In-house Compliance Team
Whether you have added in a new compliance requirement, adjusted your controls
or simply want to ask a question, the iland Compliance Team is available!

 

Schedule a Free Consultation

 

ISO 27001
The international standard for information security and risk management, the ISO 27001
certification ensures that the organization you are working with adheres to best practices for
data protection as well as extensive risk management evaluations.
iland maintains ISO 27001 certifications for its data centers as well as full corporate review and certification of its operations. We are very proud of our results and customers may request a copy of iland’s ISO 27001 certificate to review iland’s commitment to information security and risk management.
Regions applicable: Global

Regions applicable: Global

ISO 9001
ISO 9000 family of quality management systems (QMS) standards are designed to help organizations ensure that they meet the needs of customers and other stakeholders while meeting statutory and regulatory requirements related to a product or service. Quality and quality management are intrinsic to iland’s operations and business practices, we are proud to be ISO 9001 certified for iland’s products and services. Customers may request a copy of iland’s ISO 27701 certificate to review iland’s commitment to GDPR compliance and data processor activities.
Regions applicable: Global

CSA STAR
The Cloud Security Alliance (CSA) Security Trust Assurance and Risk (STAR) Program encompasses key principles of transparency, rigorous auditing, and harmonization of standards such as ISO 27001 and SSAE 18 SOC 2. The STAR registry documents the security and privacy controls provided by popular cloud computing offerings. The CSA STAR is a publicly accessible registry that allows cloud customers to assess an organization’s security practices to make the best procurement decisions.
iland participates in the voluntary CSA STAR self-assessment to document iland’s compliance with CSA-published best practices. Additionally, iland aligns to CSA STAR’s attestation and certification based on iland’s ISO 27001 and SSAE 18 SOC 2 third-party audit programs.
Regions applicable: Global

HITRUST Compliance

The Health Information Trust Alliance (HITRUST) maintains the Common Security Framework (CSF) that harmonizes several compliance frameworks including HIPAA, GDPR, PCI, ISO, and NIST. In collaboration with privacy, information security, and risk management leaders from the public and private sectors, HITRUST develops and maintains its widely-adopted common risk and compliance management frameworks, related assessment and assurance methodologies.

Annually, iland’s conducts the HITRUST CSF self-assessment to document iland’s compliance with HITRUST-published best practices. Additionally, iland aligns to HITRUST’s attestation and certification based on iland’s ISO 27001 and SSAE 18 SOC 2 third-party audit programs.

Regions applicable: Global

EU/US Privacy Shield
The EU-US Privacy Shield is a framework for transatlantic exchanges of personal data for commercial purposes between the European Union and the United States. One of its purposes is to enable US companies to more easily receive personal data from EU entities under EU privacy laws meant to protect European Union citizens.
iland operates and fully conforms with the EU-US Privacy Shield framework ensuring that customer data is correctly maintained and handled, proper notification and privacy protections are in place and data sovereignty is enforced.
Regions applicable: United StatesEuropean Union

UK ICO
Information Commissioners Office or ICO maintains the privacy rights and protections for entities operating within the United Kingdom (UK). ICO requires that organizations operating within the UK conform to privacy and data protection regulations and that personal data is correctly handled.
Full registration is maintained by iland and publicly facing privacy statements and documentation pertaining to UK specific data controls are available for all customers of iland.
Regions applicable: United Kingdom

ITIL

ITIL, formally an acronym for Information Technology Infrastructure Library, is a set of detailed practices for IT service management (ITSM) that focuses on aligning IT services with the needs of business. ITIL requires extensive documentation, certified staff, and alignments within organizations to achieve successful outcomes. iland maintains ITIL certified staff to ensure proper IT Service alignment, optimizations and operates under the most recent version, ITIL v2011.

Regions applicable: Global

SSAE 18

The Statements on Standards for Attestation Engagements, also known as SSAE 18, develops the Trust Service Principles that organizations can test and report on the design and operating effectiveness of a service organization’s controls. System and Organization Controls (SOC) test an organization’s security, availability, processing integrity, confidentiality, and privacy controls.

iland maintains an SSAE 18 SOC 2 Type 2 report for iland’s internal operations, as well as iland’s U.S. data center locations. These reports are available to customers upon request.

Regions applicable: United States

PCI DSS
The Payment Card Industry Data Security Standard (PCI-DSS) is a proprietary information security standard for organizations that handle branded credit cards from the major card schemes. The PCI Standard is mandated by the card brands and administered by the Payment Card Industry Security Standards Council.
Validation of compliance is performed annually for iland data centers as well as operations and business functions and a Self-Assessment Questionnaire (SAQ) is available for customers.
Regions applicable: Global

CJIS
A joint program of the FBI, State Identification Bureaus, and CJIS Systems Agency, the Criminal Justice Information Services (CJIS) Security Policy outlines the security precautions that must be taken to protect sensitive law enforcement information. The CJIS Security Policy contains specific requirements for wireless networking, remote access, encryption, certification of cryptographic modules, and minimum key lengths.
In conjunction with NIST 800-53 and FIPS 140-2 architecture iland ensures strict adherence to data controls and data access requirements.
Regions applicable: United States

GDPR

The General Data Protection Regulation (GDPR) is a data privacy and security regulation passed by the European Union (EU) in May 2018. The GDPR intends to strengthen and unify data protection for all individuals within the EU and address the export of personal data outside of the EU and United Kingdom (UK).

iland complies with the GDPR by maintaining GDPR Policies and having a Data Protection Officer (DPO) for oversight and to ensure compliance with regulatory requirements. Additionally, iland maintains an ISO 27701 certification to test iland’s Privacy Information Management System (PIMS) as a Processor of personal data. Customers may request a copy of iland’s ISO 27701 certificate to review iland’s commitment to GDPR compliance and data processor activities.

Regions applicable: United KingdomEuropean Union

Cyber Essentials

Cyber Essentials is a UK government framework set of security controls to protect information from internet-facing threats and breaches and includes reviews of organizational firewalls, data services, virus and threat management system, and patching practices.

iland participates in the voluntary Cyber Essentials self-assessment annually to document iland’s compliance with the National Cyber Security Centre’s best practices. Additionally, iland aligns to Cyber Essentials attestation and certification based on iland’s ISO 27001 and ISO 27701 third-party audit programs.

Regions applicable: United Kingdom

NIST 800-53
NIST Special Publication 800-53 provides a catalog of security controls for all U.S. federal information systems except those related to national security. NIST develops and issues standards, guidelines, and other publications to assist federal agencies in implementing the Federal Information Security Management Act (FISMA). NIST 800-53 is the foundation of nearly all security requirements within the IT space.
Alignment to NIST 800-53 is performed within iland at all levels, from the requirements to use FIPS standards through the physical access requirements for data center access. Customers are encouraged to review our policies and processes to evaluate our alignments and help ensure alignment to their requirements.
Regions applicable: Global

ITAR
iland adheres to the United States International Traffic in Arms Regulations (ITAR) compliance requirements and is a registered entity with the United States Department of State for the handling of data that pertains to ITAR. These include geographical controls as well as staff controls to ensure that data is housed and handled only by authorized US employees.
Regions applicable: United States

Autoriteit Persoonsgegevens
With EU presence and operations within Amsterdam personal data protection is also overseen by the Autoriteit Persoonsgegevens based in the Netherlands. Responsible for personal data requirements general to the EU and specific to the Netherlands, Autoriteit Persoonsgegevens strictly enforces conformity not to just general data protection regulations but also country specific controls and personal rights.
iland is committed to ensuring conformity to Dutch privacy and data sovereignty laws and maintains strict adherence.
Regions applicable: Netherlands

Model Contract Clause Offering
Ensuring EU data protection and remaining compliant with data sovereignty requirements? iland provides for its customers Model Contract Clauses for the contractual movement of data for both Controllers and Processor entities, ensuring that the movement of data conforms to EU regulations and requirements.
Regions applicable: European UnionUnited Kingdom

Singapore Personal Data Protection Act
For customers operating within Singapore, iland maintains and adheres to all privacy requirements outlined under the Personal Data Protection Act (PDPA) of 2012 for citizens and legal operations within the Singapore region. Protection of individuals rights is paramount to proper data sovereignty!
Regions applicable: Singapore

Australian Privacy Principles
Very similar to the need to adhere to the EU GDPR requirements, Australian law requires that personal data be managed and protected in accordance with the Australian Privacy Principles (APPs) noted within the Privacy Act 1988. iland maintains strict adherence to data sovereignty and privacy requirements for all Australian operations.
Regions applicable: Australia

Got questions? Talk one-on-one with our compliance experts