(303) 665-3935

David Leedy

David LeedyDavid LeedyDavid Leedy

David Leedy

David LeedyDavid LeedyDavid Leedy
  • Home
  • Resume
  • Personal
  • Expertise
  • People
  • Process
  • Technology
  • Digital Transformation
  • Artificial Intelligence
  • Cybersecurity
  • Data Centers
  • Cloud Systems
  • Microsoft 365
  • BCDR
  • Compliance
  • Project Management

Compliance

Overview

Depending on the industry the company is in, and the geographies in which it does business, there are a variety of regulations a business must follow and be compliant with and most, if not all, have a technology component or impact. Typically, the Legal Department or legal representatives for the organization will determine which laws and regulations are applicable. From my perspective, it is important for IT leaders to work closely with the organization's legal representatives to determine which laws and regulations apply. Oftentimes, the organization's Board of Directors will require the use of 3rd party, or outside auditors, to determine what the organization needs to do to be compliant. I have hands-on experiencing in keeping organizations compliant with the regulations outlined below.

HIPAA

 IT departments that handle electronic Protected Health Information (ePHI) must comply with several key requirements under the Health Insurance Portability and Accountability Act (HIPAA). These requirements are primarily outlined in the HIPAA Security Rule, which sets national standards for protecting ePHI. 


  • Here are the main components:
  • Administrative Safeguards
  • Physical Safeguards
  • Technical Safeguards
  • Organizational, Policies, and Procedures
  • Risk Analysis and Management


By adhering to these requirements, IT departments can ensure the confidentiality, integrity, and availability of ePHI, thereby complying with HIPAA regulations. 


As the Director of Technical Services for Longmont United Hospital, and then Vice President of Technical Operations for IMA Financial Group, I was responsible for ensuring their systems were HIPAA compliant and ePHI was secure.

GDPR

 The General Data Protection Regulation (GDPR) is a comprehensive data protection law that was adopted by the European Union (EU) became enforceable in 2018. The GDPR aims to enhance the protection of personal data and give individuals more control over how their data is collected, processed, and used. It applies to all organizations that process the personal data of EU residents, regardless of where the organization is located.


Key Principles of GDPR

  • Lawfulness, Fairness, and Transparency: Data must be processed legally, fairly, and transparently.
  • Purpose Limitation: Data must be collected for specific, explicit, and legitimate purposes and not further processed in a manner incompatible with those purposes.
  • Data Minimization: Data collection should be limited to what is necessary for the intended purposes.
  • Accuracy: Data must be accurate and kept up to date.
  • Storage Limitation: Data should be kept only for as long as necessary for the intended purposes.
  • Integrity and Confidentiality: Data must be processed in a manner that ensures appropriate security.
  • Accountability: Organizations are responsible for and must be able to demonstrate compliance with these principles. 


In addition to keeping data secure and confidential, it's important to audit all of an organizations systems and databases to ensure compliance.

NYDFS Cybersecurity Regulation

NYDFS Cybersecurity Regulation, also known as 23 NYCRR 500, establishes cybersecurity requirements for financial services companies operating in the state of New York. The regulation aims to protect customer information and the IT systems of regulated entities from cyber threats.


Key Requirements:

  1. Cybersecurity Program: Covered entities must implement a comprehensive cybersecurity program tailored to their risk profile.
  2. Cybersecurity Policies: Develop and maintain policies that address information security, access controls, data governance, and incident response.
  3. Risk Assessment: Conduct regular risk assessments to identify potential cybersecurity risks and implement measures to mitigate them.
  4. Chief Information Security Officer (CISO): Appoint a CISO responsible for overseeing and implementing the cybersecurity program.
  5. Employee Training: Provide ongoing cybersecurity training for all employees.
  6. Incident Response Plan: Develop and maintain an incident response plan to promptly address cybersecurity events.
  7. Annual Certification: Senior management must annually certify compliance with the regulation.
  8. Third-Party Service Providers: Ensure that third-party service providers adhere to cybersecurity standards.

As IMA Financial Group was doing business in New York at the time the law went into effect, I was tasks with ensuring the company was compliant.

Navigation

HomeResumeExpertise

Copyright © 2025 David Leedy - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept