Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Federal Law  >  

Financial Services Modernization Act of 1999

RSS Feed    Add to Google    Add to My Yahoo!
Financial Services Modernization Act of 1999Reports
 
PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
PODCAST: What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.

Log Management Best Practices
sponsored by RSA, The Security Division of EMC
WHITE PAPER: Developing best practices in log management is not a simple task. This paper should help organizations develop their own comprehensive set of best practices by providing a set of 40 recommended best practices covering logging policies; procedures and t...
Posted: 14 Feb 2008 | Published: 01 Jan 2007

RSA, The Security Division of EMC

IDC White Paper: Effective Information Security
sponsored by CA (India) Technologies Pvt. Ltd
ANALYST REPORT: Securing personally identifiable information (PII) and IP has become a high priority for enterprise management and IT. In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility...
Posted: 29 Apr 2010 | Published: 25 Sep 2009

CA (India) Technologies Pvt. Ltd

Eagle Bank Keeps Deposits and Customer Data Safe
sponsored by Imprivata
WHITE PAPER: This case study highlights one bank's successful enforcement of a strong password policy by implementing a single sign-on (SSO) solution. Read on to learn how you can maintain GLBA compliance, and reduce IT's access management.
Posted: 11 Apr 2014 | Published: 28 Feb 2010

Imprivata

E-Guide A Decision Maker’s Guide to Log Management
sponsored by ArcSight, an HP Company
EGUIDE: While often underappreciated by IT professionals, logs are an extremely useful source of data for IT shops. Often undervalued as a strategic weapon, log management tools can play a vital role in securing mission-critical data and assuring accountability. Learn what to consider when it’s time to get a handle on your logs.
Posted: 01 Nov 2010 | Published: 27 Oct 2010

ArcSight, an HP Company

Whitepaper: Roadmap to Effective eGovernment
sponsored by EMC Corporation
WHITE PAPER: This detailed handbook covers four stages – from paper-based dependency to the achievement of connected government. A best-practices roadmap will offer you the ideal strategy for your current information infrastructure.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

EMC Corporation

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos, Inc.
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos, Inc.

Get the Facts on Information Availability: Essential Data Protection, Recovery and Resiliency for Banks
sponsored by Vision Solutions
WHITE PAPER: The power of an information availability solution lies in its ability to transform any nonproductive, non-profitable downtime into the optimum level of value-producing business uptime.
Posted: 09 May 2008 | Published: 01 Jan 2007

Vision Solutions

Practical Guide to Understanding and Complying with the Gramm-Leach-Bliley Act
sponsored by Ecora Software
WHITE PAPER: New whitepaper on GLBA - learn key steps for validating compliance with the Gramm-Leach-Bliley Act, the background of GLBA - what it is and who must adhere, and how senior management and IT departments must ensure that customer data is safeguarded.
Posted: 16 Jan 2007 | Published: 16 Jan 2007

Ecora Software

Effective Information Security: A Win-Win Proposition for the Enterprise and IT
sponsored by CA Technologies.
WHITE PAPER: In this white paper, IDC provides an overview of information security and its impact on enterprises, discusses IT operation challenges, and describes CA's answer to helping enterprise IT organizations attain increased visibility into and protection of their private and confidential data.
Posted: 02 Mar 2010 | Published: 25 Sep 2009

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement