[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/the-ping-compliance-faqs\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/the-ping-compliance-faqs\/","headline":"The Ping: Compliance FAQs","name":"The Ping: Compliance FAQs","description":"ShareTweet \u00a0For each area of concern with sensitive data, there are published guidelines to follow in order to achieve compliance. Reading and digesting the guidelines in whole can be a difficult task. There are decision making tools, technical requirement write-ups, security policies, and security procedures to pour through. So, without getting into the nitty gritty, [&hellip;]","datePublished":"2018-12-21","dateModified":"2018-12-21","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/corie-bogan\/#Person","name":"Corie Bogan","url":"https:\/\/univista.com\/posts\/author\/corie-bogan\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1cc33ae534ef31a23f9281fa0d638eb45e31ff2282dc8fabaf8cec72af5f1961?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/12\/FAQ.jpg","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/12\/FAQ.jpg","height":1280,"width":1920},"url":"https:\/\/univista.com\/posts\/the-ping-compliance-faqs\/","about":["BUSINESS CONTINUITY","business management","compliance","hipaa","network","PCI DSS","planning","Security","The Ping","vulnerability"],"wordCount":501,"keywords":["cjis","compliance","faq","hipaa","pci"],"articleBody":"ShareTweet                                        \u00a0For each area of concern with sensitive data, there are published guidelines to follow in order to achieve compliance. Reading and digesting the guidelines in whole can be a difficult task. There are decision making tools, technical requirement write-ups, security policies, and security procedures to pour through. So, without getting into the nitty gritty, we want to answer some of the frequently asked questions that come our way.\u201cHow can I securely accept credit card info over email?\u201d\u00a0\u00a0 This just isn\u2019t possible. \u00a0Even if your email system is encrypted and considered secure, you have no control over how that information is handled on your customers\u2019 email systems and all of the technology between.\u201cDo I need to be PCI compliant if I don\u2019t use a computer to process credit cards?\u201dYes. PCI compliance doesn\u2019t require a connection to the Internet or even a computer system. PCI compliance is determined by the way that you store, handle, or process credit card information whether the card information is in a locked filing cabinet or on the computer.\u201cDo we need to worry about this if only one of our computers processes credit cards?\u201d\u00a0Unless the computer that processes credit cards is completely isolated on its own network, your entire network needs to be PCI compliant.\u201cWho enforces PCI compliance?\u201dGenerally speaking, your merchant bank enforces PCI DSS compliance.\u201cI was told I couldn\u2019t scan to email because it\u2019s not compliant.\u201d\u00a0You may be able to. Compliant scanning requires a compatible copier, a secured connection directly to your mail server, and properly configured Data Loss Prevention policies that prevent forwarding and force encryption.\u00a0 We can work with you to ensure everything gets set up correctly and your mail clients are compatible.\u201cWhat do I need to do to keep my XP\/2003\/Vista systems compliant?\u201dAt this point replacing or upgrading them are the only options. This is because security updates are no longer available for these machines. This leaves a security hole in your network and breaks your compliance. Furthermore, Windows 7 computers will be in the same boat soon, so it would be a good idea to start making plans for upgrading any such computers once their support ends.Do we still need an analog fax line, or can we go digital and meet HIPAA compliance? You do not need an analog fax line; Efax and other vendors offer a HIPAA compliant product. We will work with you to find an appropriate solution that meets your needs.Can you assist us through an audit?Of course! We can help prepare you for, answer questions during, and implement the resulting recommendations of an audit.Can you help us write our policies? Yes, we can help provide templates and samples of very commonly required security policies.If we still haven\u2019t managed to cover some of your questions about compliance, please give us a call! We\u2019re here to help you!Your UniVista Team*Celebrating 20 Years of Customer Satisfaction*ShareTweet                                        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"The Ping: Compliance FAQs","item":"https:\/\/univista.com\/posts\/the-ping-compliance-faqs\/#breadcrumbitem"}]}]