COMPLIANCE
CHALLENGES IN
DBMS
Presented by:
John Leo M. Diangson & Justine T. Egenias
TABLE OF CONTENTS
Why is Compliance
01 What is DBMS? 02 Necessary?
Typical Industries Key Compliance
03 Impacted 04 Standards
Common
05 Compliance
Challenges
06 Real-World Issues
Risk of Non- Mitigation
07 Compliance 08 Strategies
INTRODUCTION
DBMS platforms store sensitive data,
making regulatory compliance essential.
Laws like GDPR and HIPAA require strict
data control, but many systems face
challenges like unauthorized access,
weak security, and complex legal rules.
This report outlines key compliance
issues and how to address them.
What is DBMS?
A Database Management System (DBMS) is
software that allows users to create, store,
manage, and retrieve data efficiently. Examples
include MySQL, Oracle, and Microsoft SQL
Server.
DBMS
WHY IS COMPLIANCE NECESSARY?
Compliance allows data to be processed
based on legal, ethical, and regulatory
guidelines. It safeguards sensitive data,
promotes trust, and prevents legal
ramifications.
TYPICAL INDUSTRIES IMPACTED
Healthcare E-commerce
patient confidentiality customer information and
(HIPAA)
Education payment data
student information
protection (FERPA)
Finance Government
public record and national
transactional and identity
security information
protection (SOX, PCI DSS)
KEY COMPLIANCE STANDARDS
● GDPR (General Data Protection Regulation) – Enforces personal
data protection of EU residents; imposes consent, rights to access
data, and data breach notification.
● HIPAA( Health Insurance Portability and Accountability Act) –
Mandates healthcare information protection within the U.S.;
emphasizes privacy, security, and patient autonomy.
● SOX(Sarbanes-Oxley Act) – Enforces financial information accuracy
and protection of public company information; mandates strict
internal controls.
● PCI DSS(Payment Card Industry Data Security Standard) – Protects
credit card transactions; imposes encryption, access restrictions,
and routine monitoring.
COMMON COMPLIANCE CHALLENGES
Data Protection & Privacy Securing personal and sensitive information against leaks or misuse.
Access Control Restricting who may see or change data based on roles.
Audit Trails & Logging Monitoring who saw or modified data and when.
Data Retention Policies Retaining data no longer than legally necessary.
Encryption & Masking Protecting data stored and transmitted
REAL-WORLD ISSUES
Misconfigured
Lack of Regular Audits
Permissions
Users can see data they Compromises monitoring
should not. and risk identification.
Unpatched
Vulnerabilities Insider Threats
Exposes systems to Staff can exploit or leak
intrusions. confidential information.
RISK OF NON-COMPLIANCE
Legal Penalties & Operational
Fines Loss of Reputation
Disruptions
Offenses cost Information breaches Investigations and
organizations lose customer trust. remedies stop
financially. business operations.
MITIGATION STRATEGIES
● Regular Compliance Audits – Guarantees
continuous compliance with standards.
● Role-Based Access Control – Restricts data
access depending on user roles.
● Data Encryption – Safeguards sensitive data
against unauthorized usage.
● Automated Compliance Tools – Simplifies
monitoring and reporting.
● Staff Training – Trains staff on compliance
specifications and best practice.
CONCLUSION
The major compliance challenges are protecting
sensitive information, managing access control,
keeping audit trails, and conforming to data
retention policies. Proactive compliance is
necessary in order to guard data, facilitate legal
compliance, and prevent fines. For DBMS teams,
routine audits, robust encryption mechanisms,
role-based access, and employee training play a
key role in ensuring compliance standards.
REFERENCES
General Data Protection Regulation (GDPR) – European Union Regulation.
Health Insurance Portability and Accountability Act (HIPAA) – U.S. Government
Regulation
Sarbanes-Oxley Act (SOX) – U.S. Government Law.
Payment Card Industry Data Security Standard (PCI DSS) – Payment Card
Industry Security Standards Council
Family Educational Rights and Privacy Act (FERPA) – U.S. Government
Regulation.
ISO/IEC 27001:2013 – International Organization for Standardization (ISO).
National Institute of Standards and Technology (NIST) Cybersecurity Framework
– U.S. Department of Commerce
Cloud Security Alliance (CSA) – Cloud Security Best Practices.
The National Cyber Security Centre (NCSC) – UK Government Cybersecurity
Guidelines.
Center for Internet Security (CIS) – Cybersecurity Best Practices and Standards.