IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Consumer Privacy

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: EU Data Protection Directive (also known as Directive 95/46/EC) is a directive adopted by the European Union designed to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using, or exchanging such data. Directive 95/46/EC encompasses all key elements from article 8 of the European Convention on Human Rights, which  … 
Definition continues below.
Consumer Privacy Multimedia (View All Report Types)
 
Case Study: How Atom Bank Used CEM To Become The UK's First All-Digital Bank
sponsored by Genesys
VIDEO: In the digital age, it's become necessary for businesses to constantly rework and reimagine how they interact with their customers. In this case study, learn how Atom Bank became the UK's first all-digital bank. Discover how customer experience technology was implemented to allow customers to communicate using voice, chat, email or social media.
Posted: 27 Feb 2017 | Premiered: 27 Feb 2017

Genesys

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Cisco Stealthwatch Cloud Free Trial
sponsored by AWS-Cisco
SOFTWARE DEMO: If you want to compete in modern business, you need to adopt the cloud. You also need a way to secure your public cloud, private network, and/or hybrid environment. Access this free trial of Cisco's Stealthwatch Cloud, a software-as-a-service cloud security tool for visibility and threat detection.
Posted: 07 Nov 2017 | Premiered: 07 Nov 2017

AWS-Cisco

The SIEM Essentials to Creating Your Own Security Posture
sponsored by Splunk
WEBCAST: Watch this webcast to learn how one of the United States' biggest nuclear research firms puts SIEM software to work as part of their security posture. Go inside to learn how, by implementing SIEM, you too can get customizable incident reporting, real time account activity dashboards, and more.
Posted: 16 Oct 2017 | Premiered: Sep 28, 2017

Splunk

Continue to Transform or Risk Being Disrupted
sponsored by Rackspace Intel
WEBCAST: In this webinar, you'll see how Redbox evolved their IT methodologies in order to disrupt the movie rental industry. Tune in to learn how data center consolidation, limiting data sprawl, reducing licensing expense and more, factored into Redbox's dynamic digital transition.
Posted: 21 Aug 2017 | Premiered: Jun 1, 2017

Rackspace Intel

From Agile Development to DevOps to DevSecOps
sponsored by Veracode, Inc.
VIDEO: It seems like organizations are still being breached left and right by cyber threats. Watch this short video to learn about a security platform that will protect your application layer by providing an end-to-end platform, cloud-based scalability, and strategic support to make application security a top priority.
Posted: 04 Aug 2017 | Premiered: 04 Aug 2017

Veracode, Inc.

Managed Detection and Response Service
sponsored by Rapid 7
WEBCAST: According to the 2017 SANS Incident Response Survey, 87% responded to at least one incident in the past year. Take a look at this webcast to gain insight into improving your incident response strategy by validating and identifying known and unknown threats in order to protect your company.
Posted: 20 Nov 2017 | Premiered: Nov 7, 2017

Rapid 7

How to Avoid Being the Victim of a Data Breach
sponsored by Evident
WEBCAST: There are 3.8 million data records stolen every day, according to Continuum. No businesses are safe, so how can you stay ahead of hackers? This webcast offers insight into what is driving the growth of security breaches, the top causes of data breaches such as malware and phishing, and 3 steps to take when protecting personal data.
Posted: 30 Nov 2017 | Premiered: Nov 30, 2017

Evident

Continuous Security on AWS
sponsored by Stelligent
VIDEO: If you are planning to deploy resources with AWS, or if you have already started and are looking to improve the security of your DevOps environments on AWS, then watch this webinar. You will learn how to infuse security validation in your development and deployment processes for continuous security on AWS.
Posted: 21 Aug 2017 | Premiered: 08 Aug 2017

Stelligent

Hydro Tasmania Customer Success Story
sponsored by OpenText
VIDEO: Watch this brief video case study to find out how Hydro Tasmania unified scattered information and resolved content inefficiencies in their SAP, ERP, and SharePoint environments.
Posted: 13 Oct 2017 | Premiered: 13 Oct 2017

OpenText
 
 
CONSUMER PRIVACY DEFINITION (continued): …  states its intention to respect the rights of privacy in personal and family life, as well as in the home and in personal correspondence. The Directive is based on the 1980 OECD "Recommendations of the Council Concerning guidelines Governing the Protection of Privacy and Trans-Border Flows of Personal Data." These recommendations are founded on seven principles, since enshrined in EU Directive 94/46/EC:Notice: subjects whose data is being collected should be given notice of such collection.Purpose: data collected should be used only for stated purpose(s) and for no other purposes.Consent: … 
Consumer Privacy definition sponsored by SearchSecurityUK.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement