In today’s data-driven marketing environment, close collaboration between brands and their marketing partners is required to ensure consumer data is being safeguarded to the highest industry standards. As direct marketers, we’re all familiar with industry-related terms such as gross response rates, cost per acqusition, and customer lifetime value. It’s an unfortunate reality that in recent years we’ve been required to expand our vocabulary to include terms like bots, ransomware, vulnerabilities, and security breaches.
That’s why this morning’s announcement that IWCO Direct and Mail-Gard® have achieved HITRUST CSF v8.1 Certification is so important. It demonstrates all supporting systems meet key regulations and requirements for protecting and securing sensitive personal healthcare information (PHI).
If you work in the healthcare industry, you’re likely familiar with HITRUST CSF and understand how important the certification is to keeping PHI secure. This certification is also important for our clients outside of the healthcare field as it provides further evidence of the robust data security practices we have in place. This includes ISO 27001:2013 and PCI DSS v3.2, both verified by independent, third-party assessors, and our self-certified HIPAA compliance. Our HITRUST CSF Certification provides another layer in our “defense-in-depth” strategy of creating best-in-class data security practices built upon the most respected and recognized certifications.
As we’ve mentioned before, obtaining a certification is only the beginning. To retain our HITRUST CSF status we must be formally recertified every two years, in addition to completing an interim review. In fact, all of our security certifications have recertification periods, which ensures that we never stop working on security. Data practices and security are always at the forefront of our daily tasks, driving us to improve wherever and whenever possible.
If you share data with your marketing partners, it’s critical to understand how it is being managed and secured. No matter how intensive your own security practices may be, it’s possible your business partners represent a critical hole in your security program. If you have any questions about our security practices, please contact your account representative. We would be happy to sit down and review them with you.
Subscribe via email to our Stevie® and Feedspot award-winning blog and get a fresh post delivered weekly to your inbox. We promise to keep it interesting, but you can easily unsubscribe if we don’t.