NESIMX Pharmaceuticals completed the SOC 2 Type II Compliance Audit, carried out by E Com Security Solutions
The largest pharmaceutical and life sciences company in the world is SOC 2 Type II Certified by a Big 4 Cyber Security firm, E Com Security Solutions, for its labs and operational centers located in India, Basel, the Czech Republic, and Mexico. NESIMX Pharmaceuticals announced it has completed the compliance audit for Service Organisation Control (SOC) 2 Type II. The [...]
SOC 2 Audit Controls and Checklist
The AICPA Assurance Services Executive Committee (ASEC) has developed a set of criteria (trust services criteria) to be used when evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, or processing integrity of information and systems, or the confidentiality or privacy of the information processed by the systems at an entity, a [...]
SOC 2 Type II Certification with E Com Security Solutions
The largest pharmaceutical and life sciences company in the world is SOC 2 Type II Certified by a Big 4 Cyber Security firm, E Com Security Solutions, for its labs and operational centers located in India, Basel, the Czech Republic, and Mexico. NESIMX Pharmaceuticals announced it has completed the compliance audit for Service Organisation Control (SOC) 2 Type II. The [...]
Get compliant with PCI, HIPAA, GDPR, FedRAMP, SOC 2 by cloud services of AWS, GCP and Azure
This article provides guidance on how to get your business compliant with PCI, HIPAA, GDPR, FedRAMP, SOC 2 by leveraging cloud services of AWS, GCP and Azure. Organizations providing IT Managed Services, Software Development, Software as a Service, infrastructure-as-a-service, platform-as-a-service tend to have their application products hosted on the cloud environments. In order to achieve compliance with standards of PCI, [...]
SOC 2 Audit Controls and Checklist
The AICPA Assurance Services Executive Committee (ASEC) has developed a set of criteria (trust services criteria) to be used when evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, or processing integrity of information and systems, or the confidentiality or privacy of the information processed by the systems at an entity, a [...]