98856573
Nov 15, 2024
Downloadable resources, namely, digital files being guides in the fields of System and Organization Controls 2 (SOC 2), Health Insurance Portability and Accountability Act (HIPAA), and International Standard of Organization 27001; downloadable resources, namely, digital files being guides in the fields of compliance, compliance risk management, security, computer security compliance, and compliance audits; downloadable resources in the nature of interactive templates for use at a company by security, compliance, engineering, or technical personnel for use in continuously monitoring a company's security state and compliance with security standards; downloadable resources in the nature of interactive templates for use at a company by security, compliance, engineering, or technical personnel for use in continuously monitoring the company's security state and compliance with security standards in the fields of compliance, compliance risk management, security, computer security compliance, and compliance audits in digital and electronic format
Electrical and Scientific ApparatusProviding information featuring resources, namely, non-downloadable publications in the nature of guides and blogs in the fields of compliance, compliance risk management, security, computer security compliance, and compliance audits via a website
Education and EntertainmentSoftware as a service (SAAS) services featuring software for security, namely, for reading software and hardware configurations and ensuring they follow best practices, sending notifications when those configurations change, and enforcing those best practices; software as a service (SAAS) services featuring software for standards compliance audits; software as a service (SAAS) services featuring software for automatically auditing and securing cloud infrastructure; software as a service (SAAS) services featuring software for internet security, namely, enforcing best security practices across all cloud infrastructure and external vendors; computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer security threat analysis for protecting data; data security services
Computer and ScientificRegulatory compliance auditing; regulatory compliance consulting in the fields of compliance, compliance risk management, security, computer security compliance, and compliance audits; Reviewing standards and practices to assure compliance with laws and regulations; Consultation in relation to data protection compliance; Regulatory compliance auditing in the field of data security; Regulatory compliance consulting in the field of data security; Regulatory compliance auditing and consulting related to information security management systems, health information security and payment account data security; Information, advisory and consultancy services relating to all the aforementioned
Personal