Differences
This shows you the differences between two versions of the page.
| — | compliance [2025_11_24 22:23] (current) – created - external edit 127.0.0.1 | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ====== Compliance Standards ====== | ||
| + | ===== GDPR ===== | ||
| + | |||
| + | Our products and services make it easier for our customers to comply with the European Union’s General Data Protection Regulation (GDPR). | ||
| + | |||
| + | The GDPR, which became active May 25, 2018, gives individuals (data subjects) in the European Union more control (rights) over how their personal data is used, and places obligations on businesses that process that data. The GDPR calls businesses that determine what and how personal data is processed ‘data controllers’. Businesses that handle personal data only under the direction of a data controller are called ‘data processors’. Data controllers and data processors each have different obligations under GDPR. | ||
| + | |||
| + | In different scenarios, with different categories of data, Access Anywhere and our customers may play roles either as a data controller or data processor. | ||
| + | |||
| + | ==== Software (Access Anywhere) ==== | ||
| + | |||
| + | Organizations who run Access Anywhere software in their own data centers, or on cloud platforms such as AWS EC2, Google Compute or Azure, are determining how personal data will be processed. Under GDPR, they are classified as data controllers. | ||
| + | |||
| + | For information on how our software supports data controllers see [[gdpr-compliance]]. | ||
| + | |||
| + | ==== CCPA ==== | ||
| + | |||
| + | [[http:// | ||
| + | |||
| + | Companies are required to comply with the CCPA if they comply with any of the following: | ||
| + | |||
| + | |||
| + | (i) They have gross revenues over $25M | ||
| + | |||
| + | (ii) They are a for-profit company that does business in California and collect the information of more than 50,000 consumers, devices or households. | ||
| + | |||
| + | (iii) 50% of their income is derived from selling personal information. | ||
| + | |||
| + | Unlike the GDPR the CCPA doesn’t require companies to go through steps such as data collection consent, having a valid reason to collect user information, | ||
| + | |||
| + | The Access Anywhere provides functionality that helps in satisfying CCPA requirements such as providing a mechanism to understand ‘who’ is accessing data, ‘when’, and ‘how’ through a combination of Access Anywhere' | ||
| + | |||
| + | Additionally when connected to Access Anywhere data content is indexed so that it can be checked for PII / PHI which can then be flagged and quarantined until it can be dealt with. | ||
| + | |||
| + | |||
| + | ===== Encryption (FIPS) ===== | ||
| + | |||
| + | Access Anywhere product’s cryptographic module has been validated by a third-party, | ||
| + | The validation registration is [No. 4854](https:// | ||
| + | |||
| + | For more information see [[cloudencryption]]. | ||
| + | |||
| + | ===== Healthcare ===== | ||
| + | |||
| + | HIPAA and HITECH are U.S. Federal Government standards for the security and privacy of Protected Health Information (PHI). HIPAA and HITECH impose requirements related to the use and disclosure of PHI, appropriate safeguards to protect PHI, individual rights, and administrative responsibilities. For more information on HIPAA and HITECH, visit [http:// | ||
| + | |||
| + | General Compliance guidelines for HIPAA | ||
| + | |||
| + | * | ||
| + | * | ||
| + | * | ||
| + | * | ||
| + | |||
| + | Ways in which the Access Anywhere Cloud Appliance satisfies HIPAA: | ||
| + | |||
| + | **Data Access**: | ||
| + | |||
| + | “Allow access only to those persons or software programs that have been granted access right.†(Section 164.312(a)(2)(1)) | ||
| + | |||
| + | **Remote / Offsite Access to data**: Access Anywhere provides a service which can be configured to be part of a disaster recovery plan enabling data to be accessed in the event of fire, flood, | ||
| + | |||
| + | ”Establish (and implement as needed) policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, and natural disaster) that damages systems that contain electronic protected health information.†(HIPAA, Section 164.308(a)(7)(i)). | ||
| + | |||
| + | **Event Logging**: | ||
| + | |||
| + | **Encryption**: | ||
| + | |||
| + | **Disclaimer** | ||
| + | |||
| + | This information is not intended to constitute legal advice. You are advised to seek the advice of counsel regarding compliance with HIPAA or refer to the HIPAA section of the U.S. Department of Health and Human Services' | ||
| + | |||
| + | [[https:// | ||
| + | |||
| + | ===== Auditing & Family Education Rights & Privacy Act (FERPA) ===== | ||
| + | |||
| + | FERPA is the federal privacy law for educational institutions and has regulatory compliance requirements for student educational records. | ||
| + | |||
| + | The Access Anywhere' | ||
| + | |||
| + | Note that FERPA compliance regulations specifically prohibit educational institutions from disclosing " | ||
| + | |||
| + | ### Also See | ||
| + | |||
| + | [[server: | ||
| + | [[security|Security Framework]] | ||