(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Compliance & Security Solutions

Carceron Provides Regulatory Compliance Technology Solutions Carceron can provide your business with a wide range of security solutions that can take your company one step closer to compliance for a variety of government regulations. Save your business embarassment and costly fines associated with violations. Specific solutions include:

Email Archival

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Archives all inbound and outbound email communication in a regulatary-complient manner. The amount of email that must be archived varies by regulation from 2-7 years
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

 

Email Encryption

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Encrypts email communications to protect against the exposure of confidential or sensitive personal, financial or patient heal information (PHI)
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

 

Off Site Backup

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Secure, off site backup and archival of electronic files. Files are backed up over an encrypted Internet connection to a secure backup server in a regulatory compliant data center with physical and logical access controls.
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

 

Disk Encryption

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Encrypts data hard drives and to protect against the exposure of confidential or sensitive personal, financial or patient heal information (PHI). Especially important for mobile devices such as laptops.
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time

 

Two-Factor Authentication

  • Relevant Regulations: HITECH, HIPAA, SOX, GLB, FRCP, FINRA
  • Description: Adds a second process of authentication to gain access to confidential or sensitive personal, financial or patient heal information (PHI) that you have on computer systems. Examples include: password+fingerprint scan, password + generated key, etc.
  • Possible Penalties: Full Disclosure (publicly admiting a breach), Monetary Fines, Jail Time