IBM Tivoli and Cisco User Manual page 24

Building a network access control solution with ibm tivoli and cisco systems
Table of Contents

Advertisement

It has become mandatory for businesses to comply with regulatory guidelines
such as the
Services Modernization Act
Portability and Accountability Act (HIPAA)
time.
The Gramm-Leach-Bliley Act has provisions to protect consumer information
held by financial institutions. This act provides the authority for federal agencies
to enforce and administer the
Any company with stock that is publicly traded in the United States must comply
with the Sarbanes-Oxley Act, regardless of whether the company's headquarters
is located in the U.S. This compliancy requirement was enacted to protect
individual investors, and corporations are required by law to provide truthful
financial statements. All public financial statements released by corporations are
subjected to intense scrutiny by regulatory authorities. Hence these legislations
mandate every corporation to maintain the integrity of its own data and provide
the same level of protection to the data it cares for.
Note: More information about the Gramm-Leach-Bliley Act (GLBA) can be
found at:
http://banking.senate.gov/conf/
More information about the Sarbanes-Oxley Act (SOX) can be found at:
http://www.sarbanes-oxley.com
More information about the Health Insurance Portability and Accountability Act
(HIPAA) can be found at:
http://www.cms.hhs.gov/hipaa
These laws are applicable for organizations in the United States of America.
Similar regulations may be enforced by government regulators of other
countries. Customers should consult their relevant government regulatory
bodies to learn more about the applicable laws in their respective countries.
6
Building a Network Access Control Solution with IBM Tivoli and Cisco Systems
Gramm-Leach-Bliley Act (GLBA; also known as the Financial
Sarbanes-Oxley Act (SOX),
),
Financial Privacy Rule
Health Insurance
and
. More guidelines may emerge over
Safeguards Rule
and the
.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Network access control solution

Table of Contents