Business of Information Technology  >   Business Management  >   Best Practices  >  

Compliance Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Compliance Best PracticesReports
226 - 250 of 609 Matches Previous Page  | Next Page
Critical Backup and Compliance Requirements
sponsored by APTARE
WHITE PAPER: This short white paper explores a data protection solution that provides end-to-end visibility to ensure sustainable compliance.
Posted: 02 Jul 2013 | Published: 28 Jun 2013

APTARE

Streamline Compliance Reporting to Effectively Meet Requirements
sponsored by APTARE
WHITE PAPER: Uncover key compliance requirements you should address in your backup strategy and learn how a central reporting tool can help you streamline compliance reporting, ensure data is protected throughout its entire lifecycle, and produce reports to quickly and accurately demonstrate compliance.
Posted: 02 Jul 2013 | Published: 28 Jun 2013

APTARE

Using EHRs to Achieve Meaningful Use
sponsored by SearchHealthIT.com
EBOOK: As stage 2 implementation dates loom, providers and industry stakeholders are assessing how well they've integrated certified electronic health records, technology standards and meaningful use stage 1 requirements into healthcare delivery.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

SearchHealthIT.com

Protecting Critical Business Information Beyond the Data Center
sponsored by HP Autonomy
WHITE PAPER: Discover why data protection for distributed environments differs from traditional server backup and recovery strategies and view a list of considerations you should use to evaluate potential service providers to ensure you find one that best aligns with your business needs.
Posted: 12 Jun 2013 | Published: 12 Mar 2013

HP Autonomy

Using Predictive Coding to Your E-Discovery Advantage
sponsored by SearchCIO.com
EZINE: E-discovery techniques such as predictive coding are increasingly popular, and organizations are starting to realize the benefits of these tools beyond just the legal realm. In this SearchCompliance handbook, learn how predictive coding and other e-discovery practices are proving beneficial to overall business processes.
Posted: 23 May 2013 | Published: 23 May 2013

SearchCIO.com

Information Governance Symposium: Properly Managing Your Records in an eDiscovery World Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: This classroom examines the changing records management landscape – and e-discovery's overlying impact on that transformation. Through a review of e-discovery best practices, practical solutions, and tools for implementation, users will gain essential understanding of how to tackle records management and e-discovery needs today.
Posted: 21 May 2013 | Premiered: 21 May 2013

SearchCompliance.com

Information Governance Symposium: The Mobile Influence on Information Management Classroom
sponsored by SearchCompliance.com
VIRTUAL ENVIRONMENT: With the proliferation of BYOD, cloud, and social media within the enterprise, benefits like cost savings, along with improved customer relations and employee satisfaction often overshadow the cons. This classroom provides expert insights into the issues that those trends are throwing into information security and governance processes.
Posted: 21 May 2013 | Premiered: 21 May 2013

SearchCompliance.com

Information Lifecycle Governance Leader Reference Guide
sponsored by IBM
WHITE PAPER: Storing data that no longer has any value to the organization is a crippling process that forward-thinking CIOs must begin to shy away from. This white paper provides key insight surrounding the defensible disposal of unnecessary data.
Posted: 30 Apr 2013 | Published: 30 Apr 2013

IBM

PCI Council issues mobile application rules for software developers
sponsored by SearchSecurity.com
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

SearchSecurity.com

Storage Through the Looking Glass
sponsored by ComputerWeekly.com
ANALYST REPORT: This analyst report aims to help you take a much needed step away from the technical detail of storage to create some strategic perspective.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

ComputerWeekly.com

CIO Handbook: The Risk Management Approach to Information Governance
sponsored by SearchCompliance.com
EBOOK: This handbook provides information governance-related risk management advice for organizations faced with managing and securing corporate data.
Posted: 19 Apr 2013 | Published: 20 Mar 2013

SearchCompliance.com

A Practical Guide to Records Management in the Digital Era
sponsored by Iron Mountain
WHITE PAPER: Making the transition to digital management of paper and electronic records is challenging. Companies can't risk efficiency or accuracy with their data, and may need a more simplified approach during the transition. View this resource to uncover a more practical approach to records management in the digital era.
Posted: 15 Apr 2013 | Published: 15 Apr 2013

Iron Mountain

How to Begin Addressing the Paper-to-Digital Challenge
sponsored by Iron Mountain
WHITE PAPER: View this white paper to learn more about how records management is transitioning into a more digital environment. Enterprises needed to find a solution for the staggering growth of content, and the only way to do so is with an enterprisewide information management soluition that goes beyond storing records.
Posted: 12 Apr 2013 | Published: 12 Apr 2013

Iron Mountain

Cloud Compliance Technical Guide
sponsored by SearchCloudSecurity.com
WHITE PAPER: Check out this expert technical guide for a global perspective on emerging cloud compliance issues.
Posted: 02 Apr 2013 | Published: 31 Dec 2012

SearchCloudSecurity.com

Effective print security for SMBs
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Louella Fernandes and Clive Longbottom  discuss how integrated print management provides SMBs with a simple and scalable approach for print security.
Posted: 02 Apr 2013 | Published: 02 Apr 2013

ComputerWeekly.com

Recordkeeping Needs Assessment Case Study: Using the Cloud to Improve Dismal Scores
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom explores the methodology used to conduct an early Generally Accepted Recordkeeping Principles® needs assessment (N.A.), followed by a discussion of how the N.A. led to the selection of a Cloud provider to improve dismal scores.
Posted: 02 Apr 2013 | Premiered: 02 Apr 2013


Building A Powerful IM Strategy for Large Organizations
sponsored by SearchCompliance and SearchSecurity.com
VIRTUAL ENVIRONMENT: Large organizations face challenges in identifying and defining requirements for the implementation of information management strategies. This classroom will lead you through Enbridge Inc.'s journey - from understanding business risks and gaining executive support, to elaborating, staffing, and implementing measureable execution techniques.
Posted: 01 Apr 2013 | Premiered: 02 Apr 2013


The E-discovery Ostrich
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights four simple steps that will ensure your organization is ready for e-discovery. Learn what a failure to plan for an e-discovery mandate can really cost your business, and discover why a little foresight can go a long way toward peace of mind.
Posted: 25 Mar 2013 | Published: 25 Mar 2013

Iron Mountain

Health IT 101 Classroom
sponsored by SearchHealthIT.com
VIRTUAL ENVIRONMENT: Health IT is an everchanging industry with new HIPAA compliance regulations to consider. This Classroom will answer all your questions on the evolution Health IT, Health Information Exchange, Meaningful Use Stage 2 and more.
Posted: 15 Mar 2013 | Premiered: 20 Mar 2013

SearchHealthIT.com

Intelligent Role Management for Improved Security and Compliance
sponsored by IBM
WHITE PAPER: Uncover why managing user access entitlements and activities is so crucial and learn about an identity and access management solution that will help you improve both security and compliance in your organization.
Posted: 07 Mar 2013 | Published: 31 Jul 2012

IBM

Where BCDR and GRC Come Together: A CIO's Guide
sponsored by Essextec
EZINE: In this e-guide, our experts from SearchSecurity.com will help you establish better security with this IT disaster preparation and recovery guide for enterprise CIOs.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Essextec

Understanding the Data Management Challenges of Dodd-Frank
sponsored by Bloomberg
PRESENTATION TRANSCRIPT: Join industry expert Harald Collet in this presentation transcript to learn about new information governance, recordkeeping, and compliance complexities in the age of Dodd-Frank, and find guidance and advice to help you overcome these challenges.
Posted: 03 Jun 2013 | Published: 03 Jun 2013

Bloomberg

Cloud-based archiving for e-discovery/compliance: Five "need to knows"
sponsored by Hewlett-Packard Company
EGUIDE: This expert E-Guide discusses five key questions to answer when evaluating or developing a cloud-based archiving strategy for your business.
Posted: 01 May 2013 | Published: 01 May 2013

Hewlett-Packard Company

May Information Security Magazine
sponsored by SearchSecurity.com
EZINE: This month, Information Security magazine takes an in-depth look at this ever-evolving saga and explores how leveraging a risk-centric compliance model, like PASTA, can re-energize your compliance strategy. Also uncover stories around Apple device security, data breach protection trends and more!
Posted: 29 Apr 2013 | Published: 29 Apr 2013

SearchSecurity.com

Enterprise Security: Why you need Effective Log Management
sponsored by SearchCompliance.com
EBOOK: For many, collecting and maintaining logs is a compliance requirement. But IT leaders will soon discover that there are many other practical reasons for maintaining logs. Access today's resource to uncover ways in which log management can tighten data security and boost overall IT performance.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

SearchCompliance.com
226 - 250 of 609 Matches Previous Page    8 9 10 11 12 13    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement