|
BS7799 / ISO17799 |
||||||||||||||||||||
History of the standard BS7799 / ISO 17799 Compliance, Certification and Accreditation Benefits of the BS7799 / ISO 17799 standard Complementarity of BS7799 / ISO 17799 Complementarity with existing legislation |
Complementarity with existing legislation
Many governments around the world are preparing or have adopted regulations prescribing how companies should manage and control information security. The aim is simple: compel management and boards of directors to be responsible for information security, and encourage them to display the same “due diligence” they devote to protecting their assets.
Such regulations include the Sarbanes-Oxley Act of 2002 (SOX), the Gramm-Leach-Bliley Act (GLBA) and the Health Insurance Portability and Accountability Act of 1996 (HIPAA):
The good news is that an organization that complies with any one of these regulations already possesses a concrete and practical example of an information security management system.
For example, HIPAA tackles the same subjects as the ISO 17799 standard while placing the emphasis on the protection of private information.
Similarly, the PDCA (Plan-Do-Check-Act) model in BS 7799-2 compares nicely with the four steps in GLBA:
Finally, compliance with ISO 17799 and BS7799-2 can include the definition of policies and procedures for the security of a company’s sensitive information, as touched on in SOX. |
||||||||||||||||||||
Web Sites Callio Technologies BS7799/ISO17799 BS7799 ISO17799 Security Standards ISO17799 BS7799 Discussion Group BS7799 ISO17799 Methodology Group
|