IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Consumer Privacy

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: EU Data Protection Directive (also known as Directive 95/46/EC) is a directive adopted by the European Union designed to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using, or exchanging such data. Directive 95/46/EC encompasses all key elements from article 8 of the European Convention on Human Rights, which  … 
Definition continues below.
Consumer Privacy Multimedia (View All Report Types)
 
Secure, Scalable Content Collaboration
sponsored by IBM
VIDEO: This short video highlights how a CIO of a national leading bank improved critical steps of a loan application process to ensure sensitive customer information and documents are being handled in the best way. Gain ideas on how you can improve your content management processes to keep important information secure and help improve customer service.
Posted: 27 Jul 2016 | Premiered: 17 Mar 2016

IBM

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Implications of Data Gravity on Hybrid Cloud Strategy Webcast
sponsored by Equinix and Datapipe
WEBCAST: Data gravity can be a hindrance but when properly deployed with a hybrid cloud, it could propel the success of your business. Access this webcast to learn the powerful pull of data gravity and the benefits of hybrid cloud deployment in part 1 of Paul Croteau's 3-part webinar series.
Posted: 12 Jul 2016 | Premiered: Jun 27, 2016

Equinix and Datapipe

Protect and Recovery Data with Confidence
sponsored by IBM
PRODUCT DEMO: This demonstration tool provides an at-a-glance summary of how IBM Spectrum Protect monitors and protects your backup data. See how this tool can provide your enterprise with the ability to see your data protection world in a single view, confidence that your business will continue in event of a disaster, and more.
Posted: 23 Aug 2016 | Premiered: 23 Aug 2016

IBM

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
PODCAST: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 28 Jun 2016 | Premiered: Jun 16, 2016

Citrix

Cut Through the Hype of Hyper-Converged
sponsored by NTT ICT
VIDEO: Get informed about the truth behind hyper-converged infrastructure in the following webcast featuring HPE's Director of Software-Defined Storage, Rob Strechay. Learn where this technology fits, where it doesn't; how to utilize it in your own business and more.
Posted: 05 Aug 2016 | Premiered: 16 Dec 2015

NTT ICT

Online Phishing
sponsored by Navex Global
WEBCAST: Through real world examples and quizzes throughout, learn how to spot phishing scams and enable your employees to do the same. Protect your organization from illegitimate emails with this short, interactive resource.
Posted: 20 Jul 2016 | Premiered: Jun 1, 2016

Navex Global

Global Data Protection Index Highlights
sponsored by EMC
VIDEO: EMC's Global Data Protection Index of 2016 revealed that most businesses are still unprepared for new, emerging threats. Discover the outlook of data protection strategies around the world, and learn how to prepare for the rapidly changing landscape of threats to enterprise data.
Posted: 30 Jun 2016 | Premiered: 28 Jun 2016

EMC

See How Apps are Being Hacked
sponsored by Arxan
WEBCAST: This webcast illustrates some of the ways hackers are breaking into your mobile applications. See real life examples of how mobile app hacking is becoming easier and faster than ever before.
Posted: 11 Jul 2016 | Premiered: Jun 1, 2016

Arxan

Protecting Mission-Critical Source Code from Application Security Vulnerabilities
sponsored by IBM
WEBCAST: In this webcast, you'll learn how to test application source code for potential security vulnerabilities, so you can confidently release your organization's applications.
Posted: 24 Aug 2016 | Premiered: Jul 1, 2016

IBM
 
 
CONSUMER PRIVACY DEFINITION (continued): …  states its intention to respect the rights of privacy in personal and family life, as well as in the home and in personal correspondence. The Directive is based on the 1980 OECD "Recommendations of the Council Concerning guidelines Governing the Protection of Privacy and Trans-Border Flows of Personal Data." These recommendations are founded on seven principles, since enshrined in EU Directive 94/46/EC:Notice: subjects whose data is being collected should be given notice of such collection.Purpose: data collected should be used only for stated purpose(s) and for no other purposes.Consent: … 
Consumer Privacy definition sponsored by SearchSecurityUK.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement