IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Consumer Privacy

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: EU Data Protection Directive (also known as Directive 95/46/EC) is a directive adopted by the European Union designed to protect the privacy and protection of all personal data collected for or about citizens of the EU, especially as it relates to processing, using, or exchanging such data. Directive 95/46/EC encompasses all key elements from article 8 of the European Convention on Human Rights, which  … 
Definition continues below.
Consumer Privacy Reports
 
Deep Dive: Mobile CRM for Sales
sponsored by Oracle Corporation
VIDEO: See how Oracle Sales Cloud solves key sales performance management gaps by putting the information you need in one app.
Posted: 17 Oct 2014 | Premiered: 17 Oct 2014

Oracle Corporation

Case Study - ABnote launches TransPromo platform for brazilian bank Bradesco
sponsored by GMC Software
CASE STUDY: When ABnote in Sao Paolo Brazil wanted to add promotional or educational messages to their transactional correspondence they turned to one platform to fulfill their communications needs and create a competitive advantage.Discover what platform enabled ABnote to implement this communications strategy with a very short timeline.
Posted: 09 Apr 2015 | Published: 09 Apr 2015

GMC Software

E-commerce 101: A Guide to Successful Selling on the Web
sponsored by GeoTrust, Inc.
WHITE PAPER: In this informative white paper, get help setting up, securing, and promoting your e-commerce site as you uncover the basics of e-commerce and learn how to avoid the pitfalls that can distress even the savviest of planners.
Posted: 11 Dec 2012 | Published: 30 Dec 2011

GeoTrust, Inc.

Practical Approaches for Securing Web Applications across the Software Delivery Lifecycle
sponsored by IBM
WHITE PAPER: Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don’t understand, is how to implement a robust process for integrating security and risk management throughout the web application software development lifecycle.
Posted: 16 Jun 2010 | Published: 08 Jul 2009

IBM

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

Consumer Trust Test: Does Your E-business Pass the Test?
sponsored by VeriSign, Inc
PRODUCT LITERATURE: Give potential customers the confidence that you can collect their sensitive personal information securely online, and you'll have a customer for life.
Posted: 01 Mar 2005 | Published: 01 Mar 2005

VeriSign, Inc

Scalable Data Quality: A Seven Step Plan for Any Size Organization
sponsored by Melissa Data Corp
WHITE PAPER: No matter the size of your business, data quality is an absolute requirement for success. Learn the seven steps you need to develop a plan for data quality - one that scales to your growing business needs.
Posted: 07 Jun 2007 | Published: 01 Jun 2007

Melissa Data Corp

Presentation Transcript: Virtualized Cardholder Data Environments Capitalizing on Updated PCI SSC Guidance
sponsored by HyTrust
PRESENTATION TRANSCRIPT: 2010 marked the release of the PCI's DSS 2.0 compliance standards, and among a variety of new standards, virtualization has made an appearance. Access this presentation transcript for expert analysis of the latest challenges of PCI compliance, including a detailed overview of concerns related to virtualization.
Posted: 07 Jul 2011 | Published: 07 Jul 2011

HyTrust

Three Ways Online Anonymity Hurts Businesses and Consumers
sponsored by Gigya
WHITE PAPER: While protecting one's online identity has traditionally been a huge concern for Internet users, consumers and businesses alike are realizing the value of a more open, connected social web. In this white paper, explore three ways that user anonymity can negatively impact ROI for businesses and customer experiences.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

Gigya

The business impact of data security regulations: Featuring Massachusetts
sponsored by Sophos, Inc.
WHITE PAPER: This article discusses some aspects of a new regulation -- 201 CMR 17:00 -- and offers suggestions on how data security best practices can help with compliance. Companies should discuss the regulation in detail with their legal consul to examine how it affects their unique circumstances and the best course of action to be taken.
Posted: 11 Aug 2009 | Published: 11 Jun 2009

Sophos, Inc.
 
 
CONSUMER PRIVACY DEFINITION (continued): …  states its intention to respect the rights of privacy in personal and family life, as well as in the home and in personal correspondence. The Directive is based on the 1980 OECD "Recommendations of the Council Concerning guidelines Governing the Protection of Privacy and Trans-Border Flows of Personal Data." These recommendations are founded on seven principles, since enshrined in EU Directive 94/46/EC:Notice: subjects whose data is being collected should be given notice of such collection.Purpose: data collected should be used only for stated purpose(s) and for no other purposes.Consent: … 
Consumer Privacy definition sponsored by SearchSecurityUK.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement