Explore key data security and privacy regulations such as PCI DSS, HIPAA, and GDPR, and learn how CPAs can guide and audit compliance to ensure robust information governance and protect stakeholder interests.
The modern business environment demands a thorough understanding of the key laws and standards governing data security, privacy, and confidentiality. Beyond the broad frameworks (e.g., COSO, COBIT, and ITIL) introduced earlier, organizations must also comply with specific industry-focused regulations that impose critical requirements on how data is collected, stored, processed, and protected. These regulations significantly impact the design and operation of internal controls, as well as the way Certified Public Accountants (CPAs) plan and perform IT audits or advisory engagements.
This section examines three prominent data security and privacy regulations and standards:
• Payment Card Industry Data Security Standard (PCI DSS)
• Health Insurance Portability and Accountability Act (HIPAA)
• General Data Protection Regulation (GDPR)
Each of these has a unique scope, rationale, and compliance approach but shares a common purpose: to ensure the confidentiality, integrity, and availability of sensitive data. As CPAs increasingly encounter data security and privacy requirements in audit and advisory contexts, understanding how to integrate these regulations into risk management and control assessment processes becomes paramount.
Understanding the regulations below will be critical when evaluating an entity’s internal control environment, performing SOC engagements (see Part V), or advising clients on effective information system controls.
Payment Card Industry Data Security Standard (PCI DSS) is a globally recognized set of security requirements developed by the PCI Security Standards Council, established jointly by major payment card brands (e.g., Visa, MasterCard, American Express, Discover, and JCB). Although sometimes incorrectly referred to as a law, PCI DSS is actually an industry-mandated standard. However, non-compliance can lead to fines, reputational damage, and even loss of the ability to process credit card transactions, making adherence essential for entities handling payment card data.
Scope
• PCI DSS covers all entities that store, process, or transmit cardholder data, including merchants, service providers, and other third parties that handle card payments.
• It sets guidelines for securing payment infrastructure, including cardholder data environments (CDEs), networks, and supporting applications.
Key Requirements
PCI DSS is divided into six overarching objectives, which are further broken down into 12 primary requirements:
Typical Compliance Steps
Practical Example
A medium-sized retailer accepting in-store and online credit card payments must ensure all payment systems, web applications, and underlying network infrastructure conform to PCI DSS. They may deploy network firewalls, robust encryption for stored card data, and implement system monitoring to detect unauthorized activity across POS devices. The CPA or IT auditor, in turn, would verify that configurations adhere to the standard, confirm the retailer’s vulnerability scan results, and test compliance evidence (e.g., firewall rule sets, encryption certificates).
HIPAA is a U.S. federal law enacted to protect sensitive patient data. Its key provisions relevant to data privacy and security are found in the Administrative Simplification section, which includes the HIPAA Privacy Rule and Security Rule. Entities responsible for HIPAA compliance (known as “covered entities” and “business associates”) include healthcare providers, health plans, clearinghouses, and the organizations that interact with protected health information (PHI).
Scope
• Applies to protected health information (PHI) that can identify an individual or relate to health conditions, treatments, or payments.
• Covers healthcare providers, insurance companies, and business associates that handle PHI on behalf of covered entities (e.g., third-party billing companies, IT service providers managing patient records).
Key Requirements
Typical Compliance Steps
Common Pitfalls
• Underestimating the complexity of business associate agreements (BAAs).
• Inadequate staff training leading to accidental disclosures of PHI.
• Failure to monitor or quickly detect unauthorized access or potential data breaches.
Practical Example
A CPA tasked with auditing a regional hospital’s HIPAA compliance practices might review user access logs within the hospital’s electronic health record (EHR) system to ensure only authorized employees can access patient data. The auditor may also examine contractual agreements with third-party service providers (e.g., a billing software vendor) to verify that BAAs adequately specify each party’s security responsibilities.
GDPR is an expansive data protection law enforced across the European Union (EU) that also applies to organizations around the globe processing data of EU residents. GDPR elevates the rights of individuals over their personal data, requiring stringent measures to safeguard personal information, ensure lawful data processing, and uphold transparency.
Scope
• Applies to organizations (data controllers and data processors) that offer goods or services to, or monitor the behavior of, individuals in the EU.
• Personal Data under GDPR is any information that can directly or indirectly identify a natural person, including names, addresses, online identifiers (e.g., IP addresses), and more.
Key Principles
Typical Compliance Steps
Practical Example
A multinational e-commerce retailer may process EU customer data even when operating out of a U.S.-based headquarters. The retailer would need to appoint a representative or DPO within the EU and ensure that website privacy policies, cookie consent mechanisms, and marketing communications comply with GDPR requirements. The CPA reviewing the retailer’s data privacy practices might validate the existence of data subject request procedures (e.g., how the company handles “right to be forgotten” requests) and check that data processing agreements for cloud providers meet GDPR contractual standards.
Although PCI DSS, HIPAA, and GDPR are among the most commonly encountered regulations, other authoritative standards can also influence how organizations design and test controls. Consider the following:
• Gramm-Leach-Bliley Act (GLBA) for financial institutions in the U.S.
• Children’s Online Privacy Protection Act (COPPA) for organizations targeting users under 13 in the U.S.
• California Consumer Privacy Act (CCPA), a state-level regulation that extends privacy rights to California residents.
CPAs in public practice must factor in these regulatory mandates when designing audit procedures or offering advisory services. Understanding how each regulatory environment aligns with the COSO framework, COBIT, and various IT general controls (ITGCs) can help ensure that an organization’s control structure meets the demands of legal and regulatory compliance.
• Challenge: Changing Regulatory Landscape
– Best Practice: Establish ongoing monitoring of proposed and newly enacted regulations; integrate compliance updates into existing governance frameworks (COSO ERM, COBIT).
• Challenge: Overlapping Requirements
– Best Practice: Create a unified compliance strategy that streamlines audits and testing, reducing “audit fatigue” for control owners by mapping advanced frameworks such as NIST or ISO 27001 to the relevant regulations.
• Challenge: Third-Party Vendor Risks
– Best Practice: Require detailed service-level agreements (SLAs) and data processing agreements (DPAs). Verify that vendors adhere to appropriate security standards with independent audits such as SOC 2® or relevant certifications.
• Challenge: Maintaining Complete and Accurate Records
– Best Practice: Implement robust policies for record retention, access logs, and evidence of control operation. Leverage automation where feasible to reduce human error.
• Challenge: Data Governance and Classification
– Best Practice: Adopt a data classification schema (see Chapter 11) and track repositories containing sensitive data. Automate discovery and classification technologies for large data sets.
Below is a simplified diagram depicting how an entity’s data security and privacy obligations intersect with various regulations. Although each standard differs in scope and focus, they often intersect in terms of core protective measures and oversight processes.
flowchart LR A["Regulation <br/>(PCI DSS, HIPAA, GDPR)"] --> B["Data Security <br/>Requirements"] A --> C["Privacy <br/>Requirements"] B --> D["Implement & <br/>Monitor Controls"] C --> D D --> E["Audit & <br/>Report Findings"] E --> F["Ongoing <br/>Compliance"]
• A: A regulation such as PCI DSS, HIPAA, or GDPR imposes specific data handling and protection requirements.
• B and C: Entities must adopt both security and privacy controls to safeguard data and ensure compliance with legislative demands.
• D: These controls must be implemented and monitored, with periodic internal evaluations to verify effectiveness.
• E: Periodic audits (internal, external, or SOC engagements) generate compliance reports.
• F: Compliance is an ongoing cycle that requires continuous improvement, threat monitoring, and updating of internal policies.
CPAs play a significant role in guiding organizations through regulatory compliance. Their tasks might include:
• Reviewing internal controls over financial information that intersects with protected data (payment card details, patient health records, or personal data).
• Evaluating service organizations’ compliance with PCI DSS or HIPAA provisions as part of SOC 1® or SOC 2® engagements.
• Assessing the design and operating effectiveness of privacy controls under GDPR, including third-party data processing and data protection impact assessments (DPIAs).
• Advising on the governance structure needed to align compliance frameworks with organizational risk tolerance, leveraging COSO’s ERM or COBIT’s governance components.
A CPA’s specialized insight into financial systems, combined with an understanding of IT risks, positions them well to act not only as auditors verifying adherence but also as strategic advisors, helping design robust control environments that meet multi-layered regulatory expectations.
Below are additional resources for in-depth study of data security and privacy regulations:
• PCI Security Standards Council: Official documentation on PCI DSS, Self-Assessment Questionnaires, and best practices. (https://www.pcisecuritystandards.org/)
• U.S. Department of Health & Human Services (HHS) HIPAA Info: Includes guidance on the HIPAA rules, training materials, case studies. (https://www.hhs.gov/hipaa/index.html)
• European Commission GDPR Portal: Official GDPR texts, guidelines, and resources for businesses. (https://ec.europa.eu/info/law/law-topic/data-protection_en)
• International Association of Privacy Professionals (IAPP): Training, research, and certifications on international data privacy. (https://iapp.org/)
• AICPA Privacy Resources: Guidance documents on privacy frameworks and exam resources for CPAs. (https://www.aicpa.org/)
Information Systems and Controls (ISC) CPA Mocks: 6 Full (1,500 Qs), Harder Than Real! In-Depth & Clear. Crush With Confidence!
• Tackle full-length mock exams designed to mirror real ISC questions.
• Refine your exam-day strategies with detailed, step-by-step solutions for every scenario.
• Explore in-depth rationales that reinforce higher-level concepts, giving you an edge on test day.
• Boost confidence and minimize anxiety by mastering every corner of the ISC blueprint.
• Perfect for those seeking exceptionally hard mocks and real-world readiness.
Disclaimer: This course is not endorsed by or affiliated with the AICPA, NASBA, or any official CPA Examination authority. All content is for educational and preparatory purposes only.