IBM i Regulatory Compliance List

Footprints shown through a translucent floor

November 22, 2016 Disaster Recovery News Blog, Legacy System Blog Articles

IBM i regulatory compliance is like that relative you don’t really like, but have to talk to every year at family reunions anyways – in other words, it’s unavoidable. Here we take a look at what regulations IBM i users are abiding by, and why your company’s security measures and regulatory obligations really go hand in hand.

 

The Most Common IBM i Regulatory Compliance

The three regulations that most IBM i users must abide by are:

  • Payment Card Industry (PCI) – 30.1%
  • Sarbanes-Oxley Act (SOX) – 28.2%
  • Health Insurance Portability and Accountability Act (HIPAA) – 17.6%

Fewer shops abide by the Food and Drug Administration (FDA, 4.8%), Federal Deposit Insurance Corporation (FDIC, 4.2%), Japan’s Financial Instruments and Exchange Law (J-SOX, 3.2%), United States Department of Agriculture (USDA, 3.2%), Drug Enforcement Administration (DEA, 2.2%) and Minimum Internal Control Standards (MICS, 0.8%). Another 7.1% of companies stated adhering to other regulations not included in the above list.

RECOMMENDATION: For companies short on time or IBM i expertise, consider managed security services as an option to help meet compliance.

 

Why Security & Compliance Go Hand in Hand

Some of the key features that today’s regulations consider include:

  • Automated reporting
  • Monitored network access
  • High availability (HA) solutions
  • Disaster recovery (DR) solutions
  • Monitoring traffic through exit points such as SQL and FTP
  • Unalterable, incorruptible data stores (such as with WORM)

Regardless of whether or not your company is abiding by regulatory compliance, these measures can be equally helpful to your company’s functioning. You should have several goals in common with today’s major regulatory mandates, including:

  • Integrity
  • Availability
  • Accountability
  • Confidentiality

Everyone is familiar with the need to update their computer’s antivirus software – with new viruses and threats to data security constantly being developed, antivirus software is constantly being brought up to date. The same logic holds true for third-party solutions like disaster recovery (DR) and high availability (HA). With today’s constantly changing data security threats, DR and HA bring companies up to date with security and compliance. In fact, DR and HA are arguably just as essential to meet company’s personal data security needs as they are to help companies meet their compliance standards.

RECOMMENDATION: Look at your data security and regulatory compliance as an inseparable duo; if you have holes in one area, it will undoubtedly affect the other.

 

For more information on IBM i regulatory compliance and how to keep your company’s data compliant, contact us today at 317-707-3941.

Source: 2016 IBM i Marketplace Survey Results by HelpSystems



Back to blog list