Security Audit Program -- Security Compliance

Security Audit ProgramRegister Security Audit Program - After you complete the form below, you will be directed to a page that will allow you to download the Table of Contents and selected pages of the Security Audit Program.

Please note that you are required to enter your e-mail address, your first name, and your last name. You will receive a copy of our next newsletter and at that time you will have an option to opt out of any future mailings from us.

By your completing this form you agree to honor our copyright and to receive at least one of our newsletters.

All fields are required.

Security Audit Program CIOs can use as a benchmark - Many organizations have to respond to the queries of internal or external auditors and demonstrate that access to their unstructured data is being properly controlled. Questions such as the following from auditors are not uncommon: How do you know who can access this folder with financial/customer/sensitive data in it? Who authorized a user to have access permission to a file and how? If a key file was deleted, how would you know it happened, or who did it? Who were the last people to access a critical folder, and what did they do? How do you make sure that the right people have access to your data?

Security - Privacy - Compliance Management Issues

When dealing with cloud data and/or data that is accessed via the Internet, the enterprise must be aware of all mandated requirements for the location of the users who's data this is, the location where the cloud processing occurs, and the the location of the facilities and individuals who access that data. Each location may have different compliance requirement.

This offering is significantly impacted by mandated security and privacy requirements like GDPR (General Data Protection Regulation) and the California Privacy Act. As privacy requirements are added, we will update this offering and all supporting policies / templates to be in full compliance.

We respect the privacy of your information and comply will all privacy mandates including GDPR and the California Consumer Privacy Act 2018. Our policy for use of the information gathered is as follows. Once you subscribe you have given us the right to send you at least one e-mail. When you receive that e-mail you will have the option to unsubscribe from future emails. If you do not purchase a product, we will automatically remove you from our database. IF you purchased a product your contact data will remain on our databaseas an unsubscripted user.

If you are a user that has unsubscripted and have purchased a product and want to remove your contact information you need to send an e-mail to support (at) e-janco.com with the subject line of "REMOVAL COMPLIANCE"

No Spam CAN-SPAM compliant

Janco Associates, Inc. is CAN-SPAM compliant and committed to protecting your privacy. For details, please see our privacy policy.