Insurance Data Security Model Law, NAIC MDL-668AD ID: 2920Status: ReleasedAvailability: FreeCitation Format: ¶ (Numbered Paragraphs)Document Type: Insurance Data Security Model Law, NAIC MDL-668Originator: National Association of Insurance CommissionersParent Category: North AmericaEffective Date: Not DefinedLanguage: engClick here to launch this Authority Document in the Common ...
Read MoreInsurance Data Security Model Law, NAIC MDL-668AD ID: 2920Status: ReleasedAvailability: FreeCitation Format: ¶ (Numbered Paragraphs)Document Type: Insurance Data Security Model Law, NAIC MDL-668Originator: National Association of Insurance CommissionersParent Category: North AmericaEffective Date: Not DefinedLanguage: engClick here to launch this Authority Document in the Common ...
Read MorePayment Card Industry (PCI) Data Security Standard, Requirements and Security Assessment ProceduresAD ID: 3315Status: ReleasedAvailability: FreeCitation Format: § (Legal) and ¶ (for bulleted Paragraphs)Document Type: Payment Card Industry (PCI) Data Security Standard, Requirements and Security Assessment ProceduresOriginator: PCI Security Standards CouncilParent ...
Read MoreISO 37301:2021 Compliance management systems — Requirements with guidance for use, First EditionAD ID: 3388Status: ReleasedAvailability: For PurchaseCitation Format: § (Legal) and ¶ (for bulleted Paragraphs)Document Type: ISO 37301:2021 Compliance management systems — Requirements with guidance for use, First EditionOriginator: International ...
Read MoreGuidelines on OutsourcingAD ID: 3370Status: ReleasedAvailability: FreeCitation Format: ¶ (Numbered Paragraphs)Document Type: Guidelines on OutsourcingOriginator: Monetary Authority of SingaporeParent Category: AsiaEffective Date: 2018-10-05Language: engClick here to launch this Authority Document in the Common Controls HubThis Authority Document has 285 citations mapped to 148 UCF ...
Read MoreIEC 62443-4-2: Security for industrial automation and control systems – Part 4-2: Technical security requirements for IACS componentsAD ID: 3349Status: ReleasedAvailability: For PurchaseCitation Format: ¶ (Numbered Paragraphs)Document Type: IEC 62443-4-2: Security for industrial automation and control systems – Part 4-2: ...
Read MoreISO 27001:2013, Information Technology – Security Techniques – Information Security Management Systems – RequirementsAD ID: 1367Status: ReleasedAvailability: For PurchaseCitation Format: § (Legal) and ¶ (Para)Document Type: ISO 27001:2013, Information Technology – Security Techniques – Information Security Management Systems – RequirementsOriginator: International ...
Read MoreGuidelines for Reducing and Mitigating Hacking Risks Associated with Internet TradingAD ID: 3364Status: ReleasedAvailability: With MembershipCitation Format: ID (Reference ID)Document Type: Guidelines for Reducing and Mitigating Hacking Risks Associated with Internet TradingOriginator: Securities and Futures CommissionParent Category: AsiaEffective Date: Not DefinedLanguage: engClick here to ...
Read More