top of page

Special Policies

These special policies are important and different aspects of cyber security. For example what they protect, how they protect,  and who they protect from cyber threats and data leaks. Below are the very special ones. The policies that shape the field of cyber.

Enjoy!

HIPAA

Focuses on the compliance of PHI (Personal health information). Provides guidelines for protecting sensitive data of patients and other important information. Learn how to stay compliant. 

HIPAA_Compliance_for_SaaS_cover_web_1400x800.png.webp
130fd0cf-blog_pci-compliance_1200x628.jpg

PCI DSS

A policy for organizations that handle credit card information and transactions.

SOC 2

Stands for Service Organization Control 2. SOC 2 policy was developed by the American institute of CPAs. Yes accounting CPAs. This policy is basically a audit, manage, and reporting standard.

soc-2-compliance.png
6215666eb305fc47e173c65f_GLBA Compliance (1) (1) (1).png

GLBA

An act  for which companies must  disclose how they will handle your data and information.

COPPA

Stands for Children Online Privacy Protection Act. Primary purpose of this policy is to place parents in control over what information is connected released  and accessed from their little ones. This policy meant for companies to abide by. 

COPPA.png
bottom of page