Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   State Law  >  

Security Breach Law

RSS Feed    Add to Google    Add to My Yahoo!
Security Breach Law White Papers (View All Report Types)
Log Management Best Practices
sponsored by RSA
WHITE PAPER: Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Posted: 14 Feb 2008 | Published: 01 Jan 2007


Practical Guide to Database Security & Compliance
sponsored by Sentrigo Inc.
WHITE PAPER: This white paper reviews the effect of various regulatory compliance requirements on database security, and provides you with 5 practical steps for achieving database security and compliance.
Posted: 05 Nov 2007 | Published: 01 Nov 2007

Sentrigo Inc.

Study: How to make mobile successful within the organisation – what every CEO needs to know
sponsored by Matrix42
WHITE PAPER: This white paper explores how the growing use of web and SaaS applications is affecting German companies, and how German IT specialists ensure access to these key business applications, and how they plan to for years to come. Read about the results of a questionnaire based study to learn how CEOs can make their mobile work environment successful.
Posted: 08 Jun 2015 | Published: 08 Jun 2015


A New Age of Selling: Work Like a Network to Grow Your Business
sponsored by Microsoft
WHITE PAPER: How can sales organizations use technology to close more deals with less effort? Access now to see concrete examples of successful sales leaders who are transforming the way they sell their solutions.
Posted: 07 Apr 2016 | Published: 01 Jul 2014


Five Procurement Guidelines You Can't Afford to Ignore
sponsored by StarCite
WHITE PAPER: Here is a list of 5 guidelines that companies should keep in mind as they create their spend management program: Data Consolidation, Preferred Vendor Program, Legal Oversight, Company-wide Visibility and Coordination.
Posted: 29 Aug 2008 | Published: 29 Aug 2008


E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014


IBM Business Process Manager -- Powerfully Simple
sponsored by IBM
WHITE PAPER: IBM Business Process Manager provides the simplicity, efficiency, visibility and collaboration needed to manage highly dynamic and networked business environments. IBM Business Process Manager is easy to deploy and use straight out of the box or in an easily customizable configuration - providing rapid time to value and improved user productivity.
Posted: 07 Jul 2011 | Published: 07 Jul 2011


Advancing Healthcare through the Application of Predictive Knowledge Management
sponsored by Dell, Inc.
WHITE PAPER: This white paper examines how the health care industry can proactively support patient-focused care through the use of technology services that enable predictive analysis.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

A New Model for Healthcare Transformation
sponsored by Dell, Inc.
WHITE PAPER: This paper provides an overview of the major issues that are driving support for care transformation. More importantly, it outlines an approach for achieving value from the IT investments made by health care organizations in support of transformation initiatives.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

Dell, Inc.

The business impact of data security regulations: Featuring Massachusetts
sponsored by Sophos, Inc.
WHITE PAPER: This article discusses some aspects of a new regulation -- 201 CMR 17:00 -- and offers suggestions on how data security best practices can help with compliance. Companies should discuss the regulation in detail with their legal consul to examine how it affects their unique circumstances and the best course of action to be taken.
Posted: 11 Aug 2009 | Published: 11 Jun 2009

Sophos, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement