NIST AI RMF 101

By Chris Abacon | August 15, 2025

The NIST AI Risk Management Framework (AI RMF) was developed to help organizations designing, developing, deploying, or using AI systems…

Read More

Deceptive Telemarketing Leads to Massive FTC Fines

By Steve Gniadek | August 11, 2025

Two companies, Assurance IQ and MediaAlpha, will pay a total of $145 million in fines to the Federal Trade Commission…

Read More

ARC-AMPE Replacing MARS-E for ACA Cybersecurity Compliance

By Chris Abacon | August 8, 2025

The Centers for Medicare & Medicaid Services (CMS) has introduced a new cybersecurity and privacy framework: Acceptable Risk Controls for…

Read More

A Comprehensive Guide to PCI DSS SAQ Types

By Brandon Breslin | August 7, 2025

PCI DSS Self-Assessment Questionnaires (SAQs) are tools that help merchants and service providers assess their compliance with the Payment Card…

Read More

CCPA ADMT, Cybersecurity Audit, and Risk Assessment Rules Finalized

By Matt Dumiak | August 5, 2025

In July 2025, the California Privacy Protection Agency (CPPA) board finalized CCPA rules governing automated decision-making technology (ADMT), risk assessments,…

Read More

White House Outlines Its AI Action Plan

By Kevin Mayfield | August 1, 2025

What is America’s Artificial Intelligence Action Plan? In the early days of the Trump administration, Executive Order 14179, “Removing Barriers…

Read More

McLaughlin Fallout Begins: Courts Split On Whether the TCPA’s DNC Rules Cover Texts

By Tony Jarnigan | July 30, 2025

A New Era of TCPA Interpretation As we alerted readers at the beginning of July, the U.S. Supreme Court’s decision…

Read More

TSR Disclosure Requirements

By Steve Gniadek | July 21, 2025

Since it was enacted in 1995, the Telemarketing Sales Rule (TSR) has given the Federal Trade Commission (FTC) and state…

Read More

What is a SOC 2 Bridge Letter?

By Carol Amick | July 21, 2025

A SOC 2 bridge letter, also known as a gap letter, is a document organizations provide to customers to assure them they are…

Read More

FISMA vs. FedRAMP: What’s the Difference

By Chris Abacon | July 21, 2025

FISMA and FedRAMP and federal cybersecurity standards designed to protect sensitive data. Understand the differences between FISMA vs. FedRAMP including…

Read More

Finding a credible expert with the appropriate background, expertise, and credentials can be difficult. CompliancePoint is here to help.

Our Clients

Copyright © 2025 CompliancePoint, Inc. All Rights Reserved | Privacy Statement | Accessibility | Disclosure | Trust | Sitemap

PossibleNOW - a sister company

Connect with us on social media