(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Compliance & Security Solutions

Carceron Provides Regulatory Compliance Technology Solutions Carceron can provide your business with a wide range of security solutions that can take your company one step closer to compliance for a variety of government regulations. Save your business embarassment and costly fines associated with violations. Specific solutions include:

Email Archival

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Archives all inbound and outbound email communication in a regulatary-complient manner. The amount of email that must be archived varies by regulation from 2-7 years
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

 

Email Encryption

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Encrypts email communications to protect against the exposure of confidential or sensitive personal, financial or patient heal information (PHI)
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

 

Off Site Backup

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Secure, off site backup and archival of electronic files. Files are backed up over an encrypted Internet connection to a secure backup server in a regulatory compliant data center with physical and logical access controls.
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

 

Disk Encryption

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Encrypts data hard drives and to protect against the exposure of confidential or sensitive personal, financial or patient heal information (PHI). Especially important for mobile devices such as laptops.
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

 

Two-Factor Authentication

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Adds a second process of authentication to gain access to confidential or sensitive personal, financial or patient heal information (PHI) that you have on computer systems. Examples include: password+fingerprint scan, password + generated key, etc.
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

Is Your Data Safe?

Do you have questions about IT Services and what they can do for your company? Fill out this simple form with your questions and our team respond promptly!
*Email
*First Name
*Last Name
*Phone
Comments