Compliance

Data Security Compliance Overview

Global Data Vault is sensitive to the fact that our customers are subject to numerous internal controls, such as HIPAA and PCI data security compliance, and other stringent national data security regulations. To help you meet all of your compliance and regulatory requirements, we have adopted policies and procedures based on the following standards:

  • Information Technology Infrastructure Library (ITIL)
  • Health Insurance Portability and Accountability Act (HIPAA) Security Rule
  • Payment Card Industry (PCI) Data Security Standard v2.0
  • Defense Federal Acquisition Regulation Supplement (DFARS)

Our data centers adopt additional control specifications including aspects of:

  • ISO/IEC 27000 series
  • NIST 800-53
  • Federal Information Security Management Act (FISMA)
  • Gramm-Leach-Bliley Act (GLBA) Interagency Guidelines
  • Trust Services Principles and Criteria

Details about our specific controls and audit reports may be found under the various sections of our Security and Compliance Overview.

And should your organization have additional data security compliance or unique needs, we can often build a specific solution to fit those requirements.

 

The Case for Office 365 Backup

In the wake of Microsoft's September 4 - September 5 South Central U. S. outage for Office 365 and Azure, it's worth asking, should you be concerned with backup of your Office 365 data? It's your data, and while Microsoft normally does a good job with protecting it,...

Counting down the worst cyber security breaches of 2018 – #4

Fitness apparel manufacturer Under Armour gave us a good example of how companies can try to protect their user’s data but often fail to fully cover everything that needs protecting. The information that was stolen from Under Armour is minor compared to some of the...

Global Data Vault’s Mid-Year Count-Down of the Worst Cybersecurity Breaches

Number 5: VPNFilter More and more, our business environments are connected to the cloud. The transmission of data and the speed to which it can be accessed is critical to business intelligence and competitive advantage. When that data becomes attractive to hackers,...