Data Security Compliance: The Essentials