[av_heading heading=’Compliance Services.‘ tag=’h1′ link=” link_target=” style=’blockquote modern-quote’ size=’70’ subheading_active=” subheading_size=’15’ margin=” padding=’30’ icon_padding=’10’ color=” custom_font=” icon_color=” show_icon=” icon=’ue800′ font=” icon_size=” custom_class=” id=” admin_preview_bg=” av-desktop-hide=” av-medium-hide=” av-small-hide=” av-mini-hide=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” av-medium-font-size-1=” av-small-font-size-1=” av-mini-font-size-1=”][/av_heading]

[av_one_half first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’fade-in’ mobile_breaking=” mobile_display=” av_uid=’av-51ue5u’]
[av_hr class=’short’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ admin_preview_bg=” av_uid=’av-4u9nhm’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-4roadm’ admin_preview_bg=”]
As the technology landscape continues to evolve, many businesses still utilize outdated solutions that can lead to difficulty meeting regulatory requirementsdamage to an organization’s reputation, and even regulatory sanctions. RPM Technologies has expertise in building unique solutions for your organization to manage the risk and complexity of meeting compliance requirements.  The RPM Technologies Compliance Platform was specifically designed to provide all the utility needed to run your business while meeting all compliance requirements effectively and efficiently.
[/av_textblock]

[av_hr class=’short’ height=’50’ shadow=’no-shadow’ position=’center’ custom_border=’av-border-thin’ custom_width=’50px’ custom_border_color=” custom_margin_top=’30px’ custom_margin_bottom=’30px’ icon_select=’yes’ custom_icon_color=” icon=’ue808′ font=’entypo-fontello’ admin_preview_bg=” av_uid=’av-4irg82′]
[/av_one_half]

[av_one_half min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’fade-in’ mobile_breaking=” mobile_display=” av_uid=’av-4csfhe’]
[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=” av_uid=’av-feysy’]

[/av_textblock]
[/av_one_half]

[av_one_half first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’top-to-bottom’ mobile_breaking=” mobile_display=” av_uid=’av-10fmru’]
[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=” av_uid=’av-v9w1m’]

Compliance Program Development

Whether your business is a bowling alley or a bank, a good quality control and compliance program will boost your bottom line. RPM can help update and validate an existing program or develop a compliance program from the ground up. We have the experience and business acumen across a multitude of industries to develop a complete compliance program — efficiently and cost effectively. Following a thorough assessment of your business operations and IT environment we deliver a detailed plan, with prioritized, realistic timelines for successful implementation.
[/av_textblock]
[/av_one_half]

[av_one_half min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’top-to-bottom’ mobile_breaking=” mobile_display=” av_uid=’av-2x9u1u’]
[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=” av_uid=’av-2sqsga’]

Audit preparation

As business and organizations constantly evolve to meet changing market conditions even the best compliance programs need continual attention and testing. The speed of business inevitably leads to quick decisions, new systems and personnel movement that could result in procedure oversights. A good compliance program includes regular assessments to maintain audit readiness.
[/av_textblock]
[/av_one_half]

[av_one_half first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’top-to-bottom’ mobile_breaking=” mobile_display=” av_uid=’av-qx2ze’]
[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=” av_uid=’av-nrjsi’]

Compliance Training

RPM’s Compliance training is based on knowledge transfer. Beginning with a customized training plan and documentation for your environment, we educate your technical staff on methodologies, processes and best practices. Then we take your staff through the all applicable regulatory, quality control requirements and financial consequences of non-compliance to build a foundation for understanding why processes are in place. The first step toward adherences: Understanding why process and procedures are necessary. Finally, we test and grade employee knowledge by performing a mock audit. We provide both group and individual training workshops for IT management and staff. We can design a “train the trainer” course for ongoing end user employee training. Or we can deliver end user training and develop customized online training resources for your organization.
[/av_textblock]
[/av_one_half]

[av_one_half min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’top-to-bottom’ mobile_breaking=” mobile_display=” av_uid=’av-36ll8q’]
[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=” av_uid=’av-31bna2′]

Compliance Assessments

RPM’s structured methodology for process and compliance analysis is based on industry best practices most closely outlined by the Information Technology Infrastructure Library (ITIL) framework. We’ve modeled our assessment approach in line with these standards that provide a comprehensive set of process categories for measuring IT effectiveness and control. We identify categories for examination in the project scope and define goals accordingly.

To determine any changes and a need for new procedures, we review your current set of IT infrastructure policies, standard operating procedures, work instructions, and associated forms. Employee interviews, physical inspection, documentation review and testing help us identify technical, procedural and documentation gaps. Our assessment presents a clear picture of the current state of your organization and provide you with a well-defined plan and prioritized list of recommendations.
[/av_textblock]
[/av_one_half]

[av_one_half first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’top-to-bottom’ mobile_breaking=” mobile_display=” av_uid=’av-2x9u1u’]

[av_textblock size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” color=” id=” custom_class=” av_uid=’av-2sqsga’ admin_preview_bg=”]

Technology Alignment with Compliance

RPM has decades of experience in Compliance and more importantly, has the technology platforms and recommendations to help make your audit process go more smoothly.  With the combination of our Technology Architectures and Compliance Consulting, we can design, build and support a foundation that will be more secure, more scalable and allow you to have the confidence that your technology is aligned with the rules and regulations for what ever compliance protocol you are subject to.  Our approach also provides remediation for audit findings related to your current technology.
[/av_textblock]

[/av_one_half][av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-shadow’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=’bgkd-cover’ color=’main_color’ custom_bg=’#e5e5e5′ src=’http://dev.rpmtechnologies.com/wp-content/uploads/2016/05/NETWORK-SECURITY-1.jpg’ attachment=’1122′ attachment_size=’full’ attach=’scroll’ position=’center center’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_enable=’aviaTBoverlay_enable’ overlay_opacity=’0.9′ overlay_color=’#ffffff’ overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′ av_uid=’av-2lfs36′]
[av_one_full first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’fade-in’ mobile_breaking=” mobile_display=” av_uid=’av-2enhc2′]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=” av_uid=’av-26kraa’]

We begin by evaluating quality controls, key personnel responsibilities, procedure, systems, and records to ensure they are adequate for their intended use. Our audit preparation covers the following areas:

[/av_textblock]

[/av_one_full][av_one_fourth first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’fade-in’ mobile_breaking=” mobile_display=” av_uid=’av-21c22q’]

[/av_one_fourth][av_one_fourth min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’fade-in’ mobile_breaking=” mobile_display=” av_uid=’av-1y6lyy’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=” av_uid=’av-1rtwy2′]

IT Management

  • Corporate policies
  • Guidelines and SOP Review
  • Document Control Systems
  • 21 CFR Part 11
  • Validation of Procedures
  • Employee and Vendor Training

[/av_textblock]

[/av_one_fourth][av_one_fourth min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’fade-in’ mobile_breaking=” mobile_display=” av_uid=’av-1jktqa’]

[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=” av_uid=’av-1fvjw2′]

Network Infrastructure

  • Configuration validation
  • Access control
  • Change control and documentation
  • Security systems
  • Vendor audits

[/av_textblock]

[/av_one_fourth][av_one_fourth min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’fade-in’ mobile_breaking=” mobile_display=” av_uid=’av-19n9te’]

[/av_one_fourth]
[/av_section]

[av_one_half first min_height=” vertical_alignment=” space=” row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ custom_margin=” margin=’0px’ mobile_breaking=” border=” border_color=” radius=’0px’ padding=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ highlight=” highlight_size=” animation=” link=” linktarget=” link_hover=” title_attr=” alt_attr=” mobile_display=” id=” custom_class=” aria_label=” av_uid=’av-ct22′]
[av_iconlist position=’left’ iconlist_styling=” custom_title_size=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” custom_content_size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” custom_title=” custom_content=” color=” custom_bg=” custom_font=” custom_border=” animation=” alb_description=” id=” custom_class=” av_uid=’av-kh2c5tcu’ admin_preview_bg=”]
[av_iconlist_item title=’NIST’ icon=’ue889′ font=’entypo-fontello’ heading_tag=” heading_class=” link=” linktarget=” linkelement=” av_uid=’av-gjbe’]
The National Institute of Standards and Technology develops and maintains standards and guidelines to meet additional requirements such as FISMA and FIPS compliance.  Complying with NIST guidelines or the NIST Cybersecurity Framework can help to ensure compliance with other compliance regulations. 
[/av_iconlist_item]
[av_iconlist_item title=’HIPAA’ icon=’ue889′ font=’entypo-fontello’ heading_tag=” heading_class=” link=” linktarget=” linkelement=” av_uid=’av-127v9u’]
The Health Insurance Portability and Accountability Act of 1996 is the standard for protection of sensitive patient data and control of that data in the medical industry. HIPPA guidelines apply to any organization that collects, creates, or transmits patient health information electronically. HIPPA has a tiered structure of penalty for non-compliance that has increasing fines depending on the level of negligence shown in the failure. 
[/av_iconlist_item]
[av_iconlist_item title=’FISMA’ icon=’ue889′ font=’entypo-fontello’ heading_tag=” heading_class=” link=” linktarget=” linkelement=” av_uid=’av-wp1v6′]
The Federal Information Security Management Act of 2002 is a United States federal law which made it a requirement for federal agencies to develop, document, and implement an information security and protection program. Companies in the private sector who do business with federal agencies may be required or incentivized to adhere to the same FISMA guidelines.  Penalties for not complying with FISMA include loss of contracts with federal agencies, damage to reputation, and reduced federal funding. 
[/av_iconlist_item]
[av_iconlist_item title=’FINRA’ icon=’ue889′ font=’entypo-fontello’ heading_tag=” heading_class=” link=” linktarget=” linkelement=” av_uid=’av-r8zzu’]
The Financial Industry Regulatory Authority (FINRA) is a self-regulatory non-profit organization that is overseen by the Securities Exchange Commission (SEC).  FINRA is responsible for monitoring and regulating stockbrokers and brokerage firms to ensure financial markets are fair. Penalties for not complying with FINRA requirements are generally financial fines to deter misconduct but can include suspension or barring from working in the industry. 
[/av_iconlist_item]
[/av_iconlist]
[/av_one_half]

[av_one_half min_height=” vertical_alignment=” space=” row_boxshadow=” row_boxshadow_color=” row_boxshadow_width=’10’ custom_margin=” margin=’0px’ mobile_breaking=” border=” border_color=” radius=’0px’ padding=’0px’ column_boxshadow=” column_boxshadow_color=” column_boxshadow_width=’10’ background=’bg_color’ background_color=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=” background_position=’top left’ background_repeat=’no-repeat’ highlight=” highlight_size=” animation=” link=” linktarget=” link_hover=” title_attr=” alt_attr=” mobile_display=” id=” custom_class=” aria_label=” av_uid=’av-ct22′]
[av_iconlist position=’left’ iconlist_styling=” custom_title_size=” av-medium-font-size-title=” av-small-font-size-title=” av-mini-font-size-title=” custom_content_size=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” font_color=” custom_title=” custom_content=” color=” custom_bg=” custom_font=” custom_border=” animation=” alb_description=” id=” custom_class=” av_uid=’av-kh2c5tcu’ admin_preview_bg=”]
[av_iconlist_item title=’DFARS’ icon=’ue889′ font=’entypo-fontello’ heading_tag=” heading_class=” link=” linktarget=” linkelement=” av_uid=’av-mmeb6′]
The Defense Federal Acquisition Regulation Supplement (DFARS) to the Federal Acquisition Regulation (FAR) is administered by the Department of Defense (DoD). The DFARS is intended to maintain cybersecurity standards according to requirements laid out by the National Institute of Standards and Technology (NIST), specifically NIST SP 800-171. Penalties for not complying with DFARS regulations include a stop work order for all work on behalf of the DoD and financial penalties for damages due to breach of contract or false claims. 
[/av_iconlist_item]
[av_iconlist_item title=’PCI DSS’ icon=’ue889′ font=’entypo-fontello’ heading_tag=” heading_class=” link=” linktarget=” linkelement=” av_uid=’av-d7g5e’]
The Payment Card Industry Data Security Standard (PCI DSS) is a set of requirements that ensures that companies maintain a secure environment when they process, transmit, or store credit card information. If your business does not meet the PCI standards for compliance and the security of cardholder data is compromised, you are liable for the damaged caused to the customer as well as potentially having to pay a penalty. You may also lose the ability to accept credit card payments entirely. 
[/av_iconlist_item]
[av_iconlist_item title=’SOC2′ icon=’ue889′ font=’entypo-fontello’ heading_tag=” heading_class=” link=” linktarget=” linkelement=” av_uid=’av-7u1yi’]
Systems and Organization Controls 2 (SOC 2) is an auditing procedure that concentrates on the protection and privacy of data. For security-conscious businesses, SOC 2 compliance is considered a minimal requirement when considering for a technology-based organization that stores client information in the cloud.  While there are no penalties for not meeting SOC 2 compliance, it will often be a requirement for many customers and letting compliance lapse can lead to loss of customers and damage to reputation. 
[/av_iconlist_item]
[/av_iconlist]
[/av_one_half]

[av_section min_height=” min_height_pc=’25’ min_height_px=’500px’ padding=’default’ custom_margin=’0px’ custom_margin_sync=’true’ color=’main_color’ background=’bg_color’ custom_bg=” background_gradient_color1=” background_gradient_color2=” background_gradient_direction=’vertical’ src=’http://dev.rpmtechnologies.com/wp-content/uploads/2018/03/GREEN-CIRCUIT-BOARD-BKGD-300×199.jpg’ attachment=’1162′ attachment_size=’medium’ attach=’fixed’ position=’center center’ repeat=’repeat-x’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” shadow=’no-shadow’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=’bgkd-cover’ custom_class=” aria_label=” av_element_hidden_in_editor=’0′ av_uid=’av-43yhhu’]
[av_one_fifth first min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’top-to-bottom’ mobile_breaking=” mobile_display=” av_uid=’av-3eyh16′]

[/av_one_fifth][av_three_fifth min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’top-to-bottom’ mobile_breaking=” mobile_display=” av_uid=’av-3rf5t6′]

[av_promobox button=’yes’ label=’Contact Us’ link=’page,513′ link_target=” color=’theme-color’ custom_bg=’#444444′ custom_font=’#ffffff’ size=’large’ icon_select=’no’ icon=’ue800′ font=’entypo-fontello’ box_color=” box_custom_font=’#ffffff’ box_custom_bg=’#444444′ box_custom_border=’#333333′ admin_preview_bg=” av_uid=’av-3liy5e’]

Interested in these services? Contact us for more information!

[/av_promobox]

[/av_three_fifth][av_one_fifth min_height=” vertical_alignment=’av-align-top’ space=” margin=’0px’ margin_sync=’true’ padding=’0px’ padding_sync=’true’ border=” border_color=” radius=’0px’ radius_sync=’true’ background_color=” src=” attachment=” attachment_size=” background_position=’top left’ background_repeat=’no-repeat’ animation=’top-to-bottom’ mobile_breaking=” mobile_display=” av_uid=’av-3trfre’]

[/av_one_fifth]
[/av_section]

[av_section min_height=” min_height_px=’500px’ padding=’default’ shadow=’no-shadow’ bottom_border=’no-border-styling’ bottom_border_diagonal_color=’#333333′ bottom_border_diagonal_direction=” bottom_border_style=” custom_arrow_bg=” id=’bgkd-cover’ color=’alternate_color’ custom_bg=” src=’http://dev.rpmtechnologies.com/wp-content/uploads/2018/02/red-bkg.jpg’ attachment=’954′ attachment_size=’full’ attach=’scroll’ position=’center center’ repeat=’no-repeat’ video=” video_ratio=’16:9′ overlay_opacity=’0.5′ overlay_color=” overlay_pattern=” overlay_custom_pattern=” av_element_hidden_in_editor=’0′ av_uid=’av-dwv9u’]
[av_textblock size=” font_color=” color=” av-medium-font-size=” av-small-font-size=” av-mini-font-size=” admin_preview_bg=” av_uid=’av-73zoq’]

What Our Clients Have Said

“From our very first meeting, RPM understood my business. They managed a recent acquisition and systems upgrade without disrupting operations. Now we’re on track for future IT expansion.”

Charles Haywood

President, Mansfield-King

[/av_textblock]
[/av_section]