text string | gdpr int64 | ccpa int64 | sox int64 | hipaa int64 | pci_dss int64 | iso27001 int64 | nist int64 | custom int64 |
|---|---|---|---|---|---|---|---|---|
Personal data processing must adhere to GDPR principles including data minimization and purpose limitation as outlined in Article 66. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
The Data Protection Officer must ensure GDPR compliance monitoring and reporting under Article 39. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Cybersecurity controls must implement NIST Cybersecurity Framework Identify: Asset Management. | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
Business associates must sign agreements ensuring HIPAA compliance for PHI handling. | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Breach notification requirements mandate reporting to HHS within 60 days of discovery. | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Cryptographic controls must protect sensitive information per ISO 27001 A.10. | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
Cybersecurity controls must implement NIST Cybersecurity Framework Detect: Access Control. | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
Protected Health Information (PHI) must be secured under HIPAA Privacy Rule 45 CFR Part 162. | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
The Data Protection Officer must ensure GDPR compliance monitoring and reporting under Article 39. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
The Data Protection Officer must ensure GDPR compliance monitoring and reporting under Article 39. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Access control measures must implement A.10.5 for systems storing payment information. | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
Cardholder data encryption is mandatory during transmission and storage under PCI-DSS. | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
Access control measures must implement A.8.4 for systems storing payment information. | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
Access control measures must implement A.17.2 for systems storing payment information. | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
Payment card data must be protected according to PCI-DSS Requirement 4. | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
California residents have the right to deletion under the California Consumer Privacy Act Section 203. | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Access control measures must implement A.15.2 for systems storing payment information. Security incident management procedures align with ISO 27001 A.16 requirements. | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 |
Sale of personal information requires explicit consent under CCPA Section 1798.120. | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Payment card data must be protected according to PCI-DSS Requirement 6. | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
Document retention policies must preserve audit records for 5 years under SOX Section 802. | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
Data subjects have the right to deletion under GDPR Article 53, and the organization must facilitate these requests within legal timeframes. Cryptographic controls must protect sensitive information per ISO 27001 A.10. | 1 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
Cardholder data encryption is mandatory during transmission and storage under PCI-DSS. Cybersecurity controls must implement NIST Cybersecurity Framework Recover: Risk Assessment. | 0 | 0 | 0 | 0 | 1 | 0 | 1 | 0 |
Incident response plans must be maintained and tested per PCI-DSS standards. | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
Security incident management procedures align with ISO 27001 A.16 requirements. Whistleblower protections are established under SOX Section 806. | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 |
Financial controls must comply with Sarbanes-Oxley Act Section 719 requirements for internal control over financial reporting. | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
Whistleblower protections are established under SOX Section 806. | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
The Data Protection Officer must ensure GDPR compliance monitoring and reporting under Article 39. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Security safeguards for ePHI must include physical controls per HIPAA Security Rule. Businesses must disclose data collection practices and provide opt-out mechanisms as required by CCPA. | 0 | 1 | 0 | 1 | 0 | 0 | 0 | 0 |
Information security management system must comply with ISO 27001:2013 Control A.13.4. | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
Protected Health Information (PHI) must be secured under HIPAA Privacy Rule 45 CFR Part 164. | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Personal data processing must adhere to GDPR principles including data minimization and purpose limitation as outlined in Article 22. Risk assessment and treatment processes are required under ISO 27001 Clause 6. | 1 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
Cross-border data transfers require adequate safeguards under GDPR Chapter V, including Standard Contractual Clauses. Patients have the right to portability under HIPAA Privacy Rule. | 1 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Audit committee independence requirements are mandated by SOX Section 301. | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
Cardholder data encryption is mandatory during transmission and storage under PCI-DSS. Financial controls must comply with Sarbanes-Oxley Act Section 243 requirements for internal control over financial reporting. | 0 | 0 | 1 | 0 | 1 | 0 | 0 | 0 |
Data subjects have the right to deletion under GDPR Article 65, and the organization must facilitate these requests within legal timeframes. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Cross-border data transfers require adequate safeguards under GDPR Chapter V, including Adequacy Decisions. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Incident response capabilities align with NIST SP 800-61 guidelines. Financial controls must comply with Sarbanes-Oxley Act Section 232 requirements for internal control over financial reporting. | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 |
Cryptographic controls must protect sensitive information per ISO 27001 A.10. | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
Data breach notification must occur within 60 days under California Civil Code Section 1798.82. | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Encryption standards must meet NIST FIPS 199 requirements. | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
Cybersecurity controls must implement NIST Cybersecurity Framework Protect: Access Control. Breach notification requirements mandate reporting to HHS within 90 days of discovery. | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 |
Patients have the right to access under HIPAA Privacy Rule. | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Business associates must sign agreements ensuring HIPAA compliance for PHI handling. | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Cybersecurity controls must implement NIST Cybersecurity Framework Protect: Risk Assessment. Risk assessment and treatment processes are required under ISO 27001 Clause 6. | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 |
Incident response plans must be maintained and tested per PCI-DSS standards. | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
Management must certify the accuracy of financial statements under SOX Section 302. Security safeguards for ePHI must include technical controls per HIPAA Security Rule. | 0 | 0 | 1 | 1 | 0 | 0 | 0 | 0 |
Security assessment and authorization processes follow NIST Risk Management Framework. Security incident management procedures align with ISO 27001 A.16 requirements. | 0 | 0 | 0 | 0 | 0 | 1 | 1 | 0 |
Encryption standards must meet NIST FIPS 140 requirements. | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
Data subjects have the right to deletion under GDPR Article 69, and the organization must facilitate these requests within legal timeframes. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Breach notification requirements mandate reporting to HHS within 72 days of discovery. | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Security safeguards for ePHI must include technical controls per HIPAA Security Rule. | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Personal data processing must adhere to GDPR principles including data minimization and purpose limitation as outlined in Article 20. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Security safeguards for ePHI must include technical controls per HIPAA Security Rule. | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Financial controls must comply with Sarbanes-Oxley Act Section 429 requirements for internal control over financial reporting. | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
Personal data processing must adhere to GDPR principles including data minimization and purpose limitation as outlined in Article 67. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Incident response plans must be maintained and tested per PCI-DSS standards. Patients have the right to access under HIPAA Privacy Rule. | 0 | 0 | 0 | 1 | 1 | 0 | 0 | 0 |
Data breach notification must occur within 30 days under California Civil Code Section 1798.82. | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Data breach notification must occur within 60 days under California Civil Code Section 1798.82. | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Cybersecurity controls must implement NIST Cybersecurity Framework Identify: Access Control. | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
Businesses must disclose data collection practices and provide opt-out mechanisms as required by CCPA. | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Incident response plans must be maintained and tested per PCI-DSS standards. | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
Access control measures must implement A.16.3 for systems storing payment information. | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
Access control policies must implement least privilege as per ISO 27001 Annex A.9. Protected Health Information (PHI) must be secured under HIPAA Privacy Rule 45 CFR Part 163. | 0 | 0 | 0 | 1 | 0 | 1 | 0 | 0 |
Financial controls must comply with Sarbanes-Oxley Act Section 438 requirements for internal control over financial reporting. | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
Businesses must disclose data collection practices and provide opt-out mechanisms as required by CCPA. Cybersecurity controls must implement NIST Cybersecurity Framework Detect: Asset Management. | 0 | 1 | 0 | 0 | 0 | 0 | 1 | 0 |
Document retention policies must preserve internal communications for 10 years under SOX Section 802. | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
Encryption standards must meet NIST FIPS 197 requirements. | 0 | 0 | 0 | 0 | 0 | 0 | 1 | 0 |
Document retention policies must preserve audit records for 7 years under SOX Section 802. | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
Data breach notification must occur within 72 days under California Civil Code Section 1798.82. | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Audit committee independence requirements are mandated by SOX Section 301. | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
Breach notification requirements mandate reporting to HHS within 90 days of discovery. | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Business associates must sign agreements ensuring HIPAA compliance for PHI handling. | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Risk assessment and treatment processes are required under ISO 27001 Clause 6. | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
Whistleblower protections are established under SOX Section 806. Encryption standards must meet NIST FIPS 140 requirements. | 0 | 0 | 1 | 0 | 0 | 0 | 1 | 0 |
The Data Protection Officer must ensure GDPR compliance monitoring and reporting under Article 39. Information security management system must comply with ISO 27001:2013 Control A.8.6. | 1 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
Information security management system must comply with ISO 27001:2013 Control A.12.6. Audit committee independence requirements are mandated by SOX Section 301. | 0 | 0 | 1 | 0 | 0 | 1 | 0 | 0 |
Cross-border data transfers require adequate safeguards under GDPR Chapter V, including Standard Contractual Clauses. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Information security management system must comply with ISO 27001:2013 Control A.11.6. Businesses must disclose data collection practices and provide opt-out mechanisms as required by CCPA. | 0 | 1 | 0 | 0 | 0 | 1 | 0 | 0 |
Sale of personal information requires explicit consent under CCPA Section 1798.120. | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Security safeguards for ePHI must include physical controls per HIPAA Security Rule. Security assessment and authorization processes follow NIST Risk Management Framework. | 0 | 0 | 0 | 1 | 0 | 0 | 1 | 0 |
Risk assessment and treatment processes are required under ISO 27001 Clause 6. Cardholder data encryption is mandatory during transmission and storage under PCI-DSS. | 0 | 0 | 0 | 0 | 1 | 1 | 0 | 0 |
Cross-border data transfers require adequate safeguards under GDPR Chapter V, including Binding Corporate Rules. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Data subjects have the right to deletion under GDPR Article 64, and the organization must facilitate these requests within legal timeframes. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Sale of personal information requires explicit consent under CCPA Section 1798.120. | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Business associates must sign agreements ensuring HIPAA compliance for PHI handling. | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
Risk assessment and treatment processes are required under ISO 27001 Clause 6. California residents have the right to access under the California Consumer Privacy Act Section 696. Incident response plans must be maintained and tested per PCI-DSS standards. | 0 | 1 | 0 | 0 | 1 | 1 | 0 | 0 |
Document retention policies must preserve internal communications for 5 years under SOX Section 802. | 0 | 0 | 1 | 0 | 0 | 0 | 0 | 0 |
Personal data processing must adhere to GDPR principles including data minimization and purpose limitation as outlined in Article 77. Sale of personal information requires explicit consent under CCPA Section 1798.120. Encryption standards must meet NIST FIPS 197 requirements. | 1 | 1 | 0 | 0 | 0 | 0 | 1 | 0 |
Regular security testing and monitoring are required under PCI-DSS Requirement 11. | 0 | 0 | 0 | 0 | 1 | 0 | 0 | 0 |
Business associates must sign agreements ensuring HIPAA compliance for PHI handling. | 0 | 0 | 0 | 1 | 0 | 0 | 0 | 0 |
This agreement requires compliance with GDPR Article 91 regarding data protection and privacy rights for EU citizens. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Personal data processing must adhere to GDPR principles including data minimization and purpose limitation as outlined in Article 78. Businesses must disclose data collection practices and provide opt-out mechanisms as required by CCPA. | 1 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Risk assessment and treatment processes are required under ISO 27001 Clause 6. | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
The Data Protection Officer must ensure GDPR compliance monitoring and reporting under Article 39. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Data subjects have the right to access under GDPR Article 56, and the organization must facilitate these requests within legal timeframes. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Document retention policies must preserve audit records for 10 years under SOX Section 802. Data subjects have the right to rectification under GDPR Article 27, and the organization must facilitate these requests within legal timeframes. Security assessment and authorization processes follow NIST Risk Management Framew... | 1 | 0 | 1 | 0 | 0 | 0 | 1 | 0 |
Security incident management procedures align with ISO 27001 A.16 requirements. | 0 | 0 | 0 | 0 | 0 | 1 | 0 | 0 |
Sale of personal information requires explicit consent under CCPA Section 1798.120. | 0 | 1 | 0 | 0 | 0 | 0 | 0 | 0 |
Personal data processing must adhere to GDPR principles including data minimization and purpose limitation as outlined in Article 75. | 1 | 0 | 0 | 0 | 0 | 0 | 0 | 0 |
Breach notification requirements mandate reporting to HHS within 72 days of discovery. Security assessment and authorization processes follow NIST Risk Management Framework. Document retention policies must preserve audit records for 7 years under SOX Section 802. | 0 | 0 | 1 | 1 | 0 | 0 | 1 | 0 |
End of preview. Expand in Data Studio
No dataset card yet
- Downloads last month
- 41