{"id":390,"date":"2023-03-08T20:49:46","date_gmt":"2023-03-08T20:49:46","guid":{"rendered":"https:\/\/infotrust.us\/?page_id=390"},"modified":"2023-06-30T07:01:17","modified_gmt":"2023-06-30T07:01:17","slug":"security-responsibility","status":"publish","type":"page","link":"https:\/\/infotrust.us\/?page_id=390","title":{"rendered":"Security Responsibility"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; fullwidth=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_fullwidth_header title=&#8221;All Businesses have a Security Responsibility, &#8221; subhead=&#8221;Companies today are responsible for implementing stringent Internet security measures to protect sensitive data, maintain customer trust, and comply with evolving data protection laws.&#8221; background_overlay_color=&#8221;rgba(0,0,0,0.4)&#8221; _builder_version=&#8221;4.20.4&#8243; title_font=&#8221;||||||||&#8221; title_font_size=&#8221;36px&#8221; content_font=&#8221;||||||||&#8221; content_font_size=&#8221;16px&#8221; subhead_font_size=&#8221;20px&#8221; subhead_line_height=&#8221;1.4em&#8221; background_enable_color=&#8221;off&#8221; background_image=&#8221;https:\/\/infotrust.us\/wp-content\/uploads\/2023\/04\/AdobeStock_106077246.jpg&#8221; custom_padding=&#8221;300px||&#8221; custom_padding_tablet=&#8221;300px||&#8221; custom_padding_phone=&#8221;150px||||false|false&#8221; custom_padding_last_edited=&#8221;on|phone&#8221; background_last_edited=&#8221;on|phone&#8221; title_text_shadow_style=&#8221;preset1&#8243; title_text_shadow_color=&#8221;#000000&#8243; content_text_shadow_style=&#8221;preset1&#8243; content_text_shadow_color=&#8221;#000000&#8243; subhead_text_shadow_style=&#8221;preset1&#8243; subhead_text_shadow_color=&#8221;#000000&#8243; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_fullwidth_header][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.20.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>InfoTrust provides services to all industries to help meet the challenging requirements of security regulation.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_3,1_3,1_3&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;PCI (Payment Card Industry)&#8221; image=&#8221;https:\/\/infotrust.us\/wp-content\/uploads\/2023\/04\/pexels-kampus-production-6667796.jpg&#8221; _builder_version=&#8221;4.16&#8243; child_filter_saturate=&#8221;0%&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>The Payment Card Industry Data Security Standard is an information security standard used to handle credit cards from major card brands. The standard is administered by the Payment Card Industry Security Standards Council, and its use is mandated by the card brands.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;GLBA (Gramm-Leach-Bliley Act)&#8221; image=&#8221;https:\/\/infotrust.us\/wp-content\/uploads\/2023\/04\/pexels-expect-best-351264.jpg&#8221; _builder_version=&#8221;4.16&#8243; child_filter_saturate=&#8221;0%&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>The Gramm-Leach-Bliley Act requires financial institutions \u2013 companies that offer consumers financial products or services like loans, financial or investment advice, or insurance \u2013 to explain their information-sharing practices to their customers and to safeguard sensitive data.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=&#8221;1_3&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_blurb title=&#8221;HIPAA (Health Insurance Portability and Accountability Act)&#8221; image=&#8221;https:\/\/infotrust.us\/wp-content\/uploads\/2023\/04\/pexels-photo-220723.jpeg&#8221; _builder_version=&#8221;4.16&#8243; child_filter_saturate=&#8221;0%&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span>HIPAA technical security safeguards are designed to ensure the security of Protected Health Information. <\/span><span>Organizations covered by HIPPA must manage security safeguards and specific technologies are guarantee the use of reasonable and appropriate security procedures to ensure data safety.<\/span><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_divider _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM5NCJ9fQ==@&#8221; button_text=&#8221;Why Work With InfoTrust?&#8221; _builder_version=&#8221;4.20.4&#8243; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221; _dynamic_attributes=&#8221;button_url&#8221; sticky_enabled=&#8221;0&#8243;][\/et_pb_button][et_pb_button button_url=&#8221;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6Ijc4NCJ9fQ==@&#8221; button_text=&#8221;Case Studies&#8221; _builder_version=&#8221;4.20.4&#8243; _dynamic_attributes=&#8221;button_url&#8221; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_button][et_pb_button button_url=&#8221;https:\/\/infotrust.us\/?page_id=387&#8243; button_text=&#8221;The InfoTrust Story&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221; theme_builder_area=&#8221;post_content&#8221;][et_pb_image src=&#8221;https:\/\/infotrust.us\/wp-content\/uploads\/2020\/02\/it_logo.png&#8221; align=&#8221;right&#8221; align_tablet=&#8221;center&#8221; align_phone=&#8221;center&#8221; align_last_edited=&#8221;on|desktop&#8221; _builder_version=&#8221;4.16&#8243; global_colors_info=&#8221;{}&#8221; theme_builder_area=&#8221;post_content&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp;InfoTrust provides services to all industries to help meet the challenging requirements of security regulation.The Payment Card Industry Data Security Standard is an information security standard used to handle credit cards from major card brands. The standard is administered by the Payment Card Industry Security Standards Council, and its use is mandated by the [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-390","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/infotrust.us\/index.php?rest_route=\/wp\/v2\/pages\/390","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infotrust.us\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/infotrust.us\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/infotrust.us\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/infotrust.us\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=390"}],"version-history":[{"count":4,"href":"https:\/\/infotrust.us\/index.php?rest_route=\/wp\/v2\/pages\/390\/revisions"}],"predecessor-version":[{"id":940,"href":"https:\/\/infotrust.us\/index.php?rest_route=\/wp\/v2\/pages\/390\/revisions\/940"}],"wp:attachment":[{"href":"https:\/\/infotrust.us\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=390"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}