Below is a list of some of the best-known regulations governing information management and control.
This law was created with the aim of increasing the financial transparency of companies that trade on the U.S. stock market, protecting shareholders by establishing controls that discourage illegal financial activities.
This standard was developed by a committee made up of representatives from the most important card (debit and credit) companies. The steering committee is the PCI SSC (Payment Card Industry Security Standards Council).
Gramm–Leach–Bliley Act (GLB):
This act controls how financial institutions manage their customer information, with an emphasis on establishing measures to protect customers' personal or non-public information.
Federal Information Security Management Act (FISMA):
This regulation assigns specific responsibilities to American federal agencies in order to reinforce the security of their information systems.
Health Insurance Portability and Accountability Act (HIPAA):
This act defines policies, procedures and guidelines for maintaining the privacy and security of patient health information in the health care sector.
Family Educational Rights and Privacy Act (FERPA):
This act regulates management of the personal data of students and family members by educational institutions. Its aim is to ensure that this data is stored securely and used for legitimate purposes.
Data protection regulations (UK Data Protection Act, European Data Protection Directive, Spanish LOPD, etc.):
These regulate the use and processing of third party personal data by organizations and establish penalties for cases of negligence or non-fulfillment.
How will SealPath help me?
It makes it possible to establish the same type of access control as an information repository, file server, document manager or similar method, but within the document itself. For this reason, SealPath protects your documents, wherever they are.
The administrator can view the level of exposure for protected documents, wherever they may be. What protected document is accessible to whom? Has access to a protected document been given to someone outside the company?
It simplifies auditing, as you can find out if somebody has accessed a protected document, when this occurred and view the entire access log, regardless of where the document was accessed (inside or outside the company).
It makes it easier to comply with the different data protection regulations. The document will remain protected and continue to send feedback even when it has left your company's document manager or file server.