{"id":1105,"date":"2024-09-23T11:15:55","date_gmt":"2024-09-23T15:15:55","guid":{"rendered":"https:\/\/web.uri.edu\/draft-its\/?p=1105"},"modified":"2024-12-12T08:49:23","modified_gmt":"2024-12-12T13:49:23","slug":"compliance-support","status":"publish","type":"post","link":"https:\/\/web.uri.edu\/draft-its\/compliance-support\/","title":{"rendered":"Compliance Support"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h2 class=\"wp-block-heading\">Compliance Support<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" src=\"https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Compliance-Support.jpg\" alt=\"\" class=\"wp-image-54401\" style=\"width:250px;height:250px\" srcset=\"https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Compliance-Support.jpg 1000w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Compliance-Support-300x300.jpg 300w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Compliance-Support-150x150.jpg 150w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Compliance-Support-768x768.jpg 768w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Compliance-Support-364x364.jpg 364w, https:\/\/web.uri.edu\/draft-its\/wp-content\/uploads\/sites\/2212\/Compliance-Support-500x500.jpg 500w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n<\/div>\n\n\n<p>Support and oversight of risk assessment activities to identify, and recommend remediation for risks affecting systems and processes, particularly as related to specific compliance frameworks such as PCI DSS and HIPAA.<\/p>\n\n\n\n<p>A <strong>security compliance assessment<\/strong> will help determine the gap between your existing control environment and what is required, and subsequently help you implement controls to address these gaps. An example of when a compliance assessment might be needed is if your department processes and stores credit card information. Another example is if your research project involves sensitive data such as export-controlled information or health information.<\/p>\n\n\n\n<p><strong>More information can be found at <a href=\"https:\/\/security.uri.edu\/\">security.uri.edu<\/a> or if you require consultation please contact the IT Service Desk.<\/strong><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\"><section class=\"cl-wrapper cl-boxout-wrapper\"><div class=\"cl-boxout  \">\n\n<h3 class=\"wp-block-heading has-text-align-center\">Executive Lead<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Michael Khalfayan<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Technical Lead<\/h3>\n\n\n\n<p class=\"has-text-align-center\">Michael Khalfayan<br>mkhalfayan@uri.edu<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\">Support Team<\/h3>\n\n\n\n<p class=\"has-text-align-center\">ITS Security<\/p>\n\n<\/div><\/section><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Oversight and risk assessment to ensure compliance with frameworks like PCI DSS and HIPAA, identifying and addressing security gaps.<\/p>\n","protected":false},"author":5142,"featured_media":54506,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[24],"tags":[105,103,72,8,102,104,19],"class_list":["post-1105","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-services","tag-consult","tag-consultation-services","tag-help-support","tag-sec","tag-security-policy-and-compliance","tag-service-offered","tag-services"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts\/1105","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/users\/5142"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/comments?post=1105"}],"version-history":[{"count":3,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts\/1105\/revisions"}],"predecessor-version":[{"id":54402,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/posts\/1105\/revisions\/54402"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/media\/54506"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/media?parent=1105"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/categories?post=1105"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.uri.edu\/draft-its\/wp-json\/wp\/v2\/tags?post=1105"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}