Compliance for Information and Records Management
The landscape for the retention, recovery and destruction of an enterprise’s business records has never been more complex. The digital age has provided an efficient and effective means of storing and accessing large amounts of information but with the advantages are a new set of complexities. Corporate governance, risk management and operational mandates have forced many companies to outsource their information and records management to service organizations with the expertise and controls to meet the demanding regulatory and compliance requirements. The SOC 1® attestation report is the best solution for information and records management companies that are storing, recovering or destroying customers’ financial information. The SOC 2® is the best solution for information and records management companies that do not have access to customers’ financial information.
Increased demand for security, privacy and regulatory compliance has escalated the need for information and records management companies to become SOC 1® or SOC 2® compliant. Both of these compliance attestations play an important role for information and records management companies by establishing credibility and trust with their customers and have been used as a marketing tool to enter new markets or expand existing market share.
Simply put by an attestation client providing data recovery services, “A SOC 1® attestation tells our customers that we are doing what we promise.” Although this may not be the most technical answer, it is generally aligned with the purpose of a service auditor’s report.
Information and Records Management Company’s SOC 1® attestation involves the following critical areas:
- Control Environment: the organizational level controls also known as “tone at the top” which consists of management’s oversight and internal operational level controls.
- Physical Security: the protection of information systems as it relates to third party data.
- Environmental Security: the protection of information systems and data from environmental threats.
- Data backups: the availability and protection of third parties’ data.
- System Availability: the availability of information systems to user organizations.
- Application Change Control: the processing and procedures used to ensure that systems function per user requirements.
- Information Security: the logical protection of data from unauthorized system access.
- Data Communication: the data maintains its integrity and security as it is transmitted between third parties and the service organization.
Information and records management companies not involved in storing, recovering or destroying customers’ financial information can meet their customers’ compliance requirements by obtaining a SOC® attestation report.
Information and Records Management Company’s SOC 2® attestation involves the following critical areas:
- Security: the system is protected against unauthorized access (both physical and logical).
- Availability: the system is available for operation and use as committed or agreed.
- Processing Integrity: system processing is complete, accurate, timely and authorized.
- Confidentiality: information designated as confidential is protected as committed or agreed.
- Privacy: personal information is collected, used, retained, disclosed and destroyed in conformity with commitments in the organization’s privacy notice and with criteria set forth in generally accepted privacy principle issued by the AICPA and CICA.
Healthcare company’s Agreed-Upon Procedures Review is a specific set of controls that are defined by a customer. The Compliance Attestation’s scope is defined by the complete set of controls in a specific standard or regulation (such as HIPAA, HITECH or DEA 1311.120 Electronic Prescriptions for Controlled Substances Act).
The scope of these attestations and reviews are determined by the healthcare company and their customers. Accordingly, a well scoped attestation can clearly demonstrate your organization’s quality of service and ensure that sufficient information is provided to your user organizations to communicate your stringent controls over physical security, environmental security, authorized access and continuous availability of services.
Compliance Process
We tailor every attestation to our client’s requirements. However, we have a fundamental four phase process that normally meets our clients’ needs and creates an efficient, unobtrusive attestation that enables you to focus on your business while we focus on your compliance.
Project Timeline: Four Phase Attestation
For More Information Speak to a Service Auditor at Roosa CPA, LLC (877) 410-8516