IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Consumer Privacy

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: EU Data Protection Directive (also known as Directive 95/46/EC) is a directive adopted by the European Union designed to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using, or exchanging such data. Directive 95/46/EC encompasses all key elements from article 8 of the European Convention on Human Rights, which  … 
Definition continues below.
Consumer PrivacyWhite Papers (View All Report Types)
 
Big Data is Key to Responding to Customer Needs Instantly
sponsored by Hewlett-Packard Company
WHITE PAPER: Find out how a leading big data technology extracts vital information from a network and correlates it with more static information about the subscriber, so you can provide a better customer experience.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Hewlett-Packard Company

How to Choose an Endpoint Backup Solution
sponsored by Code42
WHITE PAPER: Hacked, stolen, or lost end-user devices means organizations are vulnerable to compliance failures, data loss, customer privacy breaches, damaged brand reputation, and more. It is crucial to regularly and fully back up endpoints to avoid these risks. This resource provides what to look for in an endpoint backup solution.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration
sponsored by IntraLinks, Inc
WHITE PAPER: This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Why businesses should enhance the digital customer experience
sponsored by Hewlett-Packard Company
WHITE PAPER: View this white paper to examine the challenges and benefits of gradually transitioning towards a customer-centric, digital business model. Read on to learn the points to consider and the steps to take to begin your transition towards digitalization.
Posted: 18 Dec 2014 | Published: 16 Sep 2014

Hewlett-Packard Company

Three Ways Online Anonymity Hurts Businesses and Consumers
sponsored by Gigya
WHITE PAPER: While protecting one's online identity has traditionally been a huge concern for Internet users, consumers and businesses alike are realizing the value of a more open, connected social web. In this white paper, explore three ways that user anonymity can negatively impact ROI for businesses and customer experiences.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

Gigya

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Scalable Data Quality: A Seven Step Plan for Any Size Organization
sponsored by Melissa Data Corp
WHITE PAPER: No matter the size of your business, data quality is an absolute requirement for success. Learn the seven steps you need to develop a plan for data quality - one that scales to your growing business needs.
Posted: 07 Jun 2007 | Published: 01 Jun 2007

Melissa Data Corp

Top Five Security Issues for Small and Medium-Sized Businesses
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively.
Posted: 22 Feb 2008 | Published: 01 Jan 2006

Cisco Systems, Inc.

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

Making Support Social: Turning Customer Engagement Into Customer Success
sponsored by Consona Corporation
WHITE PAPER: Social media is fundamentally changing how businesses and their customers interact. In this paper, learn of some of the broad trends in social media, and then provide specific guidance on how to use social media to deliver support better, faster and cheaper.
Posted: 17 Jun 2011 | Published: 01 May 2010

Consona Corporation
 
 
CONSUMER PRIVACY DEFINITION (continued): …  states its intention to respect the rights of privacy in personal and family life, as well as in the home and in personal correspondence. The Directive is based on the 1980 OECD "Recommendations of the Council Concerning guidelines Governing the Protection of Privacy and Trans-Border Flows of Personal Data." These recommendations are founded on seven principles, since enshrined in EU Directive 94/46/EC:Notice: subjects whose data is being collected should be given notice of such collection.Purpose: data collected should be used only for stated purpose(s) and for no other purposes.Consent: … 
Consumer Privacy definition sponsored by SearchSecurityUK.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement