Personal information - notice of security breaches § 19.255.010 | ID_bcbf8423_8609_4192_9d62_4071348abe90 | System.Compliance.AuthorityDocumentProjection |
| 17 CFR Part 240.17Ad-7, Record retention | ID_bd332136_ce42_4a19_9f00_0f795e456064 | System.Compliance.AuthorityDocumentProjection |
| Connecticut State Law Sec. 36a-701b. Breach of security re computerized data containing personal information. Disclosure of breach. Delay for criminal investigation. Means of notice. Unfair trade practice | ID_bd768cf0_6bb2_4232_b1f1_865145d872db | System.Compliance.AuthorityDocumentProjection |
| Children's Online Privacy Protection Act of 1998 | ID_bd860923_bd35_48ed_a11a_1838b5334644 | System.Compliance.AuthorityDocumentProjection |
| 17 CFR Part 240.17a-3, Records to be made by certain exchange members, brokers, and dealers | ID_bddd7cf6_0790_4623_830f_cbc936d6fcba | System.Compliance.AuthorityDocumentProjection |
| State of Arizona Standard P800-S880, Revision 2.0: Media Sanitation/Disposal | ID_be50ef26_2355_4738_97e8_9c7bd3ef4eb5 | System.Compliance.AuthorityDocumentProjection |
| Maryland Code of Commercial Law Subtitle 35. Maryland Personal Information Protection Act §14-3501 thru §14-3508 | ID_bf4f1025_b693_49ac_86c7_2b1b134619ae | System.Compliance.AuthorityDocumentProjection |
| US Department of Commerce EU Safe Harbor Privacy Principles | ID_c06ec4cc_650c_41fe_83a0_a65a0e442c50 | System.Compliance.AuthorityDocumentProjection |
| OECD / World Bank Technology Risk Checklist | ID_c0dc1424_9570_4705_b7a9_64ae0e145233 | System.Compliance.AuthorityDocumentProjection |
| FIPS Pub 199, Standards for Security Categorization of Federal Information and Information Systems | ID_c16214d4_30df_4149_a523_6557f4e2f956 | System.Compliance.AuthorityDocumentProjection |
| NSA Guide to the Secure Configuration of Solaris 9 | ID_c16ba030_fd6b_45cf_8dd1_9815e4a7db76 | System.Compliance.AuthorityDocumentProjection |
| Information Technology Security Evaluation Manual (ITSEM) | ID_c26dfa4c_676e_44d4_863c_d50225d67b12 | System.Compliance.AuthorityDocumentProjection |
| Iowa Code Annotated § 715C Personal Information Security Breach Protection | ID_c2abb092_a2a8_4ff8_97fd_45f33dd3d706 | System.Compliance.AuthorityDocumentProjection |
| FTC Electronic Signatures in Global and National Commerce Act (ESIGN) | ID_c409f8c0_9bc7_4a6c_b84a_1e9f5728aeeb | System.Compliance.AuthorityDocumentProjection |
| 21 CFR Part 11, Electronic Records; Electronic Signatures | ID_c4e00d4c_d76e_430e_a856_71fa507c5d85 | System.Compliance.AuthorityDocumentProjection |
| Army Regulation 380-19: Information Systems Security | ID_c50b08ab_8747_4c87_b2b9_9dc8d2aaeba8 | System.Compliance.AuthorityDocumentProjection |
| 49 CFR Part 1542, Airport Security | ID_c7c426bf_6513_4c5a_bec7_da2b914a04ae | System.Compliance.AuthorityDocumentProjection |
| FFIEC IT Examination Handbook – Development and Acquisition | ID_c830ae1d_d5ba_4735_8fc7_1dec2d854958 | System.Compliance.AuthorityDocumentProjection |
| Computer Security Incident Handling | ID_c9b14256_e8b8_4cf5_852e_b466d75965ec | System.Compliance.AuthorityDocumentProjection |
| FFIEC IT Examination Handbook – Management | ID_cadbc19d_5cb5_4919_8b4c_74f176c73058 | System.Compliance.AuthorityDocumentProjection |
| American Recovery and Reinvestment Act of 2009, Division A Title XIII Health Information Technology | ID_cc404fc5_098b_442e_8c56_aa46579d1365 | System.Compliance.AuthorityDocumentProjection |
| Security Development Lifecycle | ID_cd7c54bd_d229_4a2e_bcfc_dca9fcb3459d | System.Compliance.AuthorityDocumentProjection |
| Canada Privacy Act | ID_ce77e3f9_7a2e_4cce_bd2d_f557529c5092 | System.Compliance.AuthorityDocumentProjection |
| Health Insurance Portability and Accountability Act of 1996 (HIPAA), Public Law 104-191, 104th Congress | ID_ce7c58d6_5bcb_48b5_bed2_f42890ceb271 | System.Compliance.AuthorityDocumentProjection |
| Gramm-Leach-Bliley Act (GLB) | ID_ce9bee5b_2666_4b33_9d9d_50d17bd0d8d0 | System.Compliance.AuthorityDocumentProjection |
| Guidelines on Firewalls and Firewall Policy, NIST SP 800-41 | ID_cf58bb16_4c98_47fe_b9e6_97a57fa5df5c | System.Compliance.AuthorityDocumentProjection |
| Defense Information Systems Agency UNIX Security Technical Implementation Guide Version 5 Release 1 | ID_cf59de8e_5deb_44c7_ad32_b33c6df453dd | System.Compliance.AuthorityDocumentProjection |
| Japan Handbook Concerning Protection Of Personal Data | ID_cf761a7e_62a6_49da_9c61_d40838f8a03e | System.Compliance.AuthorityDocumentProjection |
| German Federal Data Protection Act | ID_cfb23a8f_7969_41b7_b32d_b12591d9d5f1 | System.Compliance.AuthorityDocumentProjection |
| The Cloud Security Alliance Controls Matrix | ID_cfb93a98_5890_4a3f_bc61_007ca7272463 | System.Compliance.AuthorityDocumentProjection |
| IIA Global Technology Audit Guide (GTAG) 6: Managing and Auditing IT Vulnerabilities | ID_d06e1b4f_9fb0_456a_8fd6_f5e17330f54d | System.Compliance.AuthorityDocumentProjection |
| BBBOnline Code of Online Business Practices | ID_d088989f_f504_4a7d_b111_ad4488cc0571 | System.Compliance.AuthorityDocumentProjection |
| 17 CFR Part 240.16a-3, Reporting Transactions and Holdings | ID_d0e0cd47_e65d_4cef_8966_f905ddf6cfbd | System.Compliance.AuthorityDocumentProjection |
| Payment Card Industry (PCI) Data Security Standard Self-Assessment Questionnaire C and Attestation of Compliance Payment Application Connected to Internet, No Electronic Cardholder Data Storage | ID_d285bfeb_1e91_46ac_b5ad_6b859608612f | System.Compliance.AuthorityDocumentProjection |
| IRS Revenue Procedure: Record retention: automatic data processing, 98-25 | ID_d29cad4d_9303_4688_a7a4_88f19bf5dc55 | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 18045 Common Methodology for Information Technology Security Evaluation | ID_d3255745_3b05_4298_b993_cc56f9e8d002 | System.Compliance.AuthorityDocumentProjection |
| Patient Safety And Quality Improvement Act Of 2005, Public Law 109-41, 109th Congress | ID_d396abb4_002b_491d_9633_e7e101afafda | System.Compliance.AuthorityDocumentProjection |
| Tennessee Security Breach Notification, TN SB 2220 | ID_d3f48347_f739_4cc6_883b_709629311bc9 | System.Compliance.AuthorityDocumentProjection |
| NASD Manual | ID_d5756b8f_e477_4cf0_901b_cca2f7a32d5e | System.Compliance.AuthorityDocumentProjection |
| Swedish Code of Corporate Governance; A Proposal by the Code Group | ID_d6755e6b_3d89_48e1_aad9_f200aa400f4c | System.Compliance.AuthorityDocumentProjection |
| Payment Card Industry (PCI) Data Security Standard (DSS) and Payment Application Data Security Standard (PA-DSS) Glossary of Terms, Abbreviations, and Acronyms | ID_d83ba825_5d1a_4b94_a359_eaa0a8693da4 | System.Compliance.AuthorityDocumentProjection |
| District of Columbia (Washington DC) | ID_d8e536dd_afde_4357_b501_8dd7301f942f | System.Compliance.AuthorityDocumentProjection |
| IIA Global Technology Audit Guide (GTAG) 10: Business Continuity Management | ID_d9a15d68_53b0_4d7f_8970_54421c5441da | System.Compliance.AuthorityDocumentProjection |
| Denmark Act on Competitive Conditions and Consumer Interests | ID_da19ef6b_ad15_4ae0_b29f_2c685abd9f6f | System.Compliance.AuthorityDocumentProjection |
| 12 CFR Part 748, NCUA Guidelines for Safeguarding Member Information | ID_da4d1095_2ec2_4519_b6e6_079713e2953e | System.Compliance.AuthorityDocumentProjection |
| Security Metrics Guide for Information Technology Systems, NIST SP 800-55 | ID_da567b3d_0802_4edc_9377_d91af71a665d | System.Compliance.AuthorityDocumentProjection |
| Corporate Governance in listed Companies – Clause 49 of the Listing Agreement | ID_da740818_09a7_432a_94e6_9da663f9a921 | System.Compliance.AuthorityDocumentProjection |
| Bank Secrecy Act (aka The Currency and Foreign Transaction Reporting Act) | ID_db191d42_24c5_4eb3_be10_0950a414c13c | System.Compliance.AuthorityDocumentProjection |
| Korea Act on Promotion of Information & Communication Network Utilization and Information Protection, etc. | ID_db641349_ad2f_44de_8bd1_ba8386137e9f | System.Compliance.AuthorityDocumentProjection |
| Oklahoma State Law Disclosure of breach of security of computerized personal information, §74-3113.1 | ID_db7f78d4_3f57_48cd_9ced_53e255978463 | System.Compliance.AuthorityDocumentProjection |
| Information Technology Security Evaluation Criteria (ITSEC) | ID_dc104c64_1cb0_4345_bb86_758d15644239 | System.Compliance.AuthorityDocumentProjection |
| Oklahoma Administrative Code Title 375 Chapter 40 Oklahoma Identity Theft Passport Program § 375:40-1-1 thru § 375:40-1-11 | ID_dcc878fc_39dc_42b4_aa7d_a5a82bc22100 | System.Compliance.AuthorityDocumentProjection |
| Consumer Interests in the Telecommunications Market, Act No. 661 | ID_de09a7f1_8f41_42c2_b082_f42da19d9dfe | System.Compliance.AuthorityDocumentProjection |
| Fair Credit Reporting Act (FCRA) | ID_de6b479a_d520_412e_89ea_07e521f0d06a | System.Compliance.AuthorityDocumentProjection |
| IIA Global Technology Audit Guide (GTAG) 3: Continuous Auditing: Implications for Assurance, Monitoring, and Risk Assessment | ID_dea6f3d5_230b_46c6_abc6_4a5b6edc8c07 | System.Compliance.AuthorityDocumentProjection |
| Lithuania Law on Legal Protection of Personal Data | ID_df732490_32fc_4ab6_b833_cc468f1e8669 | System.Compliance.AuthorityDocumentProjection |
| Colorado Revised Statutes Title 16 Article 5 Section 103 Identity theft victims - definitions | ID_e07f9843_1c76_42d2_a15f_e6e500749caf | System.Compliance.AuthorityDocumentProjection |
| PAS 77 IT Service Continuity Management. Code of Practice | ID_e0a79f07_34f9_4d2b_b3bb_d167ae4ea2d1 | System.Compliance.AuthorityDocumentProjection |
| Transportation Security Administration (TSA) Security Guidelines for General Aviation Airports, Information Publication A-001, May 2004 | ID_e0bbc338_2a08_46aa_b411_953def84ba3d | System.Compliance.AuthorityDocumentProjection |
| 17 CFR Parts 210, 228, 229 and 240, Amendments to Rules Regarding Management's Report on Internal Control Over Financial Reporting; Final Rule | ID_e12863d5_4cec_45a9_b31d_a0260baccf45 | System.Compliance.AuthorityDocumentProjection |
| 6 CFR Part 27, Chemical Facility Anti-Terrorism Standards (CFATS), Department of Homeland Security | ID_e201fd85_10c7_4be0_8efd_aa163a2e104c | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 13335-4 Information technology — Guidelines for the management of IT Security — Part 4: Selection of safeguards | ID_e220424a_8e61_4de3_b5d0_7469f0f569fa | System.Compliance.AuthorityDocumentProjection |
| Kansas Statutes Chapter 50, Article 7a Protection Of Consumer Information | ID_e3e84576_b6bc_4b64_9ba0_8b70348280ca | System.Compliance.AuthorityDocumentProjection |
| Security Self-Assessment Guide, NIST SP 800-26 | ID_e4d91409_2c18_4950_943c_a6e13ebf65d4 | System.Compliance.AuthorityDocumentProjection |
| AICPA/CICA Privacy Framework | ID_e50b2f1a_be98_487c_a748_8320855a323a | System.Compliance.AuthorityDocumentProjection |
| UK Data Protection Act of 1998 | ID_e57ba67f_c270_464e_9ccf_b9172d4ec5db | System.Compliance.AuthorityDocumentProjection |
| New York State General Business Law Chapter 20, Article 39-F, § 899-aa | ID_e5dbb4c1_5bd5_4c36_84ce_df6ca60e1a95 | System.Compliance.AuthorityDocumentProjection |
| North American Electric Reliability Corporation Critical Infrastructure Protection Cyber Security Standards | ID_e7d981f1_4fd6_4558_a9bb_3e2a8628db7e | System.Compliance.AuthorityDocumentProjection |
| Ohio Revised Code Title XIII Chapter 1347 § 1347.12 Agency disclosure of security breach of computerized personal information data | ID_e830ae30_08dc_49ac_82a6_0c6e1b75702f | System.Compliance.AuthorityDocumentProjection |
| Protection of Assets Manual, ASIS International | ID_e9821dd8_e1ab_4f75_9ca4_db3e7e548f86 | System.Compliance.AuthorityDocumentProjection |
| OMB Circular A-123 Management’s Responsibility for Internal Control | ID_e98e3730_47cd_4243_ae69_cf1ce55938d9 | System.Compliance.AuthorityDocumentProjection |
| System Security Plan (SSP) Procedure | ID_e9f46e50_82a7_4364_a0b6_f2249c19bd29 | System.Compliance.AuthorityDocumentProjection |
| Appendix 1 Correspondence of the System Management Standards – Supplementary Edition to other standards | ID_ed5ec3c5_5e40_4408_9bf3_cb09f5b1e79d | System.Compliance.AuthorityDocumentProjection |
| 16 CFR Part 312, Children's Online Privacy Protection Rule | ID_ededdaa2_f1fc_4d48_a39e_5c082dac0c89 | System.Compliance.AuthorityDocumentProjection |
| Jalisco (Civil Code of the State of Jalisco (Article 40 Bis 1 to Article 40 Bis 39) | ID_f0ed1cfa_9239_4f1f_8ca4_06c7ca3ae43a | System.Compliance.AuthorityDocumentProjection |
| FDCC Windows IE7 SCAP content using OVAL (fdcc-ie7-oval.xml, fdcc-ie7-patches.xml) | ID_f142c947_000e_4d7a_9bc8_fdb65fadda6a | System.Compliance.AuthorityDocumentProjection |
| ISO/IEC 24762 Information technology — Security techniques — Guidelines for information and communications technology disaster recovery services | ID_f1536af9_d46c_458a_98d1_3d0927a66c46 | System.Compliance.AuthorityDocumentProjection |
| Financial Reporting Council, Combined Code on Corporate Governance | ID_f16c9037_dc92_4057_b780_9832ba8f974f | System.Compliance.AuthorityDocumentProjection |
| 5 USC § 552a, Records maintained on individuals (Privacy Act of 1974) | ID_f172d7ec_1e61_4aae_a515_57521afb2b8b | System.Compliance.AuthorityDocumentProjection |
| NYSE Listed Company Manual | ID_f1e4f657_edb9_45fc_88eb_fba16b89f188 | System.Compliance.AuthorityDocumentProjection |
| Arizona State Law 44-7501. Notification of breach of security system | ID_f321498b_de9b_45bb_991b_ca4a3ea47e6f | System.Compliance.AuthorityDocumentProjection |
| ISACA Cross-Border Privacy Impact Assessment | ID_f4e1a816_35a4_46d4_8131_a9b33a095846 | System.Compliance.AuthorityDocumentProjection |
| 10 CFR Part 73.54, Protection of digital computer and communication systems and networks | ID_f5481109_87a0_413c_905b_80172b7a3637 | System.Compliance.AuthorityDocumentProjection |
| Recommended Security Controls for Federal Information Systems, NIST SP 800-53 | ID_f5629b99_7d20_4884_b3ae_028398a3ab8d | System.Compliance.AuthorityDocumentProjection |
| DISA Windows XP Security Checklist | ID_f5b0064d_922e_4c45_8c4d_1e0288b3a71b | System.Compliance.AuthorityDocumentProjection |
| FFIEC IT Examination Handbook – Retail Payment Systems | ID_f64f9ed4_7c2c_4e1b_883d_3f539387cdd1 | System.Compliance.AuthorityDocumentProjection |
| Arkansas Code Title 4 Business and Commercial Law Subtitle 7 Consumer Protection, Chapter 110 Personal Information, §§ 4-110-103 thru 4 -110-105, Personal Information Protection Act | ID_f66ae455_cdff_4b65_a92b_98902e3e5fde | System.Compliance.AuthorityDocumentProjection |
| Guide for Mapping Types of Information and Information Systems to Security Categories, NIST SP 800-60 | ID_f73e3142_abd6_4285_b41b_e0c0559f63d4 | System.Compliance.AuthorityDocumentProjection |
| New Hampshire Statute Title XXXI, Chapter 359-C Right to Privacy, Notice of Security Breach | ID_f7c85921_161e_4632_8667_c8420425efb4 | System.Compliance.AuthorityDocumentProjection |
| Connecticut Public Act 08-167, An Act Concerning the Confidentiality of Social Security Numbers | ID_f7f41488_4c44_4d05_ab34_91bb9e9f509a | System.Compliance.AuthorityDocumentProjection |
| Appendix of OCC 12 CFR Part 30, Safety and Soundness Standards | ID_f8a2e274_f22f_449f_93fc_a7e5e55dced7 | System.Compliance.AuthorityDocumentProjection |
| Cable Communications Privacy Act Title 47 § 551 | ID_f9595ffe_49d4_4aba_8a63_3ce1615e9b54 | System.Compliance.AuthorityDocumentProjection |
| West Virginia Code Chapter 46A Article 2A Breach of Security of Consumer Information § 46A-2A-101 thru § 46A-2A-105 | ID_f98edfc1_fd4e_4296_82ac_3e08b6c36b00 | System.Compliance.AuthorityDocumentProjection |
| New York Disposal of Records Containing Personal Identifying Information NY CLS Gen Bus § 399-h | ID_f9b7e432_9180_406b_9a57_fbd23a00d194 | System.Compliance.AuthorityDocumentProjection |
| 45 CFR Parts 160, 162, and 164, Health Insurance Reform: Security Standards | ID_fb48b9a4_69c6_4d31_87ee_21165b1716d9 | System.Compliance.AuthorityDocumentProjection |
| FFIEC IT Examination Handbook – Wholesale Payment Systems | ID_fb7bb95e_0291_450f_a016_d0d083b769ce | System.Compliance.AuthorityDocumentProjection |
| Appendix III to OMB Circular No. A-130: Security of Federal Automated Information Resources | ID_fd56f1f3_bc86_4c6f_9911_4b1353d34c43 | System.Compliance.AuthorityDocumentProjection |
| Defense Information Systems Agency UNISYS Security Technical Implementation Guide Version 7 Release 2 | ID_fd7d9a55_9611_461c_afee_8187423e4aef | System.Compliance.AuthorityDocumentProjection |
| North Carolina Statutes Chapter 75 Article 2A. Identity Theft Protection Act § 75-60 through § 75-66 | ID_fe2e5fee_51a1_4cb8_bfa4_0ee5b688090e | System.Compliance.AuthorityDocumentProjection |
| Finland Personal Data Protection Act (523/1999) | ID_feb82798_96ca_41ed_bd2e_87914af55f82 | System.Compliance.AuthorityDocumentProjection |
| The King Committee on Corporate Governance, Executive Summary of the King Report 2002 | ID_ff88e666_7dc9_4843_9cac_eb81ed2a80b5 | System.Compliance.AuthorityDocumentProjection |
| Federal Information System Controls Audit Manual (FISCAM) | ID_ffa515f8_ca7e_40ad_b79b_898cfb7e56b1 | System.Compliance.AuthorityDocumentProjection |
| Vermont Relating to Identity Theft , VT HB 327 | ID_fff38af7_fcb7_486a_b6cf_645079168d8b | System.Compliance.AuthorityDocumentProjection |