{"id":45592,"date":"2022-10-06T12:59:00","date_gmt":"2022-10-06T19:59:00","guid":{"rendered":"https:drivesaversdatarecovery.com\/\/?p=45592"},"modified":"2026-03-24T07:14:48","modified_gmt":"2026-03-24T14:14:48","slug":"data-security-compliance-a-cheat-sheet-for-it","status":"publish","type":"post","link":"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/data-security-compliance-a-cheat-sheet-for-it\/","title":{"rendered":"Data Security Compliance: A Cheat Sheet for IT"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><div class=\"vc_section wpex-relative\"><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1665011962892 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-10 vc_row-o-equal-height vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative no-bottom-margins tablet-fullwidth-columns\"><div class=\"wpb_column vc_column_container vc_col-sm-3 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><figure class=\"vcex-image vcex-module\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block\"><img width=\"800\" height=\"800\" src=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/Clean_Room_Guide.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" decoding=\"async\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/Clean_Room_Guide.png 800w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/Clean_Room_Guide-300x300.png 300w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/Clean_Room_Guide-150x150.png 150w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2022\/09\/Clean_Room_Guide-768x768.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/div><\/figure><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Whether you work for an organization controlled by compliance standards or you are an independent IT looking to build your enterprise business, industry regulations regarding data security, also known as information security, can sometimes cause a real headache.<\/p>\n<p>Keep reading for a single set of guidelines to follow that can be applied to all industry regulations.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1664828670153 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1662569792245 vc_rtl-columns-reverse vc_row-o-content-middle vc_row-flex wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-animated-text.vcex_69d27b9342440{text-align:start;color:#1c1c1c;font-size:3.5em;}@media (max-width:1024px){.vcex-animated-text.vcex_69d27b9342440{font-size:2em;}}@media (max-width:959px){.vcex-animated-text.vcex_69d27b9342440{font-size:2em;}}@media (max-width:767px){.vcex-animated-text.vcex_69d27b9342440{font-size:2em;}}@media (max-width:479px){.vcex-animated-text.vcex_69d27b9342440{font-size:2em;}}<\/style><h2 class=\"vcex-animated-text vcex-module wpex-m-0 wpex-text-xl wpex-text-1 wpex-font-semibold wpex-leading-none vcex-typed-text-wrap wpex-text-left vc_custom_1665078411154 vcex_69d27b9342440\"><span class=\"vcex-typed-text-before vcex-before\">WHY DATA SECURITY REGULATIONS EXIST<\/span> <span class=\"vcex-typed-text-inner vcex-typed-text-css wpex-inline-block wpex-max-w-100\"><span class=\"screen-reader-text\"><\/span><span class=\"vcex-animated-text__placeholder vcex-ph wpex-inline-block wpex-invisible\"><\/span><span class=\"vcex-typed-text\" aria-hidden=\"true\" data-settings=\"{&quot;loop&quot;:false,&quot;showCursor&quot;:false,&quot;typeSpeed&quot;:40,&quot;backDelay&quot;:500,&quot;backSpeed&quot;:0,&quot;startDelay&quot;:2000}\" data-strings=\"[]\"><\/span><\/span><\/h2>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Industry-mandated data security requirements are there for a good reason. Social security numbers, credit card numbers, birth dates, and more are all extremely valuable on the black market. Where there is personal data, there are hackers trying to get at it. According to the\u00a0<a href=\"https:\/\/www.idtheftcenter.org\/notified\">Identity Theft Resource Center (ITRC)<\/a>, \u201cthe number of 2021 data compromises is 23 percent over the previous all-time high.\u201d<\/p>\n<p>There are horror stories about data being stolen by third-party data recovery companies or, worse yet,\u00a0<a href=\"\/en-ca\/nbc-bay-area-news-mans-hard-drive-trouble-leads-to-extortion\/\">sold to the highest bidder<\/a>. This is why it\u2019s incredibly important to have a\u00a0<a href=\"\/en-ca\/partner-programs\/business\/\">pre-vetted<\/a>\u00a0data recovery company.<\/p>\n<p>DriveSavers undergoes an annual\u00a0<a href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/why-us\/certified-secure-data-recovery\/annual-soc-2-type-ii-audit\/\">SOC 2 Type II audit\u00a0<\/a>of its internal data hosting and processing controls to guarantee that our data recovery services uphold the stringent data security and privacy protocols mandated by the corporate clients and government agencies we serve. The\u00a0<a href=\"\/en-ca\/why-us\/certified-secure-data-recovery\/annual-soc-2-type-ii-audit\/\">SOC 2 Type II<\/a>\u00a0 certification covers all the protocols.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1664828596217 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1665009131074 vc_rtl-columns-reverse vc_row-o-content-middle vc_row-flex wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-animated-text.vcex_69d27b93433d6{text-align:start;color:#1c1c1c;font-size:3.5em;}@media (max-width:1024px){.vcex-animated-text.vcex_69d27b93433d6{font-size:2em;}}@media (max-width:959px){.vcex-animated-text.vcex_69d27b93433d6{font-size:2em;}}@media (max-width:767px){.vcex-animated-text.vcex_69d27b93433d6{font-size:2em;}}@media (max-width:479px){.vcex-animated-text.vcex_69d27b93433d6{font-size:2em;}}<\/style><h2 class=\"vcex-animated-text vcex-module wpex-m-0 wpex-text-xl wpex-text-1 wpex-font-semibold wpex-leading-none vcex-typed-text-wrap wpex-text-left vc_custom_1665006294726 vcex_69d27b93433d6\"><span class=\"vcex-typed-text-before vcex-before\">Industry Terms IT Needs to Know<\/span> <span class=\"vcex-typed-text-inner vcex-typed-text-css wpex-inline-block wpex-max-w-100\"><span class=\"screen-reader-text\"><\/span><span class=\"vcex-animated-text__placeholder vcex-ph wpex-inline-block wpex-invisible\"><\/span><span class=\"vcex-typed-text\" aria-hidden=\"true\" data-settings=\"{&quot;loop&quot;:false,&quot;showCursor&quot;:false,&quot;typeSpeed&quot;:40,&quot;backDelay&quot;:500,&quot;backSpeed&quot;:0,&quot;startDelay&quot;:2000}\" data-strings=\"[]\"><\/span><\/span><\/h2><div class=\"vc_row wpb_row vc_inner vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><figure class=\"vcex-image vcex-module\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block overlay-parent overlay-parent-magnifying-hover overlay-h wpex-overflow-hidden overlay-ms\"><a href=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04.png\" class=\"wpex-lightbox\"><img width=\"2550\" height=\"3300\" src=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" decoding=\"async\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04.png 2550w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-232x300.png 232w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-791x1024.png 791w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-768x994.png 768w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-1187x1536.png 1187w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-1583x2048.png 1583w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-232x300@2x.png 464w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-600x776.png 600w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Certified_Compliant-8.5x11_2210.04-600x776@2x.png 1200w\" sizes=\"(max-width: 2550px) 100vw, 2550px\" \/>\n<div class=\"magnifying-hover theme-overlay overlay-hide wpex-absolute wpex-inset-0 wpex-transition-all wpex-duration-300 wpex-text-white wpex-text-2xl wpex-flex wpex-items-center wpex-justify-center\" aria-hidden=\"true\">\n\t<span class=\"overlay-bg wpex-bg-black wpex-block wpex-absolute wpex-inset-0 wpex-opacity-60\"><\/span>\n\t<span class=\"wpex-relative wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M416 208c0 45.9-14.9 88.3-40 122.7L502.6 457.4c12.5 12.5 12.5 32.8 0 45.3s-32.8 12.5-45.3 0L330.7 376c-34.4 25.2-76.8 40-122.7 40C93.1 416 0 322.9 0 208S93.1 0 208 0S416 93.1 416 208zM208 352a144 144 0 1 0 0-288 144 144 0 1 0 0 288z\"\/><\/svg><\/span><\/div>\n<\/a><\/div><figcaption class=\"vcex-image-caption wpex-mt-10\">Click image to enlarge<\/figcaption><\/figure><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69d27b9344955{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69d27b9344955{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69d27b9344955{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69d27b9344955{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090513179 vcex_69d27b9344955\"><span class=\"vcex-heading-inner wpex-inline-block\">Vocabulary and Compliance Standards<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element vc_custom_1665009074676\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Each of these industries follows a different set of rules with a different set of vocabulary. You should be familiar with the terms that are used in the industries you plan to be working with.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<style>.vcex-heading.vcex_69d27b9345170{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69d27b9345170{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69d27b9345170{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69d27b9345170{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665006445365 vcex_69d27b9345170\"><span class=\"vcex-heading-inner wpex-inline-block\">Corporations and Other Businesses<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Any cybersecurity-minded business that does not fall under one of the above sets of compliance mandates will have developed its own set of data security guidelines. In fact, these individual companies often develop policies that are even more robust than federal mandates!<\/p>\n<p>Since these companies have developed their own sets of rules and are not following any industry-wide mandate, they often have their own vocabulary as well. It\u2019s important to learn the terms used by any business you provide IT service to, and important to familiarize yourself with their company information security and cybersecurity requirements.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69d27b9345d82{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69d27b9345d82{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69d27b9345d82{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69d27b9345d82{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090448500 vcex_69d27b9345d82\"><span class=\"vcex-heading-inner wpex-inline-block\">Banking and Financial<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>As described in\u00a0section 4(k) of the Bank Holding Company Act, any business that is \u201csignificantly engaged\u201d in \u201cfinancial activities\u201d must comply with GLBA. If a business falls into this category and is also publicly traded, that organization will also need to comply with SOX.<\/p>\n<ul>\n<li aria-level=\"1\">Non-bank mortgage lenders<\/li>\n<li aria-level=\"1\">Real estate appraisers<\/li>\n<li aria-level=\"1\">Loan brokers<\/li>\n<li aria-level=\"1\">Some financial or investment advisers<\/li>\n<li aria-level=\"1\">Debt collectors<\/li>\n<li aria-level=\"1\">Tax return preparers<\/li>\n<li aria-level=\"1\">Banks<\/li>\n<li aria-level=\"1\">Real estate settlement service providers<\/li>\n<li aria-level=\"1\">Any other business that is \u201csignificantly engaged\u201d in \u201cfinancial activities\u201d<\/li>\n<\/ul>\n<p><strong>Terms you need to know:<\/strong><\/p>\n<ul>\n<li aria-level=\"1\">GLBA: Gramm-Leach-Bliley Act<\/li>\n<li aria-level=\"1\">SOX: Sarbanes\u2013Oxley Act of 2002<\/li>\n<li aria-level=\"1\">NPI: Nonpublic personal information<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69d27b93466f0{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69d27b93466f0{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69d27b93466f0{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69d27b93466f0{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090452993 vcex_69d27b93466f0\"><span class=\"vcex-heading-inner wpex-inline-block\">Healthcare<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Any organizations working in the healthcare space need to comply with HIPAA regulations.<\/p>\n<ul>\n<li aria-level=\"1\">Health plans<\/li>\n<li aria-level=\"1\">Health care clearinghouses<\/li>\n<li aria-level=\"1\">Health care providers<\/li>\n<li aria-level=\"1\">Business associates of any of the above (including YOU!)<\/li>\n<\/ul>\n<p><strong>Terms you need to know:<\/strong><\/p>\n<ul>\n<li aria-level=\"1\">HIPAA: Health Insurance Portability and Accountability Act of 1996<\/li>\n<li aria-level=\"1\">ePHI: Electronic protected health information<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69d27b93472cc{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69d27b93472cc{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69d27b93472cc{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69d27b93472cc{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090459083 vcex_69d27b93472cc\"><span class=\"vcex-heading-inner wpex-inline-block\">Education<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Any educational institution that receives federal funding of any kind must adhere to FERPA.<\/p>\n<ul>\n<li aria-level=\"1\">Public elementary schools and high schools<\/li>\n<li aria-level=\"1\">Private or charter elementary schools and high schools that receive any federal funding<\/li>\n<li aria-level=\"1\">State colleges and universities<\/li>\n<li aria-level=\"1\">Private colleges or universities that receive any federal funding<\/li>\n<li aria-level=\"1\">Any other educational organization that receives any federal funding<\/li>\n<\/ul>\n<p><strong>Terms you need to know:<\/strong><\/p>\n<ul>\n<li aria-level=\"1\">FERPA: Family Educational Rights and Privacy Act<\/li>\n<li aria-level=\"1\">PII: Personally identifiable information<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69d27b9347c3f{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69d27b9347c3f{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69d27b9347c3f{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69d27b9347c3f{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090464132 vcex_69d27b9347c3f\"><span class=\"vcex-heading-inner wpex-inline-block\">U.S. Government and Military<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>All U.S. Government agencies and their business associates must follow FISMA, which follows NIST recommendations. Basically, these organizations must adhere to NIST recommendations as rules.<\/p>\n<ul>\n<li aria-level=\"1\">Federal government agencies<\/li>\n<li aria-level=\"1\">Businesses providing services on the behalf of or to any federal government agency (including YOU!)<\/li>\n<\/ul>\n<p><strong>Terms you need to know:<\/strong><\/p>\n<ul>\n<li aria-level=\"1\">FISMA: Federal Information Security Management Act<\/li>\n<li aria-level=\"1\">NIST: National Institute of Standards and Technology<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1661794759383 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-animated-text.vcex_69d27b9348b7a{text-align:start;color:#1c1c1c;font-size:3.5em;}@media (max-width:1024px){.vcex-animated-text.vcex_69d27b9348b7a{font-size:2em;}}@media (max-width:959px){.vcex-animated-text.vcex_69d27b9348b7a{font-size:2em;}}@media (max-width:767px){.vcex-animated-text.vcex_69d27b9348b7a{font-size:2em;}}@media (max-width:479px){.vcex-animated-text.vcex_69d27b9348b7a{font-size:2em;}}<\/style><h2 class=\"vcex-animated-text vcex-module wpex-m-0 wpex-text-xl wpex-text-1 wpex-font-semibold wpex-leading-none vcex-typed-text-wrap wpex-text-left vc_custom_1664829708426 vcex_69d27b9348b7a\"><span class=\"vcex-typed-text-before vcex-before\">Five Steps to Compliance<\/span> <span class=\"vcex-typed-text-inner vcex-typed-text-css wpex-inline-block wpex-max-w-100\"><span class=\"screen-reader-text\"><\/span><span class=\"vcex-animated-text__placeholder vcex-ph wpex-inline-block wpex-invisible\"><\/span><span class=\"vcex-typed-text\" aria-hidden=\"true\" data-settings=\"{&quot;loop&quot;:false,&quot;showCursor&quot;:false,&quot;typeSpeed&quot;:40,&quot;backDelay&quot;:500,&quot;backSpeed&quot;:0,&quot;startDelay&quot;:2000}\" data-strings=\"[]\"><\/span><\/span><\/h2><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-3\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><figure class=\"vcex-image vcex-module\"><div class=\"vcex-image-inner wpex-relative wpex-inline-block overlay-parent overlay-parent-magnifying-hover overlay-h wpex-overflow-hidden overlay-ms\"><a href=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2.png\" class=\"wpex-lightbox\"><img width=\"1200\" height=\"1623\" src=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2.png\" class=\"vcex-image-img wpex-align-middle\" alt=\"\" decoding=\"async\" srcset=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2.png 1200w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2-222x300.png 222w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2-757x1024.png 757w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2-768x1039.png 768w, https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/Data_Security_Compliance_v2-1136x1536.png 1136w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\n<div class=\"magnifying-hover theme-overlay overlay-hide wpex-absolute wpex-inset-0 wpex-transition-all wpex-duration-300 wpex-text-white wpex-text-2xl wpex-flex wpex-items-center wpex-justify-center\" aria-hidden=\"true\">\n\t<span class=\"overlay-bg wpex-bg-black wpex-block wpex-absolute wpex-inset-0 wpex-opacity-60\"><\/span>\n\t<span class=\"wpex-relative wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M416 208c0 45.9-14.9 88.3-40 122.7L502.6 457.4c12.5 12.5 12.5 32.8 0 45.3s-32.8 12.5-45.3 0L330.7 376c-34.4 25.2-76.8 40-122.7 40C93.1 416 0 322.9 0 208S93.1 0 208 0S416 93.1 416 208zM208 352a144 144 0 1 0 0-288 144 144 0 1 0 0 288z\"\/><\/svg><\/span><\/div>\n<\/a><\/div><figcaption class=\"vcex-image-caption wpex-mt-10\">Click image to enlarge<\/figcaption><\/figure><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-9\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69d27b9349ffd{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69d27b9349ffd{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69d27b9349ffd{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69d27b9349ffd{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665009397492 vcex_69d27b9349ffd\"><span class=\"vcex-heading-inner wpex-inline-block\">One Path for All Industries<\/span><\/h3><div class=\"vc_row wpb_row vc_inner vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><span style=\"font-weight: 400;\">Despite different industries being required to follow differently named guidelines, there\u2019s a pretty good overlap for those information security items that IT really needs to worry about.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although there will be some personal information that may not fall under any compliance standards, from an IT perspective, it\u2019s safe to assume that any and all customer, employee or other personal information needs to be protected from the breach, accidental exposure, or other cybersecurity transgressions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order to obtain and maintain compliance to any industry or government-mandated information security protocol, you must have documented and validated data security policies and procedures that are in use by your company. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The five steps you need to follow as IT regarding cybersecurity policies and procedures are fairly standard.\u00a0<\/span><\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69d27b934afdb{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69d27b934afdb{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69d27b934afdb{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69d27b934afdb{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090019637 vcex_69d27b934afdb\"><span class=\"vcex-heading-inner wpex-inline-block\">1. Risk Analysis<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Risk analysis, sometimes also called\u00a0<i>gap analysis\u00a0<\/i>or\u00a0<i>security risk assessment<\/i>, is the first step toward developing a data security policy. Security risk assessments should be conducted annually, biannually, or any time something changes, such as the purchase of new equipment or expansion of company services.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_row wpb_row vc_inner vc_row-fluid vc_custom_1664841595083 wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>The purpose of risk analysis is to understand the existing system and identify gaps in policy and potential security risks. As explained by the\u00a0<a href=\"https:\/\/www.sans.org\/white-papers\/76\/\">SANS Institute<\/a>, the process should work to answer the following questions:<\/p>\n<ul>\n<li aria-level=\"1\">What needs to be protected?<\/li>\n<li aria-level=\"1\">Who\/What are the threats and vulnerabilities?<\/li>\n<li aria-level=\"1\">What are the implications if they were damaged or lost?<\/li>\n<li aria-level=\"1\">What is the value to the organization?<\/li>\n<li aria-level=\"1\">What can be done to minimize exposure to the loss or damage?<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Areas to review for proper security:<\/p>\n<ul>\n<li aria-level=\"1\">Workstation and server configurations<\/li>\n<li aria-level=\"1\">Physical security<\/li>\n<li aria-level=\"1\">Network infrastructure administration<\/li>\n<li aria-level=\"1\">System access controls<\/li>\n<li aria-level=\"1\">Data classification and management<\/li>\n<li aria-level=\"1\">Application development and maintenance<\/li>\n<li aria-level=\"1\">Existing and potential threats<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-4\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Methods of security to review:<\/p>\n<ul>\n<li aria-level=\"1\">Access and authentication: access should be physically unavailable to anyone who is not authorized<\/li>\n<li aria-level=\"1\">User account management<\/li>\n<li aria-level=\"1\">Network security<\/li>\n<li aria-level=\"1\">Monitoring<\/li>\n<li aria-level=\"1\">Segregation of duties<\/li>\n<li aria-level=\"1\">Physical security<\/li>\n<li aria-level=\"1\">Employee background checks<\/li>\n<li aria-level=\"1\">Confidentiality agreements<\/li>\n<li aria-level=\"1\">Security training<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p><a href=\"https:\/\/www.sans.org\/white-papers\/76\/\">This document from SANS Institute<\/a> gives excellent instructions for conducting a thorough risk analysis for your company.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_row wpb_row vc_inner vc_row-fluid wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69d27b934cb2e{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69d27b934cb2e{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69d27b934cb2e{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69d27b934cb2e{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665089999436 vcex_69d27b934cb2e\"><span class=\"vcex-heading-inner wpex-inline-block\">2. Development of Policies and Procedures<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Based on the outcome of the risk analysis conducted, information security policies and procedures for safeguarding data must be updated or, if none currently exist, written from scratch.<\/p>\n<p>Identify, develop and document:<\/p>\n<ul>\n<li aria-level=\"1\">A comprehensive plan outlining data security and cybersecurity policies<\/li>\n<li aria-level=\"1\">Individual staff responsibilities for maintaining data security<\/li>\n<li aria-level=\"1\">Tools to be used to minimize data security risks, such as security cameras, firewalls, or security software<\/li>\n<li aria-level=\"1\">Cybersecurity guidelines concerning the use of internet, intranet, and extranet systems<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69d27b934d6bb{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69d27b934d6bb{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69d27b934d6bb{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69d27b934d6bb{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090025298 vcex_69d27b934d6bb\"><span class=\"vcex-heading-inner wpex-inline-block\">3. Implementation<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Once your company&#8217;s information security policies and procedures have been identified, planned out and documented, they need to be implemented and followed.<\/p>\n<ul>\n<li aria-level=\"1\">Purchase security software and other tools that have been identified as necessary<\/li>\n<li aria-level=\"1\">Update existing software and operating systems that are out-of-date<\/li>\n<li aria-level=\"1\">Conduct mandatory security training and awareness programs for all employees, and require signatures on mandatory reading materials<\/li>\n<li aria-level=\"1\">Conduct background checks of all employees<\/li>\n<li aria-level=\"1\">Vet third-party providers to be sure that they maintain and document compliant information security protocols identical to or more robust than those in place within your company<\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69d27b934e00a{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69d27b934e00a{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69d27b934e00a{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69d27b934e00a{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090029908 vcex_69d27b934e00a\"><span class=\"vcex-heading-inner wpex-inline-block\">4. Validation<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>In order to prove that your company is compliant with industry regulations, you must have a third-party data security company validate your company\u2019s security protocols, procedures and the implementation of those policies and procedures. This should be done annually or biannually.<\/p>\n<p>This process can be pricey, time-consuming, and intrusive; however, this type of verification will both help your business to maintain data security and add value to your services for use by your customers.<\/p>\n<p>A\u00a0<a href=\"\/en-ca\/why-us\/certified-secure-data-recovery\/annual-soc-2-type-ii-audit\/\">SOC 2 Type II<\/a> security protocol can cover a large spectrum of industry-regulated data security requirements, including all of those discussed in this article: HIPAA, GLBA, SOX, FERPA, FISMA, and NIST.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-12 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69d27b934eb40{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69d27b934eb40{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69d27b934eb40{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69d27b934eb40{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1665090077473 vcex_69d27b934eb40\"><span class=\"vcex-heading-inner wpex-inline-block\">5. Enforcement<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Information security policies and procedures can be enforced through education and penalties.<\/p>\n<p>You may have noticed that education falls under both\u00a0<i>implementation<\/i>\u00a0and\u00a0<i>enforcement<\/i>. This is absolutely the most important part of your company\u2019s information security and must be offered continuously. Mandatory data security training and awareness programs must be scheduled for employees to ensure sensitive and confidential data is protected. Be sure that anybody who might touch protected data is trained on current policies and risks, and kept current as policies are updated or new risks are identified.<\/p>\n<p>For example, be sure that all relevant employees are aware of cybersecurity threats such as email phishing scams, how to identify them, what to do if somebody thinks they may be targeted, and what to do if they have become a victim, possibly exposing protected data. As new types of scams come into being, send company-wide emails detailing methods of identification and protection.<\/p>\n<p>The second part of enforcement is eliminating the temptation to ignore data security protocols and encouraging compliance. This can be done by issuing penalties, financial or otherwise, for those who do not follow important procedures.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1665012861811 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1665014565986 vc_column-gap-20 wpex-relative wpex-vc_row-has-fill no-bottom-margins wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-2\/5\"><div class=\"vc_column-inner vc_custom_1665014537840\"><div class=\"wpb_wrapper\"><style>.vcex-button.vcex_69d27b934feb8{color:#ffffff!important;}<\/style><div class=\"theme-button-wrap theme-button-expanded-wrap wpex-clr\"><a href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/partner-programs\/business\/\" class=\"vcex-button theme-button large align-left expanded sh-campaign-1304 hvr hvr-buzz-out expanded vcex_69d27b934feb8\"><span class=\"vcex-button-inner theme-button-inner wpex-flex wpex-flex-wrap wpex-items-center wpex-justify-center\"><span class=\"vcex-button-icon vcex-icon-wrap theme-button-icon-left\"><span class=\"wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 448 512\"><path d=\"M160 64c0-8.8 7.2-16 16-16s16 7.2 16 16V200c0 10.3 6.6 19.5 16.4 22.8s20.6-.1 26.8-8.3c3-3.9 7.6-6.4 12.8-6.4c8.8 0 16 7.2 16 16c0 10.3 6.6 19.5 16.4 22.8s20.6-.1 26.8-8.3c3-3.9 7.6-6.4 12.8-6.4c7.8 0 14.3 5.6 15.7 13c1.6 8.2 7.3 15.1 15.1 18s16.7 1.6 23.3-3.6c2.7-2.1 6.1-3.4 9.9-3.4c8.8 0 16 7.2 16 16l0 16V392c0 39.8-32.2 72-72 72H272 212.3h-.9c-37.4 0-72.4-18.7-93.2-49.9L50.7 312.9c-4.9-7.4-2.9-17.3 4.4-22.2s17.3-2.9 22.2 4.4L116 353.2c5.9 8.8 16.8 12.7 26.9 9.7s17-12.4 17-23V320 64zM176 0c-35.3 0-64 28.7-64 64V261.7C91.2 238 55.5 232.8 28.5 250.7C-.9 270.4-8.9 310.1 10.8 339.5L78.3 440.8c29.7 44.5 79.6 71.2 133.1 71.2h.9H272h56c66.3 0 120-53.7 120-120V288l0-16c0-35.3-28.7-64-64-64c-4.5 0-8.8 .5-13 1.3c-11.7-15.4-30.2-25.3-51-25.3c-6.9 0-13.5 1.1-19.7 3.1C288.7 170.7 269.6 160 248 160c-2.7 0-5.4 .2-8 .5V64c0-35.3-28.7-64-64-64zm48 304c0-8.8-7.2-16-16-16s-16 7.2-16 16v96c0 8.8 7.2 16 16 16s16-7.2 16-16V304zm48-16c-8.8 0-16 7.2-16 16v96c0 8.8 7.2 16 16 16s16-7.2 16-16V304c0-8.8-7.2-16-16-16zm80 16c0-8.8-7.2-16-16-16s-16 7.2-16 16v96c0 8.8 7.2 16 16 16s16-7.2 16-16V304z\"\/><\/svg><\/span><\/span>Vet DriveSavers<\/span><\/a><\/div> <div class=\"vcex-spacing wpex-w-100 wpex-clear\"><\/div><style>.vcex-bullets.vcex_69d27b935030b .vcex-bullets-icon{color:#e31f26;}.vcex-bullets.vcex_69d27b935030b{color:#222222;}<\/style><div class=\"vcex-module vcex-bullets vcex-bullets--horizontal wpex-gap-10 custom-icon vcex_69d27b935030b\">\n<ul role=\"list\">\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512zM369 209L241 337c-9.4 9.4-24.6 9.4-33.9 0l-64-64c-9.4-9.4-9.4-24.6 0-33.9s24.6-9.4 33.9 0l47 47L335 175c9.4-9.4 24.6-9.4 33.9 0s9.4 24.6 0 33.9z\"\/><\/svg><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Security<\/div><\/div><\/li>\n<li><div class=\"vcex-bullets-ci-wrap wpex-inline-flex\"><span class=\"vcex-bullets-icon-wrap vcex-icon-wrap wpex-mr-10\"><span class=\"vcex-bullets-icon vcex-icon wpex-icon\" aria-hidden=\"true\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 512 512\"><path d=\"M256 512A256 256 0 1 0 256 0a256 256 0 1 0 0 512zM369 209L241 337c-9.4 9.4-24.6 9.4-33.9 0l-64-64c-9.4-9.4-9.4-24.6 0-33.9s24.6-9.4 33.9 0l47 47L335 175c9.4-9.4 24.6-9.4 33.9 0s9.4 24.6 0 33.9z\"\/><\/svg><\/span><\/span><div class=\"vcex-content wpex-flex-grow\">Industry compliance<\/div><\/div><\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-3\/5\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div style=\"color:#222222;font-size:25px;font-weight:500;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element wpex-antialiased\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Industry compliance and overall data security will <strong>help maintain the safety of your organization\u2019s data<\/strong>, and add a great selling point when pursuing clients.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_custom_1665012861811 vc_row-o-content-middle vc_row-flex wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative wpex-vc_row-has-fill wpex-vc-reset-negative-margin\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"vc_separator wpb_content_element vc_separator_align_center vc_sep_width_100 vc_sep_dashed vc_sep_border_width_3 vc_sep_pos_align_center vc_separator_no_text vc_sep_color_white wpb_content_element  wpb_content_element\" ><span class=\"vc_sep_holder vc_sep_holder_l\"><span class=\"vc_sep_line\"><\/span><\/span><span class=\"vc_sep_holder vc_sep_holder_r\"><span class=\"vc_sep_line\"><\/span><\/span>\n<\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid vc_column-gap-25 wpex-vc-full-width-row wpex-vc-full-width-row--centered wpex-relative\"><div class=\"wpb_column vc_column_container vc_col-sm-6 vc_hidden-md vc_hidden-sm vc_hidden-xs\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><style>.vcex-heading.vcex_69d27b9351563{font-size:2em;font-family:Oswald;font-weight:600;line-height:1.2;}@media (max-width:959px){.vcex-heading.vcex_69d27b9351563{font-size:1.5em;}}@media (max-width:767px){.vcex-heading.vcex_69d27b9351563{font-size:1.5em;}}@media (max-width:479px){.vcex-heading.vcex_69d27b9351563{font-size:1.5em;}}<\/style><h3 class=\"vcex-heading vcex-heading-plain vcex-module wpex-heading wpex-text-2xl wpex-h3 vc_custom_1664841128577 vcex_69d27b9351563\"><span class=\"vcex-heading-inner wpex-inline-block\">Further Reading<\/span><\/h3>\n\t<div style=\"color:#222222;\" class=\"wpb_text_column has-custom-color wpex-child-inherit-color wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<ul>\n<li><a href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/white-paper-cybersecurity-report-the-overlooked-risk-in-third-party-data-recovery\/\">Cybersecurity Report: The Overlooked Risk in Third-party Data Recovery<\/a><\/li>\n<li class=\"translation-block\"><span class=\"vcex-heading-inner wpex-inline-block\">Why is <span class=\"wpex-font-semibold\" style=\"color:#E31F26\">Data Security<\/span> Important During Data Recovery?<\/span><\/li>\n<li><a href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/why-us\/certified-secure-data-recovery\/annual-soc-2-type-ii-audit\/\">Audited and Certified: SOC 2 Type II<\/a><\/li>\n<li><a href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/why-us\/certified-secure-data-recovery\/hipaa-security-compliance\/\">HIPAA Security Compliance<\/a><\/li>\n<li><a href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/why-us\/certified-secure-data-recovery\/hipaa-security-compliance\/\">Video: DriveSavers Security During Data Recovery<\/a><\/li>\n<\/ul>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><\/div><\/div><\/div><\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"Whether you work for an organization controlled by compliance standards or you are an independent IT looking to build your enterprise business, industry regulations regarding data security, also known as information security, can sometimes cause a real headache. Keep reading for a single set of guidelines to follow that can be applied to all industry&hellip;","protected":false},"author":25,"featured_media":62133,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[264],"tags":[143],"post_series":[],"class_list":["post-45592","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-security","entry","has-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Data Security Compliance Cheat Sheet<\/title>\n<meta name=\"description\" content=\"Whether you work for an organization controlled by compliance standards or you are an independent IT looking to build your enterprise business, industry regulations regarding data security, also known as information security, can sometimes cause a real headache. Here\u2019s a single set of guidelines to follow that can be applied to all industry regulations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/data-security-compliance-a-cheat-sheet-for-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security Compliance: A Cheat Sheet for IT\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/data-security-compliance-a-cheat-sheet-for-it\/\" \/>\n<meta property=\"og:site_name\" content=\"DriveSavers Data Recovery Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DriveSavers\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-06T19:59:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-24T14:14:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/data_thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mike Cobb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:site\" content=\"@drivesavers\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Cobb\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/\"},\"author\":{\"name\":\"Mike Cobb\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/71a038c3b180b1f2df821d2b015b8ee6\"},\"headline\":\"Data Security Compliance: A Cheat Sheet for IT\",\"datePublished\":\"2022-10-06T19:59:00+00:00\",\"dateModified\":\"2026-03-24T14:14:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/\"},\"wordCount\":3131,\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/data_thumb.jpg\",\"keywords\":[\"security\"],\"articleSection\":[\"DriveSavers Blog\"],\"inLanguage\":\"en-CA\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/\",\"name\":\"Data Security Compliance Cheat Sheet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/data_thumb.jpg\",\"datePublished\":\"2022-10-06T19:59:00+00:00\",\"dateModified\":\"2026-03-24T14:14:48+00:00\",\"description\":\"Whether you work for an organization controlled by compliance standards or you are an independent IT looking to build your enterprise business, industry regulations regarding data security, also known as information security, can sometimes cause a real headache. Here\u2019s a single set of guidelines to follow that can be applied to all industry regulations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/data_thumb.jpg\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2018\\\/10\\\/data_thumb.jpg\",\"width\":1200,\"height\":627},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/blog\\\/data-security-compliance-a-cheat-sheet-for-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Security Compliance: A Cheat Sheet for IT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#website\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"name\":\"DriveSavers Data Recovery Services\",\"description\":\"The Worldwide Leader in Data Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#organization\",\"name\":\"DriveSavers Data Recovery\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"contentUrl\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/Logo-01.png\",\"width\":1092,\"height\":1087,\"caption\":\"DriveSavers Data Recovery\"},\"image\":{\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DriveSavers\",\"https:\\\/\\\/x.com\\\/drivesavers\",\"https:\\\/\\\/www.instagram.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/drivesavers-data-recovery\\\/\",\"https:\\\/\\\/www.pinterest.com\\\/drivesavers\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCBlynLMdFWQgid-Gwm0zJ1A\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/DriveSavers\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/#\\\/schema\\\/person\\\/71a038c3b180b1f2df821d2b015b8ee6\",\"name\":\"Mike Cobb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g\",\"caption\":\"Mike Cobb\"},\"description\":\"Mike Cobb, Director of Engineering and CISO As Director of Engineering, Mike Cobb manages the day-to-day operations of the Engineering Department, including the physical and logical recoveries of rotational media, SSDs, smart devices and flash media. He also oversees the R&amp;D efforts for past, present, and future storage technologies. Mike encourages growth and ensures that each of the departments and their engineers continues to gain knowledge in their field. Each DriveSavers engineer has been trained to ensure the successful and complete recovery of data is their top priority. As Chief Information Security Officer (CISO), Mike oversees cybersecurity at DriveSavers, including maintaining and updating security certifications such as SOC 2 Type II compliance, coordinating company security policy, and employee cybersecurity education. Mike joined DriveSavers in 1994 and has a B.S. degree in Computer Science from the University of California, Riverside.\",\"sameAs\":[\"http:\\\/\\\/\\\/\"],\"url\":\"https:\\\/\\\/drivesaversdatarecovery.com\\\/en-ca\\\/author\\\/mikecobb\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Data Security Compliance Cheat Sheet","description":"Whether you work for an organization controlled by compliance standards or you are an independent IT looking to build your enterprise business, industry regulations regarding data security, also known as information security, can sometimes cause a real headache. Here\u2019s a single set of guidelines to follow that can be applied to all industry regulations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/data-security-compliance-a-cheat-sheet-for-it\/","og_locale":"en_US","og_type":"article","og_title":"Data Security Compliance: A Cheat Sheet for IT","og_url":"https:\/\/drivesaversdatarecovery.com\/en-ca\/blog\/data-security-compliance-a-cheat-sheet-for-it\/","og_site_name":"DriveSavers Data Recovery Services","article_publisher":"https:\/\/www.facebook.com\/DriveSavers","article_published_time":"2022-10-06T19:59:00+00:00","article_modified_time":"2026-03-24T14:14:48+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/data_thumb.jpg","type":"image\/jpeg"}],"author":"Mike Cobb","twitter_card":"summary_large_image","twitter_creator":"@drivesavers","twitter_site":"@drivesavers","twitter_misc":{"Written by":"Mike Cobb","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#article","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/"},"author":{"name":"Mike Cobb","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/71a038c3b180b1f2df821d2b015b8ee6"},"headline":"Data Security Compliance: A Cheat Sheet for IT","datePublished":"2022-10-06T19:59:00+00:00","dateModified":"2026-03-24T14:14:48+00:00","mainEntityOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/"},"wordCount":3131,"publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/data_thumb.jpg","keywords":["security"],"articleSection":["DriveSavers Blog"],"inLanguage":"en-CA"},{"@type":"WebPage","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/","url":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/","name":"Data Security Compliance Cheat Sheet","isPartOf":{"@id":"https:\/\/drivesaversdatarecovery.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#primaryimage"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#primaryimage"},"thumbnailUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/data_thumb.jpg","datePublished":"2022-10-06T19:59:00+00:00","dateModified":"2026-03-24T14:14:48+00:00","description":"Whether you work for an organization controlled by compliance standards or you are an independent IT looking to build your enterprise business, industry regulations regarding data security, also known as information security, can sometimes cause a real headache. Here\u2019s a single set of guidelines to follow that can be applied to all industry regulations.","breadcrumb":{"@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#primaryimage","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/data_thumb.jpg","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2018\/10\/data_thumb.jpg","width":1200,"height":627},{"@type":"BreadcrumbList","@id":"https:\/\/drivesaversdatarecovery.com\/blog\/data-security-compliance-a-cheat-sheet-for-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/drivesaversdatarecovery.com\/"},{"@type":"ListItem","position":2,"name":"Data Security Compliance: A Cheat Sheet for IT"}]},{"@type":"WebSite","@id":"https:\/\/drivesaversdatarecovery.com\/#website","url":"https:\/\/drivesaversdatarecovery.com\/","name":"DriveSavers Data Recovery Services","description":"The Worldwide Leader in Data Recovery","publisher":{"@id":"https:\/\/drivesaversdatarecovery.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drivesaversdatarecovery.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Organization","@id":"https:\/\/drivesaversdatarecovery.com\/#organization","name":"DriveSavers Data Recovery","url":"https:\/\/drivesaversdatarecovery.com\/","logo":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/","url":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","contentUrl":"https:\/\/drivesaversdatarecovery.com\/wp-content\/uploads\/2021\/08\/Logo-01.png","width":1092,"height":1087,"caption":"DriveSavers Data Recovery"},"image":{"@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DriveSavers","https:\/\/x.com\/drivesavers","https:\/\/www.instagram.com\/drivesavers\/","https:\/\/www.linkedin.com\/company\/drivesavers-data-recovery\/","https:\/\/www.pinterest.com\/drivesavers\/","https:\/\/www.youtube.com\/channel\/UCBlynLMdFWQgid-Gwm0zJ1A","https:\/\/en.wikipedia.org\/wiki\/DriveSavers"]},{"@type":"Person","@id":"https:\/\/drivesaversdatarecovery.com\/#\/schema\/person\/71a038c3b180b1f2df821d2b015b8ee6","name":"Mike Cobb","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/45c8d091f4e2a84113483109e20b50ac463596024c46f59a7ebcbfa90985755e?s=96&d=blank&r=g","caption":"Mike Cobb"},"description":"Mike Cobb, Director of Engineering and CISO As Director of Engineering, Mike Cobb manages the day-to-day operations of the Engineering Department, including the physical and logical recoveries of rotational media, SSDs, smart devices and flash media. He also oversees the R&amp;D efforts for past, present, and future storage technologies. Mike encourages growth and ensures that each of the departments and their engineers continues to gain knowledge in their field. Each DriveSavers engineer has been trained to ensure the successful and complete recovery of data is their top priority. As Chief Information Security Officer (CISO), Mike oversees cybersecurity at DriveSavers, including maintaining and updating security certifications such as SOC 2 Type II compliance, coordinating company security policy, and employee cybersecurity education. Mike joined DriveSavers in 1994 and has a B.S. degree in Computer Science from the University of California, Riverside.","sameAs":["http:\/\/\/"],"url":"https:\/\/drivesaversdatarecovery.com\/en-ca\/author\/mikecobb\/"}]}},"_links":{"self":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/45592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/users\/25"}],"replies":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/comments?post=45592"}],"version-history":[{"count":3,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/45592\/revisions"}],"predecessor-version":[{"id":83525,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/posts\/45592\/revisions\/83525"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/media\/62133"}],"wp:attachment":[{"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/media?parent=45592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/categories?post=45592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/tags?post=45592"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/drivesaversdatarecovery.com\/en-ca\/wp-json\/wp\/v2\/post_series?post=45592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}