SharePoint Compliance2018-10-11T13:07:05-05:00


Get SharePoint Compliance for HIPAA, SOX, PCI, ISO, ITAR and More with Fpweb.  Keeping SharePoint Secure and Compliant Since 1999.


SharePoint Compliance - HIPAA, SOX, PCI, ISO, ITAR

SharePoint Compliance at Fpweb

Many of these compliance standards require SharePoint audits and reviews from outside parties to ensure the privacy and safety of your SharePoint data. Regardless of your industry, you can be sure that upholds the highest SharePoint compliance standards and fulfills all requirements necessary for you to confidently host your SharePoint with us.

SharePoint Server HIPAA Compliance Audits

SharePoint Server HIPAA Compliance Audits

SharePoint Records Management Compliance

SharePoint Records Management Compliance

SharePoint Bar Codes & Labeling Compliance

SharePoint Bar Codes & Labeling Compliance

SharePoint Information Rights Compliant

SharePoint Information Rights Compliant

SharePoint Digital Signatures Security

SharePoint Digital Signatures Security

SharePoint Workflow Management & Compliance

SharePoint Workflow Management & Compliance

FPWEB SHAREPOINT COMPLIANCE Tier III’s Tier III Data Center Standard means that all our hosting facilities comply with the Uptime Institute data center standards.

Data center standards determine the level of reliability you can expect from your hosting facility as developed and measured by the Uptime Institute, the industry specialist. Tier III builds upon the redundancy and reliability of the first two tiers and adds a level of resilience known as N+1 redundancy that ensures system availability in the case of component failure.

Why is the Tier III Data Center Standard important?

  • The Tier III standard is known for its impressive ability to comply with small to large businesses.
  • Meets or exceeds all Tier 1 and Tier 2 requirements.
  • Multiple independent distribution paths serving the IT equipment.
  • Dual-powered, fully compatible IT equipment.
  • Expected availability of at least 99.982%

SSAE 18 Type 2 SOC 2 Compliance logo

SSAE18 Type 2 SOC 2 Certified Data Centers

SSAE 18 Type 2 SOC 2, is an internationally recognized auditing standard developed by the American Institute of Certified Public Accountants (AICPA).

A SSAE 18 Type 2 SOC 2 audit is widely recognized because it represents that a service or outsourcing organization has been through an in-depth audit of their control activities, which generally include controls over information technology and related processes. As one of the highest industry accepted auditing standards for service companies, SSAE 18 Type 2 SOC 2 certification provides customers with guaranteed security and reliability for their systems.

Why is SSAE 18 Type 2 SOC 2 Important to You?

  • Demonstrates the establishment of control objectives and effectively designed control activities
  • If you are part of a publicly traded company that must comply with Sarbanes-Oxley or HIPAA compliances, you are required to obtain this audit report.
  • This third party perception provides instant credibility and differentiates from the competition
  • Provides reassurance that your data is being handled by service professionals that have a clearly defined and secure process for data eradication

HIPAA Compliant Hosting

The Health Insurance Portability and Accountability Act (HIPAA) outlines the national standards for security and privacy of Healthcare information.’s HIPAA-compliant data center facilities provide secure cloud hosting for electronic healthcare records & patient data. Specifically for hosting and records management, HIPAA outlines the compliance requirements for health care electronic transactions and identifiers for providers, health plans, and employers.

Why is HIPAA Compliance important?

  • HIPAA regulations protect healthcare patients and their information and coverage.
  • This compliance benefits the environment by reducing paper in the industry.
  • This standardizes all healthcare data and helps coordinate insurance benefits and payments.
  • HIPAA helps eliminate health plan-specific reporting and filing requirements for hospitals.
  • HIPAA compliance hosting places administrative, physical and technical safeguards around your data.

hitrust logo


The Health Information Trust Alliance, or HITRUST, is a privately held company located in the United States that, in collaboration with healthcare, technology, and information security leaders, has established a Common Security Framework (CSF) that can be used by all organizations that create, access, store or exchange sensitive and/or regulated data.

The HITRUST CSF, a certifiable framework that provides organizations with a comprehensive, flexible and efficient approach to regulatory compliance and risk management.

Developed in collaboration with information security professionals, the HITRUST CSF rationalizes relevant regulations and standards into a single overarching security framework. Because the HITRUST CSF is both risk- and compliance-based, organizations can tailor the security control baselines based on a variety of factors including organization type, size, systems, and regulatory requirements.

By continuing to improve and update the framework, the HITRUST CSF has become the most widely-adopted security framework in the U.S. healthcare industry. This commitment and expertise demonstrated by HITRUST ensures that organizations leveraging the framework are prepared when new regulations and security risks are introduced.

International Traffic in Arms Regulations (ITAR)

ITAR overview

The International Traffic in Arms Regulations (ITAR) is a U.S. government export regulation that covers the manufacture, sales, and distribution of defense and space-related articles and services on the United States Munitions List (USML). Administered by the U.S. State Department Directorate of Defense Trade Controls, the legislation is designed to control access to specific types of technology and associated data.
The law primarily applies to defense contractors that manufacture and/or export products on the USML, but all companies in the supply chain for such products must register to obtain the appropriate import or export license and meet the ITAR requirements. The USML includes items that are specifically designed, developed, configured, adapted or modified for a military application. However, the law also covers applicable data and information about the items on the list.

ITAR Requirements

ITAR stipulates that regulated technical data – regardless of its form – may be used solely by U.S. persons employed by the U.S. government or a U.S. company. A U.S. person is defined as a U.S. citizen, permanent resident, political asylee, government agency, or corporation. Furthermore, all U.S. companies that manufacture, export, or handle data for items on the USML are required to register with the government and obtain prior authorization to export USML items to a foreign person or government. They must also obtain a specific license exemption to export the data to a U.S. person located outside the U.S., such as to share it with a U.S. employee stationed in another country.

There are several types of export authorizations:

  • Foreign military sales (FMS) – in which the U.S. government sells items on the USML to a foreign government
  • Export license (e.g. DSP-5) – a temporary or permanent export of technology or technology data to a foreign person, but not technical services
  • Warehouse and Distribution Agreement – allows a company to establish a warehouse to export USML items to approved foreign entities
  • Technical Assistance Agreement (TAA) – authorization to provide defense-related services to foreign entities
  • Manufacturing License Agreement (MLA) – authorization to export manufacturing knowledge to a foreign entity

Technical data pertaining to items on the USML is considered to be regulated. Data that is covered under ITAR generally pertains to the design, development, production, manufacture, assembly, operation, repair, testing, maintenance, or modification of defense articles. The law also regulates software that includes system functional design, logic flow, algorithms, application programs, operating systems and support software for design, implementation, test operation, diagnostics, and repair.

  • Ensure that controlled data is encrypted with strong encryption at all times, such as FIPS 140-2. Data should be persistently encrypted during transmission to the cloud and at rest on cloud storage servers.
  • The data owner must maintain complete control over the encryption keys at all times, and no personnel from the cloud service provider should have access to the keys.
  • Only authorized individuals can access controlled data.
  • Individuals are uniquely identified and access to data is protected by strong authentication of the individual.
  • Individual access rights are routinely reviewed for ongoing need.
  • An individual’s access to data is promptly de-provisioned when it is no longer needed.
  • All events pertaining to data access are captured and logged for monitoring and reporting purposes. This includes who, what, when, and where.
  • Notifications or alerts are sent to individuals or work group members when a change to data records or files occurs.

Sarbanes Oxley Compliance

The Sarbanes-Oxley Act outlines strict governance and control standards for public companies & public accounting firms and provides additional oversight to corporate accounting.

Also known as SOX, Sarbox or the Public Company Accounting and Investor Protection Act of 2002, is a compliance standard required of all corporations, public companies or public accounting firms. provides a way to reduce the infrastructure and management cost of SOX compliance by hosting our solutions in a SOX 404 compliant environment.

Why is Sarbanes Oxley Compliance important?

  • SOX Compliance is a costly burden for large corporations and public auditors.
  • removes this compliance burden from your data management team.
  • You gain a better understanding of control design and operating effectiveness.
  • It’s easier to discover duplicate controls that must be eliminated.
  • SOX combats fraud, improves reliability of financial reporting and restores investor confidence.

National Institute of Standards and Technology (NIST)’s Data Centers follow standards set by NIST (National Institute of Standards and Technology), a US Government agency within the Commerce Department.

“The National Institute of Standards and Technology (NIST) is a non-regulatory federal agency under the Department of Commerce. It is the National Measurement Institute for the United States. The NIST’s mission is to support and develop measurement standards and technology in order to improve efficiency, facilitate trade, and enhance the quality of life.”

Why is NIST Compliance important?

  • Data Centers are measured by their infrastructure and deployment of IT and applications.
  • NIST works in collaboration with government, industry and standards bodies to boost the adoption of cloud computing by the federal government.
  • NIST develops standards that ensure the conformity and enhance the quality of products.
  • These NIST standards support interoperability, portability and security requirements
  • Meeting NIST compliance standards is just another way that provides a trusted hosting experience for our customers.

PCI Compliant Hosting

The Payment Card Industry Security Standards Council outlines the national standard taken to combat credit card fraud and increase the amount of controls placed on any cardholder data.

The PCI Security Standards Council was founded by American Express, Discover Financial Services, JCB International, MasterCard, and Visa Inc. to increase security around payment account data while also raising education and awareness of the PCI Security Standards. PCI compliance protects transaction data and follows security standards set for account data protection.

Why is PCI Compliance important?

  • Secures any organization handling cardholder information for the major debit, credit, prepaid, e-purse, ATM and POS cards.
  • Information security is pivotal for any business, specifically when dealing with ecommerce.
  • Compliance fosters trust and confidence in doing business with sensitive payment card information
  •’s various hosting solutions are PCI compliant-ready so there is no question that your customer’s information is safe with you, and your business is safe with

ISO 9000 Compliance

The ISO 9000 family of standards represents an international consensus on good quality management practices related to quality management systems and connected supporting standards.

The ISO 9000 family addresses quality management, specifically what is done to fulfill customer quality and applicable regulatory requirements, while enhancing customer satisfaction and achieving continual performance improvement. ISO 9001:2008 is the standard that provides a set of standardized requirements for a quality management system, regardless of what the user organization does, its size, or whether it is in the private, or public sector.

Why is ISO 9000 compliance important?

  • Without satisfied customers, an organization is in peril! To keep customers satisfied, the organization needs to meet their requirements.
  • The ISO 9001:2008 standard provides a tried and tested framework for taking a systematic approach to managing the organization’s processes so that they consistently turn out product that satisfies customers’ expectations.
  • ISO 9001:2008 is the only standard in the family against which organizations can be certified – although certification is not a compulsory requirement of the standard.

IPv6 Compliant Hosting

IPv6 anticipates the eventual problem of IPv4 running out of internet addresses. IPv6 uses 128-bit addresses and has 7.9×1028 times more addresses IPv4, which uses 32-bit addresses.

Developed by the Internet Engineering Task Force, the latest Internet Protocol version 6 promises to solve and accommodate the issue of consumers utilizing more and more devices to access the internet. While IPv4 only allowed 4,294,967,296 unique addresses worldwide (or less than one address per person alive in 2012), IPv6 allows for 4.8×1028 addresses per person.

Why is IPv6 Compliance important?

  • It follows a recent Government mandate for all Government external facing sites.
  • is IPv6 compliant with dual stack capabilities, offering both IPv4 and IPv6.
  • With 4.8×1028 addresses per person, IPv6 provides enough addresses to never run out.

FDA Part 11 Compliance

Part 11 of the Code of Federal Regulations is directed at the Food and Drug Administration (FDA) regarding specific guidelines on electronic records and signatures.

FDA Part 11 compliance applies to any organization that must meet the requirements and compliance policies set forth by the FDA for electronic records management. Typically involves pharmaceutical industry, drug makers, biotech industry, medical device manufacturers, CROs and more.

Why is FDA Part 11 Compliance important?

  • These requirements make organizations trustworthy and reliable.
  • Compliant records and signatures can be treated the same as paper documents.
  • Businesses can substitute paper records and handwritten documents with electronic records and electronic signatures to improve efficiency.
  • Compliant documents benefit from user/time stamping of records.

Cloud Security Alliance is an active member of Cloud Security Alliance (CSA). As a member shares cloud security knowledge with the organization and its members for faster threat intelligence synergy. also uses the Cloud Controls Matrix (CCM) as a standard framework for its cloud security customers.

About CSA

The Cloud Security Alliance is the world’s leading organization dedicated to defining and raising awareness of best practices to help ensure a secure cloud computing environment. CSA harnesses the subject matter expertise of industry practitioners, associations, governments, and its corporate and individual members to offer cloud security-specific research, education, certification, events and products. CSA’s activities, knowledge and extensive network benefit the entire community impacted by cloud—from providers and customers, to governments, entrepreneurs and the assurance industry—and provide a forum through which diverse parties can work together to create and maintain a trusted cloud ecosystem.

CSA Milestones

  • Not-for-profit association, launched in April 2009
  • Issued the first comprehensive best practices for secure cloud computing, “Security Guidance for Critical Areas of Focus for Cloud Computing”
  • Created the first and only user credential for cloud security, the Certificate of Cloud Security Knowledge (CCSK), named the top cloud computing certification by only three years after its introduction
  • Created and maintains the Cloud Controls Matrix (CCM), the world’s only meta-framework of cloud-specific security controls, mapped to leading standards, best practices and regulations
  • Maintains a registry of cloud provider security practices, the CSA Security, Trust and Assurance Registry (STAR), and offers certification and attestation

EU Privacy Shield

The EU-U.S. Privacy Shield Framework was designed by the U.S. Department of Commerce and European Commission to provide companies on both sides of the Atlantic with a mechanism to comply with EU data protection requirements when transferring personal data from the European Union to the United States in support of transatlantic commerce.

The Privacy Shield Framework replaced the US-EU Safe Harbor Framework in 2016. BBB EU Privacy Shield offers compliance assistance and independent dispute resolution services to U.S. companies adhering to the Framework. The Framework also provides a set of robust and enforceable protections for the personal data of EU individuals. It provides transparency regarding how participating companies use personal data, strong U.S. government oversight, and increased cooperation with EU data protection authorities (DPAs).

The Privacy Shield Framework offers EU individuals access to multiple avenues to address any concerns regarding participants’ compliance with the Framework. The Framework ensures a continuing level of protection consistent with Privacy Shield Principles when personal data collected under the Framework is transferred to third parties. The Framework also makes it easier for EU individuals to understand and exercise their rights. Privacy Policy

FedRamp logo


The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. The FedRAMP program has also established a Joint Accreditation Board (JAB) consisting of Chief Information Officers from DoD, DHS, and GSA.

FedRAMP benefits

  • Increase re-use of existing security assessments across agencies
  • Save significant cost, time, and resources – “do once, use many times”
  • Improve real-time security visibility
  • Provide a uniform approach to risk-based management
  • Enhance transparency between government and Cloud Service Providers (CSPs)
  • Improve the trustworthiness, reliability, consistency, and quality of the Federal security authorization process

DFARS compliance logo


The National Institute of Standards and Technology (NIST) Special Publication 800-171 Protecting Covered Defense Information (CDI) in Nonfederal Systems and Organizations, otherwise known as DFARS, outlines 14 families of security requirements for protecting the confidentiality of CDI you must meet in order to continue providing services and products to large defense organizations such as the Department of Defense.

Within those 14 families, there are 110 controls you must address. Security information and event management (SIEM), multi-factor authentication, and encryption of all data (at rest and in transit) are mandatory, as well as written policies for your security procedures and protocol.

NIST Compliance

Fpweb data centers follow the standards set by NIST, which is a non-regulatory US Government agency in the Department of Commerce. NIST’s mission is simple yet powerful: support and develop measurement standards and technology in order to improve efficiency, facilitate trade, and enhance quality of life.

There are four reasons why NIST Compliance is important:

  1. Data centers are measured by their infrastructure and deployment of IT and applications
  2. NIST works hand-in-hand with the US government, industries, and standards bodies to boost the adoption of cloud computing by the federal government
  3. NIST develops standards ensuring conformity and enhancing quality of products, supporting interoperability, portability and security requirements
  4. NIST’s sterling reputation drives trust that the hosting experience for customers is the highest, safest quality possible

By complying with DFARS, every organization that does business with the federal government needs to validate the level of security on its network resources by performing a security audit. DFARS supplies the controls in 800-171 to analyze any gaps that need to be addressed.

The objectives are to:

  • Protect controlled unclassified information (CUI) in non federal information systems and organizations
  • Ensure confidentiality, integrity, and availability of CUI
  • Provide guidance for organizations to securely process, store, and transmit CUI

Get a Quote