Technology Compliance – The A-P-I-A framework
As a provider of software solutions and in recent years hosting them on the cloud, we follow security standards diligently. In fact, that is a part of our deliverables to…
As a provider of software solutions and in recent years hosting them on the cloud, we follow security standards diligently. In fact, that is a part of our deliverables to…
In IT compliance, control over data sharing is a major preventive step against accidental or intentional data breaches. Here are a couple of cases that could have been avoided with…
Major public-facing companies have fallen victim to unauthorized individuals gaining access to sensitive data. Here are three famous cases which describe on the result of an authorized person gaining access…
How is it that when I buy insurance or make a financial transaction, I immediately begin receiving contacts from companies offering similar products and services? They know me, my email…
Compliance has a cost. But non-compliance can be costlier. It could run into millions and billions as in the case that Ford Motor Co. is currently fighting. Ford Motor Co.…
In the last blog, I have covered Impact of Data Protection and Data Localization Regulations, one of the key trends unfolding across multiple geographies. There is one more trend slowly…