User guide

Reconnex Corporation
88
Release 7.0.0.4
What are Policies?
Policies are sets of rules that search your data stream for specific incidents or violations. On
iGuard, the standard policies are already created for you and activated by default.
The initial results you see on your dashboard are incidents that were found by the rules in each
policy.
There are two types of policies.
Regulatory policies are provided by the iGuard system and are owned by
administrators. These are Electronic Risk Modules (ERMs), which provide a wide
range of policies for assuring compliance with privacy and fiscal surveillance law.
Custom policies are created by administrators or specified users to address the
special needs of an organization.
Using rules and policies, you can tune your system to perform certain actions when an incident is
found,
find specific concepts that you have programmed in, or create and use templates to expedite your
search processes.
Standard Policies
The standard policies, or Electronic Risk Modules, are installed on each iGuard or inSight
appliance before it ships. They are activated during the installation process, although they can also
be activated later.
You can find the list of policies you have privileges to use on the Policies tab.
Note: All standard policies are all owned by administrative users, who can allocate privileges
to view, execute, modify or delete them to users and user groups.
Regulatory Policies
Reconnex offers specialized sets of rules to assist iGuard customers in complying with complex
business law, fiscal surveillance and privacy regulations.
These rules sets are included in the standard policies, which are known as Electronic Risk Modules
(ERMs).
The following regulatory instruments are just a few of those supported by the ERMs.
The Sarbanes-Oxley Act of 2002 (SOX) requires businesses to provide extensive
financial and accounting disclosure information.
The Gramm-Leach-Bliley Act (GLBA) provides limited privacy protections against the
sale of private financial information.
The California Security Breach Notification Act (CA SB1386) is designed to ensure
that Californians are notified whenever their personal information may have been
misappropriated. The law requires companies that own, or have access to, personal
information of California residents to notify customers if their data has (or may have)
been accessed illegally.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) protects
a patient's privacy and confidential records, allows persons to immediately qualify for
comparable health insurance when they change employers, mandates the use of
standards for electronic exchange of health care data and requires use of a national
identification system.
The International Traffic in Arms Regulations (ITAR) control the export and import
of munitions articles, technical data, and defense services.