Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Regulatory Compliance  >  

Compliance Audits

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Audits, Auditing, Compliance Auditing, Auditing (Compliance)
DEFINITION: Examination and evaluation of specific activities of an enterprise to measure adherence to specific legal, regulatory or contractual standards.
Compliance AuditsReports
126 - 150 of 271 Matches Previous Page  | Next Page
A Records Retention Schedule That Leads to Information Management Bliss
sponsored by Iron Mountain
CASE STUDY: When the second largest copper producer in the United States wanted to regain control of their overwhelming amount of paper records and maintain compliance, they turned to a strategic retention schedule. This white paper reveals how they were able to proactively manage a wide variety of information for audit, litigation, and compliance readiness.
Posted: 16 Mar 2012 | Published: 16 Mar 2012

Iron Mountain

5 Ways to Ensure Information Management Compliance
sponsored by Iron Mountain
DATA SHEET: Use this resource as a guide to to make sure your information is maintaining compliance with regulations and standards. Find five tips to help lower your risk profile and boost your audit readiness.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

Iron Mountain

Eliminate the hidden costs of records management
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn about the hidden costs of records management. Access detailed worksheets that will allow you to estimate your own company's savings opportunities in leveraging a solution that manages both electronic and physical records.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

Iron Mountain

6 Ways Solid Information Management Can Keep You Compliant
sponsored by Iron Mountain
WHITE PAPER: Access this resource to learn methods and best practices for information management that IT leaders can implement to improve efficiency, compliance and cost savings, including six steps to greater compliance.
Posted: 06 Mar 2012 | Published: 06 Mar 2012

Iron Mountain

Fast Track to Archived Data Access
sponsored by Iron Mountain
WHITE PAPER: Read this paper for best practices and keys to help you prepare for a compliance or audit request. Learn how an offsite partner can help improve your data protection, accessibility and recoverability, and receive 7 keys to help improve your security and backup policies. Also receive checklist of 4 keys to help you better access your information.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

The Lowdown on Compliant Data Storage
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for 10 keys to staying compliant. Learn about the importance of access and authorization controls, discover the benefits of encryption for backups, learn how to safeguard traveling media and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

#CompliantData: The Social Media Data Archiving Conundrum
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to discover how to set the stage for social media success with the right data backup and recovery systems. Inside, learn how to gauge risk vs. reward in social media, discover how to update your compliance strategy to include social media, receive best practices for staying on top of archiving regulations and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

When It's Time for an Audit, Will You Be Ready?
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper for best practices on how to best prep yourself for the audit process - learn how to create a backup and recovery plan that includes the right audit and accountability features, discover four keys to help you on the path to compliance and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Software Licensing and Subscription
sponsored by ComputerWeekly.com
ANALYST BRIEF: This research from Freeform Dynamics, based on a survey of end users,  identifies the challenges faced by IT departments and suppliers on software licensing, and offers advice to organisations on dealing with software licensing.
Posted: 05 Jan 2012 | Published: 05 Aug 2011

ComputerWeekly.com

Creating a Compliance Culture: Best Practices
sponsored by SearchSecurity.com
EGUIDE: Check out this E-Guide and learn key tips on how to make sure your compliance culture is operating efficiently.
Posted: 17 Nov 2011 | Published: 17 Nov 2011

SearchSecurity.com

How to tackle IT audit and compliance
sponsored by ComputerWeekly.com
WHITE PAPER: IT audit is about the formal verification and validation of the quality and effectiveness of ITcontrols to support the overall business control objectives. From a security controlperspective the residual IT security risks are relatively well understood in a networkperimeter protected environment.
Posted: 20 Oct 2011 | Published: 09 Nov 2010

ComputerWeekly.com

Eguide: Top 10 risks in cloud computing and how to stay compliant
sponsored by SearchSecurity.com
EGUIDE: Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

SearchSecurity.com

InfoSphere Optim Data Redaction
sponsored by IBM
WHITE PAPER: As data continues to expand and organizations find new ways to collaborate with partners and customers, the question arises: How secure is your sensitive information?  In addition, organizations must also ensure that the right information stays private. Learn how organizations are striving to support information governance programs.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM

eBook: Trends in Healthcare Data Protection
sponsored by LANDesk Software
EBOOK: This E-Book explores how encryption technologies can help protect health care data, ensuring the avoidance of costly non-compliance penalties.
Posted: 22 Mar 2012 | Published: 22 Mar 2012

LANDesk Software

Should it Stay or Should it Go? 10 Steps to Leveraging Data on a Tape Backup System
sponsored by Iron Mountain
WHITE PAPER: Check out this white paper to discover 10 steps toward developing a tape-based data retention plan for your business. Discover the importance of knowing and defining your regulatory requirements, receive three keys to maximize your backup tape investment and more.
Posted: 01 Mar 2012 | Published: 01 Mar 2012

Iron Mountain

Closed-loop Records Management: The Stakes Are Too High to Ignore
sponsored by RSD
WHITE PAPER: As the breadth, variety and importance of electronic data in the enterprise continues to expand, it is increasingly critical that corporate information policies be tied to strong IT enforcement. Access this resource to learn how to develop effective closed-loop records management through well-defined information governance.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

RSD

Data Centre Energy Efficiency IT Handbook
sponsored by SearchDataCenter.com
EBOOK: The deadline for the UK's Carbon Reduction Commitment scheme has now passed, and companies will begin to receive fines if they can't demonstrate how they've reduced their carbon footprint or are putting processes in place to do so. This expert IT handbook offers detailed information about this new regulation and how organisations can adhere to it.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

SearchDataCenter.com

Compliance and Risk Management: Factoring compliance as part of your risk management equation
sponsored by IBM
EBOOK: Enterprises often struggle with integrating IT security and compliance efforts into an overall corporate risk management program. Inside this e-book, learn how to implement effective policies for GRC, audits and much more.
Posted: 14 Nov 2011 | Published: 14 Nov 2011

IBM

Passing a PCI Audit: A Global Perspective on Security Payment Card Data
sponsored by IBM
EGUIDE: SearchSecurity.com presents a comprehensive guide on how to pass a PCI audit. Our experts examine tactics that help companies achieve PCI compliance and offers advice on the steps you can take to make the audit process less burdensome.
Posted: 11 Nov 2011 | Published: 11 Nov 2011

IBM

Risk and Compliance Outlook
sponsored by McAfee, Inc.
WHITE PAPER: Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk.
Posted: 10 Nov 2011 | Published: 10 Nov 2011

McAfee, Inc.

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX
sponsored by Safestone Technologies
WHITE PAPER: This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Safestone Technologies

RAPID-DEPLOYMENT SOLUTIONS FOR SUSTAINABILITY ANALYTICS
sponsored by SAP America, Inc.
WHITE PAPER: Minimizing losses from accidents, products losses, and violations of environmental regulations requires rapid access to the right information. Read this paper to learn to how to leverage sustainability analytics that let you import data from SAP and non-SAP applications for the needed visibility.
Posted: 28 Oct 2011 | Published: 31 Dec 2010

SAP America, Inc.

Maximize the Availability of Health Data While Minimizing Storage Costs
sponsored by IBM
WHITE PAPER: The data storage requirements for a healthcare provider are among the largest and most demanding in any industry. Read this comprehensive white paper to explore new, cost-cutting ways to manage, protect, and preserve your electronic health information.
Posted: 03 Oct 2011 | Published: 03 Oct 2011

IBM

SearchSecurity.com E-Guide: PCI DSS: Understanding key themes and assessment changes
sponsored by IBM
EGUIDE: This expert tip provides an overview on the recent PCI DSS Security assessment changes and offers advice on how to update compliance programs to keep pace with the new requirements.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

IBM

InfoSphere Optim Data Growth Solution for Application Retirement
sponsored by IBM
WHITE PAPER: Data retention regulations, such as Sarbanes-Oxley, Basel II and HIPAA, require organizations to retain historical data in its original business context for specified periods of time. Non-compliance could result in costly penalties and fines. Learn about a data retention approach that archives critical business information.
Posted: 23 Aug 2011 | Published: 23 Aug 2011

IBM
126 - 150 of 271 Matches Previous Page    4 5 6 7 8 9    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement