Cover image of show Compliance Technologies

Compliance Technologies

Podcast by David William Silva

English

Technology & science

Limited Offer

2 months for 19 kr.

Then 99 kr. / monthCancel anytime.

  • 20 hours of audiobooks / month
  • Podcasts only on Podimo
  • All free podcasts
Get Started

About Compliance Technologies

Compliance Technologies is a short-form audio series exploring how modern organizations design, implement, and demonstrate compliance in a world shaped by cybersecurity, privacy, regulation, and advanced technologies. Through focused insights, the show reframes compliance as infrastructure, not paperwork, and examines how law, security, risk, operations, and emerging technologies like AI and privacy-enhancing systems work together to build trustworthy, efficient, and verifiable organizations.

All episodes

33 episodes

episode The HIPAA Security Rule artwork

The HIPAA Security Rule

In this episode of Compliance Technologies, we continue the HIPAA series with a focused look at the HIPAA Security Rule and what it actually requires in practice. The Security Rule governs how electronic protected health information (ePHI) must be safeguarded through administrative, physical, and technical controls. Rather than prescribing specific tools, HIPAA requires organizations to assess risk, implement reasonable and appropriate safeguards, and continuously review how systems protect sensitive health data. This episode explains how the Security Rule functions as a feedback loop between risk, safeguards, and system behavior, and why flexibility in implementation does not mean flexibility in responsibility. If you work with healthcare systems, data, or compliance, this short episode clarifies what the Security Rule is really asking and why consistent protection matters more than perfect controls.

9 Feb 2026 - 2 min
episode The Privacy Rule and "Minimum Necessary" artwork

The Privacy Rule and "Minimum Necessary"

In this episode of Compliance Technologies, we continue the HIPAA series by focusing on the HIPAA Privacy Rule and one of its most important principles: minimum necessary. The Privacy Rule governs how protected health information (PHI) may be used and disclosed, but its real operational impact lies in how organizations limit access to PHI, even when use is permitted. This episode explains what “minimum necessary” means in practice, when it applies, and why it turns everyday access decisions into compliance decisions. We explore how minimum necessary is enforced through system design rather than intent, why overly broad access represents a compliance risk even without a breach, and how regulators evaluate whether organizations are truly limiting exposure to PHI. If you build, operate, or oversee systems that handle health information, this conversation clarifies how the Privacy Rule shapes access, workflows, and accountability across healthcare environments.

28 Jan 2026 - 3 min
episode Announcing the CSE Registry: A Public Infrastructure for Compliance Signals artwork

Announcing the CSE Registry: A Public Infrastructure for Compliance Signals

In this special episode of Compliance Technologies, we announce the launch of the Compliance Signal Enumeration (CSE) Registry, a public, open-source infrastructure for defining and referencing compliance signals. Modern compliance frameworks increasingly rely on automation, tooling, and continuous evidence collection, yet the industry lacks a shared vocabulary for describing what is actually being measured. Without a canonical way to reference compliance signals, evidence becomes ambiguous, integrations become brittle, and trust degrades across tools, vendors, and audits. The CSE Registry addresses this gap by providing a framework-agnostic, machine-readable, and human-auditable registry of compliance signals. It is designed to support compliance platforms, security tools, evidence pipelines, and audit workflows by offering a stable reference point for observable, reproducible, and verifiable compliance facts. This episode explains why the registry exists, how it is intended to be used, and why treating compliance as infrastructure, rather than documentation, is essential for the future of continuous and provable compliance. The CSE Registry is publicly available at cseregistry.org, with the open-source repository hosted on GitHub.

26 Jan 2026 - 6 min
episode HIPAA Is About Responsibility, Not Just Privacy artwork

HIPAA Is About Responsibility, Not Just Privacy

In this episode of Compliance Technologies, we begin a new series on HIPAA by clarifying what the law actually regulates and what it does not. HIPAA is often described as a privacy law, but at its core it defines responsibility for how protected health information (PHI) is created, used, stored, and transmitted across systems and organizations. This episode explains who HIPAA applies to, what qualifies as PHI and ePHI, and why accountability sits at the center of the regulation. We explore how HIPAA assigns obligations to covered entities and business associates, why health data naturally flows across modern systems, and how HIPAA’s structure assumes continuous risk assessment rather than one-time compliance. If you build, operate, or oversee systems that handle health information, this episode sets the foundation for understanding HIPAA as an operating framework, not a checklist, and why responsibility, not technology, is the starting point.

18 Jan 2026 - 2 min
episode ISO 27001 as an Operating System for Trust artwork

ISO 27001 as an Operating System for Trust

In this episode of Compliance Technologies, we conclude the ISO twenty-seven thousand one series by stepping back and viewing the standard as a whole, not as a certification exercise, but as an operating system for trust. After exploring context, risk, control selection, and day-to-day operation of the Information Security Management System (ISMS), this episode explains how ISO/IEC 27001 is designed to help organizations make consistent security decisions over time, even as systems, people, and threats change. We discuss why certification is only a point-in-time validation, how the ISMS enables continuity and accountability, and why organizations that truly internalize ISO 27001 shift from “passing audits” to sustaining trust through structured governance and continual improvement. If you build, operate, or oversee an ISMS, this episode brings the series together by showing how ISO 27001 functions not as a checklist, but as a durable framework for managing information security at scale.

17 Jan 2026 - 2 min
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
En fantastisk app med et enormt stort udvalg af spændende podcasts. Podimo formår virkelig at lave godt indhold, der takler de lidt mere svære emner. At der så også er lydbøger oveni til en billig pris, gør at det er blevet min favorit app.
Rigtig god tjeneste med gode eksklusive podcasts og derudover et kæmpe udvalg af podcasts og lydbøger. Kan varmt anbefales, om ikke andet så udelukkende pga Dårligdommerne, Klovn podcast, Hakkedrengene og Han duo 😁 👍
Podimo er blevet uundværlig! Til lange bilture, hverdagen, rengøringen og i det hele taget, når man trænger til lidt adspredelse.

Choose your subscription

Most popular

Limited Offer

Premium

20 hours of audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

2 months for 19 kr.
Then 99 kr. / month

Get Started

Premium Plus

Unlimited audiobooks

  • Podcasts only on Podimo

  • No ads in Podimo shows

  • Cancel anytime

Start 7 days free trial
Then 129 kr. / month

Start for free

Only on Podimo

Popular audiobooks

Get Started

2 months for 19 kr. Then 99 kr. / month. Cancel anytime.