{"id":1674,"date":"2015-10-21T10:46:18","date_gmt":"2015-10-21T16:46:18","guid":{"rendered":"http:\/\/abclegaldocs.com\/blog-Colorado-Notary\/?p=1674"},"modified":"2025-12-03T17:40:36","modified_gmt":"2025-12-04T00:40:36","slug":"affidavit-of-cybersecurity-compliance","status":"publish","type":"post","link":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/","title":{"rendered":"Affidavit of Cybersecurity Compliance"},"content":{"rendered":"<h1 style=\"text-align: justify;\"><a href=\"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Tech_Tips_200x200.jpg\"><img decoding=\"async\"  class=\"alignleft size-full wp-image-1682\" src=\"data:image\/gif,GIF89a%01%00%01%00%80%00%00%00%00%00%FF%FF%FF%21%F9%04%01%00%00%00%00%2C%00%00%00%00%01%00%01%00%00%02%01D%00%3B\" data-layzr=\"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Tech_Tips_200x200.jpg\" alt=\"Tech Tips\" width=\"200\" height=\"200\" \/><\/a>Affidavit of Cybersecurity Compliance<\/h1>\n<p style=\"text-align: justify;\"><strong>Small business<\/strong> owners must protect their computer systems and confidential information from destruction, tampering, loss and theft.\u00a0 The <strong>National Institute of Standards and Technology<\/strong> (<strong>NIST<\/strong>) has written interagency report, <strong>NIST IR 7621<\/strong>, on <strong>cybersecurity standards<\/strong> for small business.\u00a0 The standard is promoted in partnership with the <strong>Small Business Administration<\/strong> (<strong>SBA<\/strong>) and the <strong>FBI<\/strong>.<\/p>\n<p style=\"text-align: justify;\">As <strong>evidence<\/strong> of <strong>compliance<\/strong> with this federal agency standard, the small business President, CEO or <strong>Chief Security Officer<\/strong>, can sign a sworn statement, or <strong>Affidavit<\/strong> of <strong>Cybersecurity Compliance<\/strong>.\u00a0 The affidavit is signed before a <strong>notary public<\/strong>.\u00a0 The statements must be true and correct, under penalty of <strong>perjury<\/strong>.<!--more--><\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Annual_Cybersecurity_Compliance_Checkup\"><\/span>Annual Cybersecurity Compliance Checkup<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\"><strong>NIST 7621<\/strong> recommends an annual <strong>cybersecurity checkup<\/strong>.\u00a0 This may be done by the in-house Chief Security Officer, or by an outside security contractor, knowledgeable in NIST 7621.\u00a0 The security checkup could be completed before the <strong>annual meeting<\/strong>, presented at the meeting, and kept in the <strong>company records<\/strong>.<\/p>\n<p style=\"text-align: justify;\">A notarized Affidavit of Cybersecurity Compliance provides strong <strong>evidence<\/strong> that the business takes cybersecurity seriously, reduces <strong>business risk<\/strong> of data destruction, tampering, loss and theft, and may be used to show that <strong>reasonable care<\/strong>\u00a0and a <strong>Written Information Security Policy (WISP)<\/strong> are being used to defend against any <strong>liability<\/strong> claims of <strong>negligent security<\/strong>.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Absolutely_Necessary_Cybersecurity_Actions_for_Small_Business\"><\/span><span id=\"20_Absolutely_Necessary_Cybersecurity_Actions_for_Small_Business\"><strong>Absolutely Necessary Cybersecurity Actions for Small Business<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">NIST 7621 includes <strong>Section 2<\/strong>, titled <span id=\"20_Absolutely_Necessary_Cybersecurity_Actions_for_Small_Business\"><strong>Absolutely Necessary Cybersecurity Actions for Small Business<\/strong>, with 11 elements.\u00a0 For <strong>full compliance<\/strong> with Section 2, these 11 required elements must all be included in the affidavit.<br \/>\n<\/span><\/p>\n<p style=\"text-align: justify;\">Section 2 elements include:<br \/>\ncompleting a <strong>risk assessment<\/strong> and annual <strong>security review<\/strong>,<br \/>\ninstalling <strong>antivirus<\/strong>, <strong>anti-malware<\/strong> and <strong>anti-spyware<\/strong> software,<br \/>\ninstalling a hardware and software <strong>firewall<\/strong>,<br \/>\nusing <strong>strong passwords<\/strong>,<br \/>\ninstalling <strong>software updates<\/strong> promptly,<br \/>\nmaking <strong>backup<\/strong> copies of important files,<br \/>\ncontrolling <strong>physical access<\/strong> to computers,<br \/>\nsecuring <strong>wireless networks<\/strong>,<br \/>\nconducting <strong>security training<\/strong>,<br \/>\nrequiring <strong>user accounts<\/strong> with <strong>limited privileges<\/strong>, and<br \/>\n<strong>limiting access<\/strong> to a need to know basis.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Highly_Recommended_Cybersecurity_Practices\"><\/span><span id=\"30_Highly_Recommended_Cybersecurity_Practices\"><strong>Highly Recommended Cybersecurity Practices<\/strong><\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">NIST 7621 includes <strong>Section 3<\/strong>, titled <span id=\"30_Highly_Recommended_Cybersecurity_Practices\"><strong>Highly Recommended Cybersecurity Practices<\/strong>, with 12 additional elements.\u00a0 Compliance with some or all of these recommended elements shows evidence that the business is taking extra security measures, above and beyond the necessary actions of reasonable care listed in Section 2.\u00a0 Compliance with Section 3 could be included in the same affidavit or in a separate affidavit.<br \/>\n<\/span><\/p>\n<p style=\"text-align: justify;\">There is not a high cost or time burden to implement the security actions listed in NIST 7621, Section 2.\u00a0 There is a higher burden of time, training, discipline, and cost for Section 3.<\/p>\n<p style=\"text-align: justify;\">The elements of Section 3 include:<br \/>\nnot opening <strong>email attachments<\/strong> from unknown senders,<br \/>\nnot clicking on <strong>web links<\/strong> to unknown websites,<br \/>\nusing a <strong>pop-up blocker<\/strong> in the web browser,<br \/>\nnot inserting <strong>removable media<\/strong> from an unknown source,<br \/>\nusing a <strong>secure https<\/strong> browser connection for transactions,<br \/>\n<strong>erasing web browser cache<\/strong>, cookies and history,<br \/>\nconducting a <strong>background check<\/strong> when hiring employees,<br \/>\nusing a <strong>standard user account<\/strong>, not an administrator account when online,<br \/>\nnot <strong>downloading software<\/strong> from unknown websites,<br \/>\nattending training for <strong>continuing education<\/strong> in cybersecurity and information security,<br \/>\n<strong>secure disposal<\/strong> of old computers, digital media and paper documents,<br \/>\nnot disclosing <strong>personal or confidential information<\/strong> to an unknown person or online,<br \/>\ncreating an <strong>annual asset inventory<\/strong> of hardware, software and information, and<br \/>\nusing <strong>encryption<\/strong> for confidential information, mobile devices and removable media.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Sample_Form\"><\/span>Sample Form<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">A <strong>sample form<\/strong> for an <strong>Affidavit of Cybersecurity Compliance<\/strong> for <strong>Section 2<\/strong> and <strong>Section 3<\/strong> is included in the resource list below.\u00a0 Links are also included for <strong>NIST IR 7621<\/strong>.\u00a0 All employees should read NIST 7621 to become familiar with the requirements and sign a statement agreeing to follow it.<\/p>\n<p style=\"text-align: justify;\">Protect your <strong>small business<\/strong> by following basic and advanced <strong>cybersecurity standards<\/strong> and <strong>best practices<\/strong> in NIST IR 7621.<\/p>\n<p style=\"text-align: justify;\"><strong>Please share this blog post with other small business owners.\u00a0 <\/strong><\/p>\n<p style=\"text-align: justify;\">[This educational article is not to be considered as legal advice or security advice. ]<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Reference_Documents\"><\/span><span id=\"Reference_Documents\">Reference Documents<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li style=\"text-align: justify;\">\u00a0Download sample <span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Affidavit-of-Cybersecurity-Compliance-NIST-IR-7621.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Affidavit of Cybersecurity Compliance NIST IR 7621, Section 2<\/a><\/strong><\/span><\/li>\n<li style=\"text-align: justify;\">\u00a0Download sample <a href=\"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Affidavit-of-Cybersecurity-Compliance-NIST-IR-7621-Section3.pdf\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"text-decoration: underline;\"><strong>Affidavit of Cybersecurity Compliance NIST IR 7621, Section 3<\/strong><\/span><\/a><\/li>\n<li style=\"text-align: justify;\">\u00a0Download <strong><a href=\"https:\/\/csrc.nist.gov\/publications\/nistir\/ir7621\/nistir-7621.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">NIST IR 7621<\/a><\/strong>, original release, October 2009<\/li>\n<li style=\"text-align: justify;\">\u00a0Download <strong><a href=\"https:\/\/csrc.nist.gov\/publications\/drafts\/nistir7621-r1\/nistir_7621_r1_draft.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">NIST IR 7621, revision 1, draft<\/a><\/strong>, December 16, 2014<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">[Updated 2019-02-17] updated affidavit forms<\/p>\n<p style=\"text-align: justify;\">Visit our website for <a href=\"https:\/\/www.abclegaldocs.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Colorado Springs Mobile Notary<\/strong><\/a> services\u00a0or <a href=\"https:\/\/www.abclegaldocs.com\/Colorado_Notary_Training.htm\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Colorado Notary Training<\/strong><\/a> classes.<\/p>\n<p style=\"text-align: justify;\">\u00a9 Copyright 2015\u00a0 ABC Legal Docs, LLC\u00a0 All rights reserved.\u00a0 Do not copy.\u00a0 Citations welcome.\u00a0 Terms of Use apply.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Affidavit of Cybersecurity Compliance Small business owners must protect their computer systems and confidential information from destruction, tampering, loss and theft.\u00a0 The National Institute of Standards and Technology (NIST) has written interagency report, NIST IR 7621, on cybersecurity standards for small business.\u00a0 The standard is promoted in partnership with the Small Business Administration (SBA) and the FBI. As evidence of compliance with this federal agency standard, the small business President, CEO or Chief Security Officer, can sign a sworn statement, or Affidavit of Cybersecurity Compliance.\u00a0 The affidavit is signed before a notary public.\u00a0 The statements must be true and correct, <\/p>\n","protected":false},"author":1,"featured_media":1682,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1099,1095,921,919],"tags":[933,1698,1699,904,1703,374,931,367,935,668,916,39,488,932,577,1701,1702,1696,934,1704,293,1697,936,227,1700,1047,939],"class_list":["post-1674","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-federal-law","category-security","category-small-business-tips","category-tech-tips","tag-933","tag-anti-malware","tag-anti-spyware","tag-antivirus","tag-asset-inventory","tag-backup","tag-cybersecurity","tag-encryption","tag-fbi","tag-firewall","tag-https","tag-liability","tag-negligence","tag-nist","tag-password","tag-pop-up-blocker","tag-removable-media","tag-risk-assessment","tag-sba","tag-secure-disposal","tag-security","tag-security-review","tag-small-business","tag-training","tag-user-accounts","tag-wisp","tag-wpa","has_thumb"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Affidavit of Cybersecurity Compliance - Notary Colorado Springs<\/title>\n<meta name=\"description\" content=\"7621, antivirus, backup, cybersecurity, encryption, FBI, firewall, liability, negligence, NIST, password, SBA, security, small business, training, WPA,https\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Affidavit of Cybersecurity Compliance - Notary Colorado Springs\" \/>\n<meta property=\"og:description\" content=\"7621, antivirus, backup, cybersecurity, encryption, FBI, firewall, liability, negligence, NIST, password, SBA, security, small business, training, WPA,https\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Notary Colorado Springs\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-21T16:46:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-04T00:40:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Tech_Tips_200x200.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jerry Lucas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jerry Lucas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"SocialMediaPosting\"],\"@id\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/affidavit-of-cybersecurity-compliance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/affidavit-of-cybersecurity-compliance\\\/\"},\"author\":{\"name\":\"Jerry Lucas\",\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#\\\/schema\\\/person\\\/cd4c4935b559b6653ba24a32dd09116d\"},\"headline\":\"Affidavit of Cybersecurity Compliance\",\"datePublished\":\"2015-10-21T16:46:18+00:00\",\"dateModified\":\"2025-12-04T00:40:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/affidavit-of-cybersecurity-compliance\\\/\"},\"wordCount\":684,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/affidavit-of-cybersecurity-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/wp-content\\\/uploads\\\/Tech_Tips_200x200.jpg\",\"keywords\":[\"7621\",\"anti-malware\",\"anti-spyware\",\"antivirus\",\"asset inventory\",\"backup\",\"cybersecurity\",\"encryption\",\"FBI\",\"firewall\",\"https\",\"liability\",\"negligence\",\"NIST\",\"password\",\"pop-up blocker\",\"removable media\",\"risk assessment\",\"SBA\",\"secure disposal\",\"security\",\"security review\",\"small business\",\"training\",\"user accounts\",\"WISP\",\"WPA\"],\"articleSection\":[\"Federal Law\",\"Security\",\"Small Business Tips\",\"Tech Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/affidavit-of-cybersecurity-compliance\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/affidavit-of-cybersecurity-compliance\\\/\",\"url\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/affidavit-of-cybersecurity-compliance\\\/\",\"name\":\"Affidavit of Cybersecurity Compliance - Notary Colorado Springs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/affidavit-of-cybersecurity-compliance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/affidavit-of-cybersecurity-compliance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/wp-content\\\/uploads\\\/Tech_Tips_200x200.jpg\",\"datePublished\":\"2015-10-21T16:46:18+00:00\",\"dateModified\":\"2025-12-04T00:40:36+00:00\",\"description\":\"7621, antivirus, backup, cybersecurity, encryption, FBI, firewall, liability, negligence, NIST, password, SBA, security, small business, training, WPA,https\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/affidavit-of-cybersecurity-compliance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/affidavit-of-cybersecurity-compliance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/affidavit-of-cybersecurity-compliance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/wp-content\\\/uploads\\\/Tech_Tips_200x200.jpg\",\"contentUrl\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/wp-content\\\/uploads\\\/Tech_Tips_200x200.jpg\",\"width\":200,\"height\":200,\"caption\":\"Tech Tips\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/affidavit-of-cybersecurity-compliance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Affidavit of Cybersecurity Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#website\",\"url\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/\",\"name\":\"Notary Colorado Springs\",\"description\":\"Mobile Notary Colorado Springs, Colorado Notary Training\",\"publisher\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#organization\",\"name\":\"ABC Legal Docs, LLC\",\"url\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/wp-content\\\/uploads\\\/ABC_logo_200x200.jpg\",\"contentUrl\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/wp-content\\\/uploads\\\/ABC_logo_200x200.jpg\",\"width\":200,\"height\":200,\"caption\":\"ABC Legal Docs, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/jerrylucas123\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abclegaldocs.com\\\/blog-Colorado-Notary\\\/#\\\/schema\\\/person\\\/cd4c4935b559b6653ba24a32dd09116d\",\"name\":\"Jerry Lucas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/87dbc6ea5d28fb6243a91f8ffabda3e644f3e7f7eb51d02750d340ffc285dd59?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/87dbc6ea5d28fb6243a91f8ffabda3e644f3e7f7eb51d02750d340ffc285dd59?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/87dbc6ea5d28fb6243a91f8ffabda3e644f3e7f7eb51d02750d340ffc285dd59?s=96&d=mm&r=g\",\"caption\":\"Jerry Lucas\"},\"description\":\"Author Summary: Jerry Lucas is a retired Colorado Notary Public and notary blogger.Author Portfolio: Jerry has written over 300 articles sharing his subject matter expertise in the Colorado Notary Blog.\",\"sameAs\":[\"https:\\\/\\\/abclegaldocs.com\"],\"url\":\"https:\\\/\\\/www.abclegaldocs.com\\\/blog-Colorado-Notary\\\/author\\\/notary809\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Affidavit of Cybersecurity Compliance - Notary Colorado Springs","description":"7621, antivirus, backup, cybersecurity, encryption, FBI, firewall, liability, negligence, NIST, password, SBA, security, small business, training, WPA,https","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Affidavit of Cybersecurity Compliance - Notary Colorado Springs","og_description":"7621, antivirus, backup, cybersecurity, encryption, FBI, firewall, liability, negligence, NIST, password, SBA, security, small business, training, WPA,https","og_url":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/","og_site_name":"Notary Colorado Springs","article_published_time":"2015-10-21T16:46:18+00:00","article_modified_time":"2025-12-04T00:40:36+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Tech_Tips_200x200.jpg","type":"image\/jpeg"}],"author":"Jerry Lucas","twitter_misc":{"Written by":"Jerry Lucas","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","SocialMediaPosting"],"@id":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/#article","isPartOf":{"@id":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/"},"author":{"name":"Jerry Lucas","@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#\/schema\/person\/cd4c4935b559b6653ba24a32dd09116d"},"headline":"Affidavit of Cybersecurity Compliance","datePublished":"2015-10-21T16:46:18+00:00","dateModified":"2025-12-04T00:40:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/"},"wordCount":684,"commentCount":0,"publisher":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#organization"},"image":{"@id":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Tech_Tips_200x200.jpg","keywords":["7621","anti-malware","anti-spyware","antivirus","asset inventory","backup","cybersecurity","encryption","FBI","firewall","https","liability","negligence","NIST","password","pop-up blocker","removable media","risk assessment","SBA","secure disposal","security","security review","small business","training","user accounts","WISP","WPA"],"articleSection":["Federal Law","Security","Small Business Tips","Tech Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/","url":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/","name":"Affidavit of Cybersecurity Compliance - Notary Colorado Springs","isPartOf":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Tech_Tips_200x200.jpg","datePublished":"2015-10-21T16:46:18+00:00","dateModified":"2025-12-04T00:40:36+00:00","description":"7621, antivirus, backup, cybersecurity, encryption, FBI, firewall, liability, negligence, NIST, password, SBA, security, small business, training, WPA,https","breadcrumb":{"@id":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/#primaryimage","url":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Tech_Tips_200x200.jpg","contentUrl":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Tech_Tips_200x200.jpg","width":200,"height":200,"caption":"Tech Tips"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/affidavit-of-cybersecurity-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/"},{"@type":"ListItem","position":2,"name":"Affidavit of Cybersecurity Compliance"}]},{"@type":"WebSite","@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#website","url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/","name":"Notary Colorado Springs","description":"Mobile Notary Colorado Springs, Colorado Notary Training","publisher":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#organization","name":"ABC Legal Docs, LLC","url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#\/schema\/logo\/image\/","url":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ABC_logo_200x200.jpg","contentUrl":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ABC_logo_200x200.jpg","width":200,"height":200,"caption":"ABC Legal Docs, LLC"},"image":{"@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/in\/jerrylucas123"]},{"@type":"Person","@id":"https:\/\/abclegaldocs.com\/blog-Colorado-Notary\/#\/schema\/person\/cd4c4935b559b6653ba24a32dd09116d","name":"Jerry Lucas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/87dbc6ea5d28fb6243a91f8ffabda3e644f3e7f7eb51d02750d340ffc285dd59?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/87dbc6ea5d28fb6243a91f8ffabda3e644f3e7f7eb51d02750d340ffc285dd59?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/87dbc6ea5d28fb6243a91f8ffabda3e644f3e7f7eb51d02750d340ffc285dd59?s=96&d=mm&r=g","caption":"Jerry Lucas"},"description":"Author Summary: Jerry Lucas is a retired Colorado Notary Public and notary blogger.Author Portfolio: Jerry has written over 300 articles sharing his subject matter expertise in the Colorado Notary Blog.","sameAs":["https:\/\/abclegaldocs.com"],"url":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/author\/notary809\/"}]}},"jetpack_featured_media_url":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Tech_Tips_200x200.jpg","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":607,"url":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/cybersecurity-standards-nist-ir-7621\/","url_meta":{"origin":1674,"position":0},"title":"Cybersecurity Standards for Small Business, NIST IR 7621","author":"Jerry Lucas","date":"January 14, 2015","format":false,"excerpt":"Cybersecurity Standards for Small Business, NIST IR 7621 Small businesses should follow the information security (cybersecurity) standards published by the National Institute of Standards and Technology (NIST\u00ae), in Interagency Report 7621 (NIST IR 7621). The document may be used to develop a business Written Information Security Policy (WISP). NIST is\u2026","rel":"","context":"In &quot;Federal Law&quot;","block_context":{"text":"Federal Law","link":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/category\/federal-law\/"},"img":{"alt_text":"Cybersecurity Standards for Small Business","src":"https:\/\/i0.wp.com\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/Cybersecurity-Standards-for-Small-Business-320x200.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":7903,"url":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/certificate-of-data-destruction-form\/","url_meta":{"origin":1674,"position":1},"title":"Certificate of Data Destruction Form","author":"Jerry Lucas","date":"February 13, 2020","format":false,"excerpt":"Certificate of Data Destruction Form A Certificate of Data Destruction form is used as a certified written record of evidence that a digital storage drive, digital storage media or paper records have been erased, wiped, shredded, burned or otherwise destroyed. Data destruction is used to prevent a data breach, unauthorized\u2026","rel":"","context":"In &quot;Green, Eco-friendly&quot;","block_context":{"text":"Green, Eco-friendly","link":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/category\/green-eco-friendly\/"},"img":{"alt_text":"certificate of data destruction","src":"https:\/\/i0.wp.com\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/certificate-of-data-destruction-320x200-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3631,"url":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/ransomware-protection-and-removal\/","url_meta":{"origin":1674,"position":2},"title":"Ransomware Protection and Removal","author":"Jerry Lucas","date":"February 17, 2017","format":false,"excerpt":"Ransomware Protection and Removal Ransomware is a type of malware that blocks access or holds data files hostage, often using strong encryption, usually requiring a large ransom payment quickly in Bitcoin cryptocurrency to restore access. Ransomware attacks exploit weaknesses in data protection, and of users who are untrained or negligent\u00a0in\u00a0cybersecurity\u2026","rel":"","context":"In &quot;Blockchain&quot;","block_context":{"text":"Blockchain","link":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/category\/blockchain\/"},"img":{"alt_text":"ransomware lock keyboard cash","src":"https:\/\/i0.wp.com\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/ransomware-lock-keyboard-cash.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1809,"url":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/pdf-password-protection-and-encryption\/","url_meta":{"origin":1674,"position":3},"title":"PDF Password Protection and Encryption","author":"Jerry Lucas","date":"December 21, 2015","format":false,"excerpt":"PDF Password Protection and Encryption PDF Password protection is an optional feature with some software when creating a PDF file. A User password may be added by the file creator to control opening and viewing the file.\u00a0 An Owner password may be added by the file creator to control file\u2026","rel":"","context":"In &quot;Security&quot;","block_context":{"text":"Security","link":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/category\/security\/"},"img":{"alt_text":"PDF password protected","src":"https:\/\/i0.wp.com\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/PDF-password-protected-250x200.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1332,"url":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/notary-for-business-documents\/","url_meta":{"origin":1674,"position":4},"title":"Notary for Business Documents","author":"Jerry Lucas","date":"June 16, 2015","format":false,"excerpt":"Notary for Business Documents We provide Colorado Springs\u00a0mobile notary service for many types of business documents including Form I-9, occupation licenses, employment applications, contracts, agreements, affidavits, business records, patents, copyrights, litigation, compliance and more. We provide notary support for Human Resources (HR) personnel and can set up an on-site workplace\u2026","rel":"","context":"In &quot;Colorado Springs Mobile Notary&quot;","block_context":{"text":"Colorado Springs Mobile Notary","link":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/category\/colorado-springs-mobile-notary\/"},"img":{"alt_text":"ABC Legal Docs logo","src":"https:\/\/i0.wp.com\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/2014\/02\/ABC_logo_120x80-e1426900901311.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":248,"url":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/business-records-affidavit\/","url_meta":{"origin":1674,"position":5},"title":"Business Records Affidavit","author":"Jerry Lucas","date":"February 4, 2014","format":false,"excerpt":"Business Records Affidavit A business records affidavit is used under Rule 803(6) of the Federal Rules of Evidence, Article VIII, Hearsay.\u00a0 An affidavit, with a business record attached, sworn to by the record-keeping custodian of a business, may be accepted as evidence in a case. The custodian may not have\u2026","rel":"","context":"In &quot;Federal Law&quot;","block_context":{"text":"Federal Law","link":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/category\/federal-law\/"},"img":{"alt_text":"business records affidavit notary","src":"https:\/\/i0.wp.com\/abclegaldocs.com\/blog-Colorado-Notary\/wp-content\/uploads\/business-records-affidavit-notary-320x200.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/posts\/1674","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/comments?post=1674"}],"version-history":[{"count":2,"href":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/posts\/1674\/revisions"}],"predecessor-version":[{"id":10765,"href":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/posts\/1674\/revisions\/10765"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/media\/1682"}],"wp:attachment":[{"href":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/media?parent=1674"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/categories?post=1674"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abclegaldocs.com\/blog-Colorado-Notary\/wp-json\/wp\/v2\/tags?post=1674"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}