Back to Frameworks

Samoa Telecommunications Act (2005) — Privacy & Data Protection

Samoa
v2005
4 domains
4 controls

Samoa's Telecommunications Act 2005, administered by the Office of the Regulator, includes provisions for privacy and confidentiality of telecommunications. The Act protects customer data held by telecommunications providers, requires consent for disclosure, and establishes obligations for service providers regarding data security. Samoa does not yet have standalone data protection legislation, but the Telecommunications Act provides the primary privacy protections for electronic communications and customer data.

Verified

Framework summaries on this platform are AI-assisted interpretations for educational and compliance planning purposes. They do not reproduce or replace the official standards. Refer to the authoritative source for the definitive text. Framework names and trademarks belong to their respective organisations.

Framework Domains (4)

Communications Privacy

0 controls

Privacy and data protection in communications

Customer Information Protection

2 controls
Controls in the Customer Information Protection domain of Samoa Telecommunications Act (2005) — Privacy & Data Protection2 controls
CodeTitle
SAM-1Customer Information Confidentiality (Section 48)
SAM-2Consent Requirements

Government Access

2 controls
Controls in the Government Access domain of Samoa Telecommunications Act (2005) — Privacy & Data Protection2 controls
CodeTitle
SAM-5Government Access to Information (Section 51)
SAM-6Legal Authorization Requirements

Regulatory Framework

0 controls

Building Safety Regulator and duty holders

Maps to 161 other frameworks

4 total controls
CWE Top 25 Most Dangerous Software Weaknesses (2024)
2 source controls mapped|3 target controls covered
50%
BSIMM
2 source controls mapped|1 target controls covered
50%
CISA ICS-CERT Advisories and Industrial Control Systems Security Guidelines
2 source controls mapped|3 target controls covered
50%
NIS2 Directive Implementing Acts
2 source controls mapped|3 target controls covered
50%
FBI CJIS Security Policy
2 source controls mapped|3 target controls covered
50%
FedRAMP Rev 5
2 source controls mapped|5 target controls covered
50%
50%
IEC 62351 — Power Systems Communication Security
2 source controls mapped|1 target controls covered
50%
NIST Privacy Framework 1.0
2 source controls mapped|2 target controls covered
50%
MTCS (Singapore)
2 source controls mapped|1 target controls covered
50%
NIST SP 800-181
2 source controls mapped|1 target controls covered
50%
FFIEC Cybersecurity Assessment Tool (CAT)
2 source controls mapped|1 target controls covered
50%
ITAR — International Traffic in Arms Regulations
2 source controls mapped|2 target controls covered
50%
California IoT Security Law
2 source controls mapped|1 target controls covered
50%
NIST SP 800-187
2 source controls mapped|1 target controls covered
50%
OpenSSF Scorecard
2 source controls mapped|1 target controls covered
50%
NIST SP 800-171A — Assessing CUI Security Requirements
2 source controls mapped|3 target controls covered
50%
ISO 27043
2 source controls mapped|1 target controls covered
50%
NYDFS Cybersecurity Regulation (23 NYCRR Part 500)
2 source controls mapped|2 target controls covered
50%
ASD Essential Eight Maturity Model
2 source controls mapped|3 target controls covered
50%
Belgium CyberFundamentals
2 source controls mapped|1 target controls covered
50%
O-RAN Alliance Security Specifications (O-RAN.WG11)
2 source controls mapped|2 target controls covered
50%
NIST SP 800-144
2 source controls mapped|1 target controls covered
50%
MITRE D3FEND
2 source controls mapped|1 target controls covered
50%
WCO Authorised Economic Operator (AEO) Framework
2 source controls mapped|3 target controls covered
50%
C-TPAT — Customs-Trade Partnership Against Terrorism
2 source controls mapped|3 target controls covered
50%
Defence Security Principles Framework (DSPF)
2 source controls mapped|3 target controls covered
50%
ASD Information Security Manual (ISM)
2 source controls mapped|4 target controls covered
50%
Protective Security Policy Framework (PSPF) Release 2024
2 source controls mapped|3 target controls covered
50%
NIST SP 800-218
2 source controls mapped|1 target controls covered
50%
CNCF Cloud Native Security (Cloud Native Computing Foundation)
2 source controls mapped|1 target controls covered
50%
OWASP API Security Top 10:2023
2 source controls mapped|3 target controls covered
50%
US NRC 10 CFR 73.54 — Cyber Security for Nuclear Power Plants
2 source controls mapped|1 target controls covered
50%
Spain ENS
2 source controls mapped|1 target controls covered
50%
MARS-E
2 source controls mapped|1 target controls covered
50%
ISO 27001:2022
2 source controls mapped|2 target controls covered
50%
CSA CCM v4
2 source controls mapped|3 target controls covered
50%
ISO 27002:2022
2 source controls mapped|1 target controls covered
50%
Angola Personal Data Protection Law (Law No. 22/11)
2 source controls mapped|1 target controls covered
50%
PTES
2 source controls mapped|1 target controls covered
50%
FDA 21 CFR Part 11
2 source controls mapped|1 target controls covered
50%
BSI IT-Grundschutz
2 source controls mapped|1 target controls covered
50%
HL7 FHIR Security Framework
2 source controls mapped|3 target controls covered
50%
OWASP Top 10:2025
2 source controls mapped|3 target controls covered
50%
NIST SP 800-161
2 source controls mapped|1 target controls covered
50%
CAIQ (CSA)
2 source controls mapped|1 target controls covered
50%
FISMA
2 source controls mapped|1 target controls covered
50%
SSAE 18 SOC 1 — Report on Controls at a Service Organisation (ICFR)
2 source controls mapped|1 target controls covered
50%
FAA Cybersecurity Framework for Aviation
2 source controls mapped|1 target controls covered
50%
Oman National Cybersecurity Framework
2 source controls mapped|1 target controls covered
50%
EAR — Export Administration Regulations
2 source controls mapped|3 target controls covered
50%
OWASP Top 10 for LLM Applications 2025
2 source controls mapped|3 target controls covered
50%
UK Gambling Commission — Cyber Resilience Requirements
2 source controls mapped|1 target controls covered
50%
NIST SP 800-150
2 source controls mapped|1 target controls covered
50%
NIST SP 800-137
2 source controls mapped|1 target controls covered
50%
CISA Cross-Sector Cybersecurity Performance Goals (CPG) 2.0
2 source controls mapped|1 target controls covered
50%
NIST SP 800-145
2 source controls mapped|1 target controls covered
50%
ISMAP (Japan)
2 source controls mapped|1 target controls covered
50%
NAIC Insurance Data Security Model Law (MDL-668)
2 source controls mapped|1 target controls covered
50%
EU Markets in Crypto-Assets Regulation (MiCA)
2 source controls mapped|3 target controls covered
50%
MiFID II / MiFIR
2 source controls mapped|1 target controls covered
50%
ISO 27017
2 source controls mapped|1 target controls covered
50%
NIST SP 800-171A Rev 3 — Assessing CUI Security Requirements
2 source controls mapped|1 target controls covered
50%
Australia Consumer Data Right — Banking (CDR)
2 source controls mapped|3 target controls covered
50%
Authorised Economic Operator (AEO) Programmes — Global Standards
2 source controls mapped|1 target controls covered
50%
AWS Well-Architected Security Pillar
2 source controls mapped|1 target controls covered
50%
ISO/IEC 27011:2024
2 source controls mapped|1 target controls covered
50%
NIST SP 800-53A
2 source controls mapped|1 target controls covered
50%
ISO/SAE 21434
2 source controls mapped|1 target controls covered
50%
ASD Strategies to Mitigate Cyber Security Incidents
2 source controls mapped|2 target controls covered
50%
US Automated Commercial Environment (ACE) — CBP Trade Data Requirements
2 source controls mapped|1 target controls covered
50%
NIST SP 800-115
2 source controls mapped|1 target controls covered
50%
NIST SP 800-207
2 source controls mapped|1 target controls covered
50%
ISO 27799
2 source controls mapped|1 target controls covered
50%
Saudi NCA ECC
2 source controls mapped|1 target controls covered
50%
ANSSI Cybersecurity Framework
2 source controls mapped|1 target controls covered
50%
Philippines Data Privacy Act (RA 10173)
2 source controls mapped|2 target controls covered
50%
NIST SP 800-88
2 source controls mapped|1 target controls covered
50%
Cyber Essentials Plus
2 source controls mapped|1 target controls covered
50%
Singapore Government Instruction Manual on ICT&SS Management (IM8)
2 source controls mapped|1 target controls covered
50%
NIST SP 800-53 Rev 5
2 source controls mapped|3 target controls covered
50%
ISO 13485
2 source controls mapped|1 target controls covered
50%
CMMC 2.0
2 source controls mapped|1 target controls covered
50%
EDM Council CDMC — Cloud Data Management Capabilities Framework
2 source controls mapped|1 target controls covered
50%
PropTech Security Standards — Smart Building Cybersecurity
2 source controls mapped|1 target controls covered
50%
DAMA-DMBOK2 — Data Management Body of Knowledge (2nd Edition)
2 source controls mapped|1 target controls covered
50%
HITECH Act
2 source controls mapped|1 target controls covered
50%
NIST SP 800-172
2 source controls mapped|1 target controls covered
50%
ICAO Annex 17 — Aviation Security (AVSEC)
2 source controls mapped|1 target controls covered
50%
NIST Cybersecurity Framework 2.0
2 source controls mapped|1 target controls covered
50%
EU Cyber Resilience Act
2 source controls mapped|1 target controls covered
50%
NIST SP 800-92
2 source controls mapped|1 target controls covered
50%
NIST SP 800-123
2 source controls mapped|1 target controls covered
50%
NIST SP 800-190
2 source controls mapped|1 target controls covered
50%
MITRE ATT&CK
2 source controls mapped|1 target controls covered
50%
DoD Zero Trust Reference Architecture
2 source controls mapped|1 target controls covered
50%
50%
OWASP ASVS
2 source controls mapped|1 target controls covered
50%
OWASP DevSecOps Maturity Model (DSOMM)
2 source controls mapped|3 target controls covered
50%
ISO 27018
2 source controls mapped|1 target controls covered
50%
NIST SP 800-171
2 source controls mapped|1 target controls covered
50%
CSA STAR (Security, Trust, Assurance, and Risk)
2 source controls mapped|1 target controls covered
50%
NIST SP 800-146
2 source controls mapped|1 target controls covered
50%
MDS2 (Medical Device)
2 source controls mapped|1 target controls covered
50%
C5 (Germany)
2 source controls mapped|1 target controls covered
50%
OWASP MASVS
2 source controls mapped|1 target controls covered
50%
NIST SP 800-63
2 source controls mapped|1 target controls covered
50%
EU Clinical Trials Regulation (CTR 536/2014)
2 source controls mapped|1 target controls covered
50%
ETSI EN 303 645
2 source controls mapped|1 target controls covered
50%
NIST SP 800-66
2 source controls mapped|1 target controls covered
50%
NIST SP 800-183
2 source controls mapped|1 target controls covered
50%
Azure Security Benchmark
2 source controls mapped|1 target controls covered
50%
ISO/IEC 27006:2024
2 source controls mapped|1 target controls covered
50%
50%
PCI DSS v4.0
2 source controls mapped|1 target controls covered
50%
CISA Zero Trust Maturity Model
2 source controls mapped|1 target controls covered
50%
NIST SP 800-128
2 source controls mapped|1 target controls covered
50%
NIST SP 800-160
2 source controls mapped|1 target controls covered
50%
NIST SP 800-61
2 source controls mapped|1 target controls covered
50%
South Korea ISMS-P
2 source controls mapped|1 target controls covered
50%
Australian Energy Sector Cyber Security Framework (AESCSF)
2 source controls mapped|1 target controls covered
50%
ISO/IEC 27400:2022
2 source controls mapped|1 target controls covered
50%
Ghana Cybersecurity Act
2 source controls mapped|1 target controls covered
50%
3GPP Security
2 source controls mapped|1 target controls covered
50%
NIST SP 800-82 Rev 3 — Guide to OT Security
2 source controls mapped|1 target controls covered
50%
UK Telecommunications (Security) Act 2021
2 source controls mapped|1 target controls covered
50%
SSAE 18 — Attestation Standards (SOC Reporting)
2 source controls mapped|2 target controls covered
50%
SWIFT Customer Security Programme (CSP)
2 source controls mapped|1 target controls covered
50%
TSA Pipeline Cybersecurity Directives
2 source controls mapped|1 target controls covered
50%
3GPP 5G Security Architecture (TS 33.501)
2 source controls mapped|2 target controls covered
50%
SLSA
2 source controls mapped|1 target controls covered
50%
TSA Pipeline Security
2 source controls mapped|1 target controls covered
50%
UNECE WP.29 R156
2 source controls mapped|1 target controls covered
50%
Security of Critical Infrastructure Act 2018 (SOCI)
2 source controls mapped|1 target controls covered
50%
CISA Secure by Design Principles
2 source controls mapped|1 target controls covered
50%
UNECE WP.29 R155
2 source controls mapped|1 target controls covered
50%
TISAX — Trusted Information Security Assessment Exchange
2 source controls mapped|1 target controls covered
50%
DISA Security Technical Implementation Guides (STIGs)
2 source controls mapped|3 target controls covered
50%
Uganda Data Protection and Privacy Act (2019)
2 source controls mapped|1 target controls covered
50%
OWASP SAMM
2 source controls mapped|1 target controls covered
50%
SIG (Shared Assessments)
2 source controls mapped|1 target controls covered
50%
SOC 2
2 source controls mapped|2 target controls covered
50%
Notifiable Data Breaches Scheme (Australia)
2 source controls mapped|1 target controls covered
50%
EU Digital Markets Act
2 source controls mapped|1 target controls covered
50%
FTC Health Breach Notification Rule
2 source controls mapped|1 target controls covered
50%
UK Product Security and Telecommunications Infrastructure Act (PSTI)
2 source controls mapped|1 target controls covered
50%
European Accessibility Act (Directive (EU) 2019/882)
2 source controls mapped|1 target controls covered
50%
EU Deforestation-Free Products Regulation (EUDR)
2 source controls mapped|1 target controls covered
50%
US ITAR and EAR — Export Control and Data Security
2 source controls mapped|1 target controls covered
50%
US SEC Digital Assets and Crypto Regulatory Framework
2 source controls mapped|1 target controls covered
50%
Australia eSafety Commissioner — Online Safety Expectations for Industry
2 source controls mapped|1 target controls covered
50%
SSDF (NIST)
2 source controls mapped|1 target controls covered
50%
Zimbabwe Data Protection Act (2021)
2 source controls mapped|1 target controls covered
50%
UK PSTI Act
2 source controls mapped|1 target controls covered
50%

Frequently Asked Questions

What is Samoa Telecommunications Act (2005) — Privacy & Data Protection?

Samoa Telecommunications Act (2005) — Privacy & Data Protection is a compliance framework from Samoa with 4 domains and 4 controls. Samoa's Telecommunications Act 2005, administered by the Office of the Regulator, includes provisions for privacy and confidentiality of telecommunications. The Act protects customer data held by telecommunications providers, requires consent for disclosure, and establishes obligations for service providers regarding data security. Samoa does not yet have standalone data protection legislation, but the Telecommunications Act provides the primary privacy protections for electronic communications and customer data. It is used by organisations to establish and maintain compliance with industry standards and regulatory requirements.

How many controls does Samoa Telecommunications Act (2005) — Privacy & Data Protection have?

Samoa Telecommunications Act (2005) — Privacy & Data Protection has 4 controls organised across 4 domains. The largest domains are Customer Information Protection (2 controls), Government Access (2 controls), Communications Privacy (0 controls). Each control defines specific requirements that organisations must implement to achieve compliance.

What frameworks does Samoa Telecommunications Act (2005) — Privacy & Data Protection map to?

Samoa Telecommunications Act (2005) — Privacy & Data Protection maps to 161 other compliance frameworks. The top mapping partners are CWE Top 25 Most Dangerous Software Weaknesses (2024) (50% coverage), BSIMM (50% coverage), CISA ICS-CERT Advisories and Industrial Control Systems Security Guidelines (50% coverage). Use our comparison tool to explore control-level mappings between frameworks.

How do I get started with Samoa Telecommunications Act (2005) — Privacy & Data Protection compliance?

Start your Samoa Telecommunications Act (2005) — Privacy & Data Protection compliance journey by running a self-assessment on our platform to identify your current compliance posture. Our AI advisory can answer specific questions about Samoa Telecommunications Act (2005) — Privacy & Data Protection requirements, and cross-framework mapping helps you leverage existing controls from other frameworks you may already comply with. Create a free account to access all 4 controls and track your progress.

Start Your Compliance Journey

Create a free account to run self-assessments, get AI advisory, and track your compliance progress across 692 frameworks.

Get Started Free →

Free forever — no credit card required