10 questions
Mexico has a law that regulates the processing of personal data by private sector companies:
Federal copyright law
the Federal Law on Protection of Personal Data Held by Private Parties
Industrial property law
Federal penal code
Is a set of punitive legal norms of a State:
Federal copyright law
the Federal Law on Protection of Personal Data Held by Private Parties
Industrial property law
Federal penal code
Is the instrument through which the rights of authors are protected in Mexico:
Federal copyright law
the Federal Law on Protection of Personal Data Held by Private Parties
Industrial property law
Federal penal code
Protects the interests of the creators of inventions, symbols, names, images, drawings, trademarks, designations of origin and even industrial secrets for companies or businesses that have a new sales system, secret recipes, methodologies, bases data and even customer or supplier lists:
Federal copyright law
the Federal Law on Protection of Personal Data Held by Private Parties
Industrial property law
Federal penal code
This standard also provides a framework to identify and implement solutions for the following risks:
Security policy, Organization of security, Personal security, Physical and environmental security, Access control, Development and maintenance of the system, Business continuity plan
ISO 17799 (BS-7799)
NIST SP 800
COBIT
ISO/IEC 27001
is a framework created by ISACA (Information Systems Audit and Control association) for information technology management and IT governance, it is a set of support tools that allow administrators to reduce the separation between the needs of control, technical issues and business risks.:
ISO 17799 (BS-7799)
NIST SP 800
COBIT
ISO/IEC 27001
Information security management systems requirements, standard that allows certifying the implementation of an information security management system.
approved and published as an international standard in October 2005:
ISO 17799 (BS-7799)
NIST SP 800
COBIT
ISO/IEC 27001
It is a set of best practices for delivering IT services—it standardizes the selection, planning, delivery, and support of IT services to maximize efficiency and maintain predictable levels of service:
ITIL
NIST SP 800
COBIT
ISO/IEC 27001
It is the property of the information, by which it is guaranteed that it is accessible only to personnel authorized to access said information:
Availability
Confidentiality
Integrity
Authentication
It is the second step in the access control process. Passwords, voice recognition, and biometric scanners are common authentication methods:
Authorization
Identification
Integrity
Authentication