|By PR Newswire||
|August 21, 2014 04:57 PM EDT||
TAMPA, Fla., Aug. 21, 2014 /PRNewswire/ -- A legislative survey by 360 Advanced P.A. shows the U.S. Congress and some states are considering legislation that would require organizations managing databases of personal information to put in place safeguards against hacking – or face significant fines after a breach.
In its analysis of data assembled by the National Conference of State Legislatures (www.ncsl.org) and www.govtrack.us, 360 Advanced concluded that with ever-increasing numbers of data breaches, lawmakers are determined to hold accountable firms managing personal information.
"Our analysis of pending legislation requiring data security safeguards and stiff penalties for non-compliance sends a chill across an entire industry that is already moving swiftly toward voluntary compliance on numerous levels," said Dan Collins, President of 360 Advanced, P.A. (www.360advanced.com), a national, multi-service, licensed Certified Public Accountant (CPA) and Qualified Security Assessor (QSA) firm that specializes in integrated compliance solutions for service providers. "It is one thing for state and federal legislators to strengthen data breach reporting requirements, which is indeed appropriate, but it's another matter entirely when they consider legislation that would punish service providers for being hacked."
In the U.S. Congress, three pending bills, S1976, S2378 and HR4711 all outline the responsibilities of personal information database service organizations to take precautions to protect personal data from being hacked, and provide for severe penalties of up to $5 million for failure to comply.
The states of California, Florida, Iowa, Kentucky, Louisiana, Minnesota, and New Mexico are considering legislation mandating steps that must be taken to protect consumer information, with penalties for non-compliance, while 12 other states are toughening data breach reporting requirements. Visit http://www.ncsl.org/research/telecommunications-and-information-technology/overview-security-breaches.aspx for more information.
ABOUT 360 ADVANCED PA
360 Advanced's services are provided, but not limited to, the following industries: Hosted and Managed IT, Data Center and Colocation, Software as a Service (SAAS), Security and, Development, Healthcare, Financial Services, Insurance, HR | Payroll | PEO, Legal and Collections, Bulk Mail Printing and Distribution, and Business Process Outsourcing.
Services provided by 360 Advanced include SOC 1: SSAE 16 (SAS 70); SOC 2; SOC 3; PCI DSS, Experian E13PA; HIPAA Security/HITECH; ISO 27001, 2700; BITS shared Assessment; Microsoft Vendor Policy; Security Consulting.
SOURCE 360 Advanced P.A.
Sep. 3, 2015 08:00 AM EDT
The Internet of Things is in the early stages of mainstream deployment but it promises to unlock value and rapidly transform how organizations manage, operationalize, and monetize their assets. IoT is a complex structure of hardware, sensors, applications, analytics and devices that need to be able to communicate geographically and across all functions. Once the data is collected from numerous endpoints, the challenge then becomes converting it into actionable insight.
Sep. 3, 2015 07:45 AM EDT
Red Hat is investing in Tesora, the number one contributor to OpenStack Trove Database as a Service (DBaaS) also ranked among the top 20 companies contributing to OpenStack overall. Tesora, the company bringing OpenStack Trove Database as a Service (DBaaS) to the enterprise, has announced that Red Hat and others have invested in the company as a part of Tesora's latest funding round. The funding agreement expands on the ongoing collaboration between Tesora and Red Hat, which dates back to Febr...
Sep. 3, 2015 07:30 AM EDT Reads: 414
Sep. 3, 2015 07:30 AM EDT
Enterprises can achieve rigorous IT security as well as improved DevOps practices and Cloud economics by taking a new, cloud-native approach to application delivery. Because the attack surface for cloud applications is dramatically different than for highly controlled data centers, a disciplined and multi-layered approach that spans all of your processes, staff, vendors and technologies is required. This may sound expensive and time consuming to achieve as you plan how to move selected applicati...
Sep. 3, 2015 07:30 AM EDT Reads: 122
Sep. 3, 2015 06:30 AM EDT Reads: 500
Sep. 3, 2015 06:00 AM EDT
Sep. 3, 2015 05:15 AM EDT Reads: 2,018
Sep. 3, 2015 05:00 AM EDT Reads: 1,585
Sep. 3, 2015 05:00 AM EDT Reads: 493
Sep. 3, 2015 04:45 AM EDT Reads: 521
Sep. 3, 2015 04:00 AM EDT Reads: 731
Sep. 3, 2015 02:30 AM EDT Reads: 1,685
Sep. 3, 2015 01:00 AM EDT Reads: 1,642
SYS-CON Events announced today that the "Second Containers & Microservices Expo" will take place November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Containers and microservices have become topics of intense interest throughout the cloud developer and enterprise IT communities.
Sep. 2, 2015 11:45 PM EDT Reads: 642