Contact us!
(770) 424-3393

Compliance & Security Solutions

Carceron Provides Regulatory Compliance Technology Solutions Carceron can provide your business with a wide range of security solutions that can take your company one step closer to compliance for a variety of government regulations. Save your business embarassment and costly fines associated with violations. Specific solutions include:

Email Archival

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Archives all inbound and outbound email communication in a regulatary-complient manner. The amount of email that must be archived varies by regulation from 2-7 years
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

 

Email Encryption

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Encrypts email communications to protect against the exposure of confidential or sensitive personal, financial or patient heal information (PHI)
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

 

Off Site Backup

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Secure, off site backup and archival of electronic files. Files are backed up over an encrypted Internet connection to a secure backup server in a regulatory compliant data center with physical and logical access controls.
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

 

Disk Encryption

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Encrypts data hard drives and to protect against the exposure of confidential or sensitive personal, financial or patient heal information (PHI). Especially important for mobile devices such as laptops.
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

 

Two-Factor Authentication

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Adds a second process of authentication to gain access to confidential or sensitive personal, financial or patient heal information (PHI) that you have on computer systems. Examples include: password+fingerprint scan, password + generated key, etc.
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

Latest Blog Entry

3 Useful Mobile Apps To Take Your Business on the Go
The world is changing as technology grows ever more mobile. Cell phones have gone from bulky, large pieces of hardware to smaller, more compact specimens. Fifteen years ago, if you were to tell someon...
Continue Reading...

Latest News

Contact Us

Learn more about what Carceron can do for your business.

callphone

Call us today    (770) 424-3393

3200 Cobb Galleria Pkwy
Suite #255
Atlanta, Georgia 30339

 

facebook twitter linkedin youtube youtube #