{"id":1288,"date":"2023-01-27T16:02:21","date_gmt":"2023-01-27T16:02:21","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1288"},"modified":"2023-01-27T16:02:21","modified_gmt":"2023-01-27T16:02:21","slug":"conformitate-cu-reglementari-si-standarde","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/tehnologie-2\/conformitate-cu-reglementari-si-standarde\/","title":{"rendered":"Conformitatea cu reglement\u0103rile \u0219i standardele"},"content":{"rendered":"<p>Inteligen\u021ba artificial\u0103, realitatea virtual\u0103, pl\u0103\u021bile f\u0103r\u0103 numerar, internetul obiectelor \u0219i multe alte ramuri ale tehnologiei informa\u021biei se dezvolt\u0103 zilnic.<\/p>\n\n\n\n<p class=\"translation-block\"><br>Odat\u0103 cu cre\u0219terea \u0219i expansiunea lor, apar noi vectori de amenin\u021bare \u0219i vulnerabilit\u0103\u021bi \u00een peisajul cibernetic. \u00cen raportul s\u0103u despre <a href=\"https:\/\/www.weforum.org\/reports\/global-cybersecurity-outlook-2022\/\" target=\"_self\">tendin\u021bele \u00een materie de securitate cibernetic\u0103 din 2022<\/a>, Forumul Economic Mondial a declarat c\u0103 \u201epe m\u0103sur\u0103 ce digitalizarea continu\u0103 s\u0103 se r\u0103sp\u00e2ndeasc\u0103 \u0219i noi tehnologii sunt introduse, riscurile cibernetice vor cre\u0219te inevitabil\u201d. De asemenea, au remarcat prin sondajele lor c\u0103 \u201ede\u0219i actorii din sectorul public \u0219i privat [\u2026] sunt hot\u0103r\u00e2\u021bi s\u0103 ob\u021bin\u0103 un nivel mai mare de rezilien\u021b\u0103 cibernetic\u0103, eforturile lor sunt adesea \u00eempiedicate de diverse [\u2026] bariere de reglementare\u201d.<\/p>\n\n\n\n<p>\u00cen\u021belegerea cerin\u021belor de reglementare poate fi, de fapt, un obstacol major pentru companii, \u00een special pentru cele care doresc s\u0103 se extind\u0103 la nivel interna\u021bional. \u00cen articolele urm\u0103toare, vom oferi o imagine de ansamblu asupra modului de abordare a reglement\u0103rilor privind securitatea cibernetic\u0103, care sunt cele mai frecvente \u0219i cum s\u0103 le abord\u0103m.<\/p>\n\n\n<div role=\"navigation\" aria-label=\"Tabla de con\u021binut\" class=\"simpletoc wp-block-simpletoc-toc\"><h2 style=\"margin: 0;\"><button type=\"button\" aria-expanded=\"false\" aria-controls=\"simpletoc-content-container\" class=\"simpletoc-collapsible\">Tabla de con\u021binut<span class=\"simpletoc-icon\" aria-hidden=\"true\"><\/span><\/button><\/h2><div id=\"simpletoc-content-container\" class=\"simpletoc-content\"><ul class=\"simpletoc-list\">\n<li><a href=\"#ii-regulations-and-standards\">II. Regulamente \u0219i standarde<\/a>\n\n<\/li>\n<li><a href=\"#understanding-regulations-and-standards\">\u00cen\u021belegerea reglement\u0103rilor \u0219i standardelor<\/a>\n\n<\/li>\n<li><a href=\"#how-do-you-manage-compliance-with-policies-and-regulations-challenges-and-solutions\">Cum gestiona\u021bi conformitatea cu politicile \u0219i reglement\u0103rile? Provoc\u0103ri \u0219i solu\u021bii<\/a>\n<\/li><\/ul><\/div><\/div>\n\n<h2 class=\"wp-block-heading\" id=\"ii-regulations-and-standards\"><a><\/a>II. Regulamente \u0219i standarde<\/h2>\n\n\n<p>\u00cen 2005, Uniunea Interna\u021bional\u0103 a Telecomunica\u021biilor a realizat un studiu privind ini\u021biativele de securitate cibernetic\u0103 la nivel na\u021bional \u00een 14 economii mondiale majore \u0219i \u00een aproape 30 de industrii. Ace\u0219tia au estimat c\u0103 peste 174 de ini\u021biative, care ar fi putut conduce la viitoare politici, erau active. \u00cen prezent, pe baza num\u0103rului de reglement\u0103ri \u0219i standarde prezente la nivel mondial, este probabil ca num\u0103rul minim de politici de securitate cibernetic\u0103 aplicate la nivel mondial s\u0103 fie de ordinul miilor.<\/p>\n\n\n\n<p>Cu toate acestea, este important s\u0103 se \u00een\u021beleag\u0103 diferen\u021ba dintre regulamente \u0219i standarde, deoarece organiza\u021biile pot fi obligate s\u0103 respecte unul sau ambele. Un regulament de securitate cibernetic\u0103 este o regul\u0103 (sau un set de reguli) obligatorie din punct de vedere juridic pe care o organiza\u021bie trebuie s\u0103 o respecte. Conformarea cu aceste reglement\u0103ri este obligatorie, iar organiza\u021biile care nu se conformeaz\u0103 se pot confrunta cu sanc\u021biuni precum amenzi sau ac\u021biuni \u00een justi\u021bie din partea organismelor guvernamentale.<\/p>\n\n\n\n<p>Pe de alt\u0103 parte, un standard de securitate cibernetic\u0103 este un set de orient\u0103ri sau de bune practici pe care o organiza\u021bie le poate urma pentru a-\u0219i \u00eembun\u0103t\u0103\u021bi securitatea cibernetic\u0103. Conformarea cu aceste standarde este voluntar\u0103, dar respectarea lor poate ajuta organiza\u021biile s\u0103 demonstreze clien\u021bilor, partenerilor \u0219i autorit\u0103\u021bilor de reglementare coeren\u021ba pozi\u021biei lor de securitate cibernetic\u0103.<\/p>\n\n\n\n<p>Pe scurt, regulamentele sunt obligatorii din punct de vedere juridic \u0219i se aplic\u0103 prin lege, \u00een timp ce standardele nu sunt obligatorii. Cu toate acestea, deoarece standardele sunt actualizate mai frecvent, conformitatea cu un standard poate ajuta o organiza\u021bie s\u0103 respecte un regulament. \u00cen plus, av\u00e2nd \u00een vedere c\u0103 regulamentele au, de obicei, un domeniu de aplicare mai larg, conformitatea cu standardele specifice sectorului unei organiza\u021bii o poate ajuta s\u0103 se disting\u0103 de concuren\u021bi.<\/p>\n\n\n\n<p>Prin urmare, \u00een func\u021bie de activitatea unei organiza\u021bii, aceasta poate fi nevoit\u0103 s\u0103 respecte un anumit standard sau regulament. Cu toate acestea, este sigur s\u0103 presupunem c\u0103 orice \u00eentreprindere modern\u0103 trebuie s\u0103 respecte protec\u021bia datelor \u0219i securitatea cibernetic\u0103. Din acest motiv, am rezumat punctele-cheie din dou\u0103 regulamente din Europa \u0219i dou\u0103 standarde solicitate \u00een mod frecvent de c\u0103tre companiile din \u00eentreaga lume: Regulamentul general privind protec\u021bia datelor (GDPR), Directiva privind re\u021belele \u0219i sistemele informatice (NIS), ISO 27k \u0219i Institutul Na\u021bional de Standarde \u0219i Tehnologie (NIST).<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"understanding-regulations-and-standards\">\u00cen\u021belegerea reglement\u0103rilor \u0219i standardelor<\/h2>\n\n\n<p>\u00cen cazul \u00een care nu sunte\u021bi familiarizat cu toate politicile men\u021bionate mai sus, v\u0103 voi prezenta pe scurt patru dintre ele:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li> GDPR (Regulamentul general privind protec\u021bia datelor): Acesta este regulamentul UE care reglementeaz\u0103 protec\u021bia datelor cu caracter personal \u0219i drepturile persoanelor fizice cu privire la datele lor cu caracter personal. Acesta se aplic\u0103 oric\u0103rei persoane care prelucreaz\u0103 datele cu caracter personal ale cet\u0103\u021benilor UE, indiferent de locul \u00een care se afl\u0103. Aceasta \u00eenseamn\u0103 c\u0103 orice persoan\u0103 care prelucreaz\u0103 date cu caracter personal ale cet\u0103\u021benilor europeni este obligat\u0103 s\u0103 respecte GDPR. Articolele din GDPR reglementeaz\u0103, printre altele, m\u0103surile luate pentru a proteja datele cu caracter personal, numirea unui responsabil cu protec\u021bia datelor, precum \u0219i procesul \u0219i raportarea \u00eenc\u0103lc\u0103rilor.<\/li>\n\n\n\n<li>Directiva NIS (Directiva privind re\u021belele \u0219i sistemele informatice): Aceasta este directiva UE axat\u0103 pe asigurarea unei baze de securitate pentru infrastructura critic\u0103 \u0219i serviciile esen\u021biale din \u00eentreaga Europ\u0103. \u00cen conformitate cu aceast\u0103 directiv\u0103, toate companiile care \u00ee\u0219i desf\u0103\u0219oar\u0103 activitatea \u00een industrii critice (cum ar fi energia, transporturile \u0219i asisten\u021ba medical\u0103) \u0219i furnizorii lor de servicii digitale (cum ar fi motoarele de c\u0103utare \u0219i serviciile cloud) trebuie s\u0103 pun\u0103 \u00een aplicare m\u0103suri de securitate adecvate. \u00cen plus, directiva solicit\u0103 statelor membre ale UE s\u0103 dispun\u0103 de strategii na\u021bionale de securitate cibernetic\u0103 \u0219i de planuri de r\u0103spuns la incidente care s\u0103 fie egale sau mai ample dec\u00e2t Directiva NIS. Aceasta \u00eenseamn\u0103 c\u0103 toate statele UE trebuie s\u0103 pun\u0103 \u00een aplicare reglement\u0103ri care trebuie s\u0103 acopere toate subiectele din Directiva NIS ca o baz\u0103 minim\u0103, dar pot (\u0219i ar trebui) s\u0103 fie mai extinse.<\/li>\n\n\n\n<li> Standardul ISO 27000 pentru securitatea cibernetic\u0103: Cunoscut \u0219i ca ISO 27k, este un standard interna\u021bional care prezint\u0103 un cadru pentru un sistem de management al securit\u0103\u021bii informa\u021biilor (ISMS). Acesta ofer\u0103 o abordare sistematic\u0103 pentru gestionarea informa\u021biilor sensibile ale companiei, astfel \u00eenc\u00e2t acestea s\u0103 r\u0103m\u00e2n\u0103 \u00een siguran\u021b\u0103. Acesta include un set de politici \u0219i proceduri pe care organiza\u021biile le pot utiliza pentru a-\u0219i proteja datele confiden\u021biale, precum \u0219i orient\u0103ri pentru gestionarea riscurilor \u0219i conformitate.<\/li>\n\n\n\n<li> Cadrul de securitate cibernetic\u0103 NIST (National Institute of Standards and Technology): NIST este o agen\u021bie guvernamental\u0103 american\u0103 care public\u0103 o gam\u0103 larg\u0103 de standarde, orient\u0103ri \u0219i bune practici \u00een materie de securitate cibernetic\u0103. Cadrul de securitate cibernetic\u0103 al NIST ofer\u0103 o abordare bazat\u0103 pe riscuri pentru gestionarea securit\u0103\u021bii cibernetice. Standardul este structurat prin detalierea a cinci direc\u021bii principale de ac\u021biune pentru a fi conform: Identificare, protec\u021bie, detectare, r\u0103spuns \u0219i recuperare.<\/li>\n<\/ul>\n\n\n\n<p>GDPR, Directiva NIS, ISO 27k \u0219i NIST abordeaz\u0103 toate securitatea cibernetic\u0103 \u0219i protec\u021bia datelor. De\u0219i acestea pot diferi \u00een ceea ce prive\u0219te domeniul de aplicare \u0219i cerin\u021bele, abordarea uneia dintre ele poate fi un pas esen\u021bial \u00een realizarea celorlalte. De exemplu:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Dac\u0103 lu\u0103m ISO 27k \u0219i NIST, putem vedea c\u0103 ambele standarde sunt adoptate pe scar\u0103 larg\u0103 \u0219i recunoscute ca fiind cele mai bune practici pentru securitatea cibernetic\u0103. Cu toate acestea, ISO 27k este un standard bazat pe procese care ofer\u0103 orient\u0103ri privind gestionarea informa\u021biilor sensibile ale companiei. Pe de alt\u0103 parte, NIST este construit pe o abordare bazat\u0103 pe riscuri \u0219i vizeaz\u0103 identificarea, gestionarea \u0219i reducerea riscurilor generate de vulnerabilit\u0103\u021bile de securitate cibernetic\u0103.<\/li>\n\n\n\n<li>Dac\u0103 lu\u0103m Directiva NIS \u0219i GDPR, putem observa c\u0103 acestea ofer\u0103 orient\u0103ri \u0219i cerin\u021be pentru \u00eembun\u0103t\u0103\u021birea posturii de securitate cibernetic\u0103. Cele dou\u0103 se suprapun, de fapt, \u00een unele aspecte. Cu toate acestea, trebuie remarcat faptul c\u0103 GDPR urm\u0103re\u0219te s\u0103 protejeze datele cu caracter personal la toate nivelurile, \u00een timp ce Directiva NIS urm\u0103re\u0219te s\u0103 ofere orient\u0103ri cu privire la toate aspectele legate de securitatea informa\u021biilor, dar numai la un nivel specific industriei.<\/li>\n<\/ul>\n\n\n\n<p>Pe scurt: domeniul de aplicare, aplicabilitatea \u0219i scopul politicilor dvs. de securitate cibernetic\u0103 pot fi definite dup\u0103 regulamente \u0219i standarde, dar trebuie s\u0103 fi\u021bi con\u0219tien\u021bi de diferen\u021bele dintre acestea pentru a \u00een\u021belege care vi se aplic\u0103 cel mai bine. Odat\u0103 ce a\u021bi \u00een\u021beles acest lucru, este doar o chestiune de a le implementa corect. \u00cen sec\u021biunea urm\u0103toare, c\u00e2teva sugestii pe aceast\u0103 tem\u0103.\"<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-do-you-manage-compliance-with-policies-and-regulations-challenges-and-solutions\"><a><\/a>Cum gestiona\u021bi conformitatea cu politicile \u0219i reglement\u0103rile? Provoc\u0103ri \u0219i solu\u021bii<\/h2>\n\n\n<p>Punerea \u00een aplicare a politicilor men\u021bionate mai sus poate fi necesar\u0103 din cauza cerin\u021belor legale sau a unui audit viitor. Este posibil s\u0103 fie necesar s\u0103 aduce\u021bi modific\u0103ri proceselor \u0219i structurii dvs. pentru a v\u0103 conforma politicii relevante. Cu toate acestea, \u00eenainte de a face acest lucru, exist\u0103 c\u00e2\u021biva pa\u0219i comuni care pot fi f\u0103cu\u021bi pentru a v\u0103 preg\u0103ti pentru aceste schimb\u0103ri:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Gestionarea inventarului \u0219i a activelor: Organiza\u021biile \u00ee\u0219i vor evalua de obicei sistemele, procesele \u0219i procedurile actuale pentru a determina nivelul lor de conformitate. Aceasta include identificarea domeniilor cunoscute de neconformitate \u0219i a riscurilor \u0219i vulnerabilit\u0103\u021bilor cunoscute \u00een infrastructura lor actual\u0103.<\/li>\n\n\n\n<li>Formare \u0219i comunicare: Preg\u0103tirea resurselor dvs. pentru schimb\u0103rile viitoare este esen\u021bial\u0103 pentru a v\u0103 asigura c\u0103 toat\u0103 lumea din organiza\u021bie \u00een\u021belege schimb\u0103rile necesare. Un audit sau o actualizare a infrastructurii poate provoca perturb\u0103ri \u0219i poate necesita ca angaja\u021bii s\u0103 dob\u00e2ndeasc\u0103 noi competen\u021be. Con\u0219tientizarea acestor aspecte v\u0103 poate ajuta s\u0103 economisi\u021bi timp \u00een stabilirea priorit\u0103\u021bilor \u0219i planificarea posibilelor remedii.<\/li>\n\n\n\n<li>Gestionarea ter\u021bilor \u0219i a furnizorilor: Acesta este un aspect care este adesea trecut cu vederea. Un inventar detaliat \u0219i actualizat al furnizorilor dvs. va fi probabil necesar pentru a asigura conformitatea cu majoritatea standardelor \u0219i reglement\u0103rilor. Chiar dac\u0103 o politic\u0103 nu se refer\u0103 \u00een mod direct la un ter\u021b, aceasta poate necesita \u00een mod indirect modific\u0103ri ale termenilor \u0219i condi\u021biilor acordurilor cu furnizorii externi de servicii.<\/li>\n\n\n\n<li>Analiza lacunelor: Dac\u0103 verifica\u021bi conformitatea cu un regulament sau un standard, este important s\u0103 fi\u021bi preg\u0103ti\u021bi s\u0103 efectua\u021bi o analiz\u0103 a lacunelor pentru a identifica domeniile \u00een care sunt necesare modific\u0103ri esen\u021biale. Acesta este primul pas c\u0103tre conformitate \u0219i este cel mai bine s\u0103 fie efectuat de consultan\u021bi externi cu cuno\u0219tin\u021be specifice privind conformitatea pe care \u00eencerca\u021bi s\u0103 o ob\u021bine\u021bi.<\/li>\n<\/ul>\n\n\n\n<p>\u00cen concluzie, conformitatea cu reglement\u0103rile \u0219i standardele poate fi dificil\u0103 \u0219i costisitoare. Este posibil s\u0103 trebuiasc\u0103 s\u0103 v\u0103 baza\u021bi pe consultan\u021bi externi pentru a ob\u021bine conformitatea dac\u0103 nu dispune\u021bi de competen\u021bele interne necesare. Cu toate acestea, \u00een\u021belegerea diferen\u021belor dintre politici \u0219i reglement\u0103ri \u0219i existen\u021ba unei strategii pot face procesul mai u\u0219or \u0219i v\u0103 pot ajuta s\u0103 determina\u021bi c\u00e2nd merit\u0103 s\u0103 v\u0103 \u00eembun\u0103t\u0103\u021bi\u021bi cu un standard \u0219i c\u00e2nd este necesar s\u0103 v\u0103 conforma\u021bi reglement\u0103rilor.<\/p>","protected":false},"excerpt":{"rendered":"<p>Inteligen\u021ba artificial\u0103, realitatea virtual\u0103, pl\u0103\u021bile f\u0103r\u0103 numerar, internetul obiectelor \u0219i multe alte ramuri ale tehnologiei informa\u021biei se dezvolt\u0103 zilnic. Odat\u0103 cu cre\u0219terea \u0219i extinderea acestora, apar noi vectori de amenin\u021bare \u0219i vulnerabilit\u0103\u021bi... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/tehnologie-2\/conformitate-cu-reglementari-si-standarde\/\">Continue reading <span class=\"screen-reader-text\">Conformitatea cu reglement\u0103rile \u0219i standardele<\/span><\/a><\/p>","protected":false},"author":4,"featured_media":1298,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":["post-1288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Regulatory and Standard Compliance | Security Briefing<\/title>\n<meta name=\"description\" content=\"Stay up-to-date on the latest regulatory and standard compliance requirements for technology with Security Briefing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/tehnologie-2\/conformitate-cu-reglementari-si-standarde\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Regulatory and Standard Compliance | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Stay up-to-date on the latest regulatory and standard compliance requirements for technology with Security Briefing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/tehnologie-2\/conformitate-cu-reglementari-si-standarde\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-27T16:02:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"779\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alessandro Mirani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alessandro Mirani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/\"},\"author\":{\"name\":\"Alessandro Mirani\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2\"},\"headline\":\"Regulatory and Standard Compliance\",\"datePublished\":\"2023-01-27T16:02:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/\"},\"wordCount\":1393,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg\",\"articleSection\":[\"Tech\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/\",\"url\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/\",\"name\":\"Regulatory and Standard Compliance | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg\",\"datePublished\":\"2023-01-27T16:02:21+00:00\",\"description\":\"Stay up-to-date on the latest regulatory and standard compliance requirements for technology with Security Briefing.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg\",\"width\":779,\"height\":300,\"caption\":\"Regulatory and Standard Compliance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Regulatory and Standard Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2\",\"name\":\"Alessandro Mirani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g\",\"caption\":\"Alessandro Mirani\"},\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/alessandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Conformitate cu reglement\u0103rile \u0219i standardele | Informare de securitate","description":"R\u0103m\u00e2ne\u021bi la curent cu cele mai recente cerin\u021be de reglementare \u0219i conformitate standard pentru tehnologie cu Security Briefing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/tehnologie-2\/conformitate-cu-reglementari-si-standarde\/","og_locale":"ro_RO","og_type":"article","og_title":"Regulatory and Standard Compliance | Security Briefing","og_description":"Stay up-to-date on the latest regulatory and standard compliance requirements for technology with Security Briefing.","og_url":"https:\/\/securitybriefing.net\/ro\/tehnologie-2\/conformitate-cu-reglementari-si-standarde\/","og_site_name":"Security Briefing","article_published_time":"2023-01-27T16:02:21+00:00","og_image":[{"width":779,"height":300,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg","type":"image\/jpeg"}],"author":"Alessandro Mirani","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"Alessandro Mirani","Timp estimat pentru citire":"7 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/"},"author":{"name":"Alessandro Mirani","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2"},"headline":"Regulatory and Standard Compliance","datePublished":"2023-01-27T16:02:21+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/"},"wordCount":1393,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg","articleSection":["Tech"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/","url":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/","name":"Conformitate cu reglement\u0103rile \u0219i standardele | Informare de securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg","datePublished":"2023-01-27T16:02:21+00:00","description":"R\u0103m\u00e2ne\u021bi la curent cu cele mai recente cerin\u021be de reglementare \u0219i conformitate standard pentru tehnologie cu Security Briefing.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg","width":779,"height":300,"caption":"Regulatory and Standard Compliance"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Regulatory and Standard Compliance"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2","name":"Alessandro Mirani","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g","caption":"Alessandro Mirani"},"url":"https:\/\/securitybriefing.net\/ro\/author\/alessandro\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1288"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1288\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1298"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}