Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Trustmarks

RSS Feed    Add to Google    Add to My Yahoo!
TrustmarksWhite Papers (View All Report Types)
 
Bay Cove Human Services Achieves HIPAA Compliance on Google Apps & BYOD
sponsored by BitGlass
WHITE PAPER: This short white paper details how Bay Cove Human Services collaborated with BitGlass to achieve HIPAA compliance while still enabling the company to utilize Google Apps as their productivity backbone.
Posted: 09 Oct 2014 | Published: 09 Oct 2014


Successfully Negotiating the HIPAA Maze - A Sybase, Inc. Healthcare Report on Complying with Administrative Simplification & Security Mandates
sponsored by Sybase, an SAP company
WHITE PAPER: This white paper explores the challenges healthcare organizations are facing with the Healthcare Information Portability and Accountability Act (HIPAA) and the steps needed to successfully negotiate the many aspects of the regulations.
Posted: 02 Jun 2002 | Published: 01 Jan 2002

Sybase, an SAP company

Closing the data privacy gap for SAP Applications
sponsored by IBM
WHITE PAPER: This white paper provides insight into the requirements for protecting privacy in SAP non-production environments and describes some of the comprehensive data masking techniques available with the IBM® Optim™ Data Privacy Solution for SAP® Applications.
Posted: 04 Sep 2009 | Published: 01 Oct 2008

IBM

The Diverse and Exploding Digital Universe
sponsored by EMC Corporation
WHITE PAPER: This white paper, sponsored by EMC, is an update of IDC's inaugural forecast of the digital universe published in March 2007. In this year's update we discuss the implications for business, government, and society.
Posted: 28 Aug 2008 | Published: 27 Aug 2008

EMC Corporation

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine

Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
sponsored by IBM
WHITE PAPER: This resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
Posted: 27 Feb 2014 | Published: 28 Feb 2013

IBM

Whitepaper: IBM Optim Data Redaction: Reconciling openness with privacy
sponsored by IBM
WHITE PAPER: Redaction is a word that many—if not most—IT organizations have never heard of. If they have, they would probably be hard-pressed to define it or explain its importance. But that situation is changing quickly as organizations realize they must have a solution.
Posted: 06 Apr 2011 | Published: 06 Apr 2011

IBM

Knowledge is Power
sponsored by IBM
WHITE PAPER: Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

Why Managing Mobility Matters
sponsored by SAP America, Inc.
WHITE PAPER: Mobile devices continue to be purchased in record numbers, pouring into the organization. These devices are coming in a wide variety of hardware and operating system types, making their management and security a big IT challenge. This IDG Playbook is designed to help guide your strategy to manage and secure the booming mobile environment.
Posted: 05 Jan 2011 | Published: 05 Jan 2011

SAP America, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement