Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Internet Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Internet PrivacyReports
 
The trust advantage: How to win at big data
sponsored by ComputerWeekly.com
ANALYST REPORT: Without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste, this report from The Boston Consulting Group reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

European IT Law Briefing: Taking action on misuse of social media by employees
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when taking action against employees who misuse social media in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Data Protection Masterclass: New EU Data Protection Regulation
sponsored by ComputerWeekly.com
PRESENTATION: Law firm, Morrison & Foerster, examines the impact of new EU Data Protection legislation on buinsesses.
Posted: 28 Sep 2012 | Published: 28 Sep 2012

ComputerWeekly.com

Data Protection Solution-Taking Control of Your Data
sponsored by Lumension
WHITE PAPER: Whatever your industry, safeguarding your data is critical to running your business and protecting the privacy of employees and customers. Learn four critical steps to effectively implement removable device control.
Posted: 12 Aug 2009 | Published: 30 Oct 2008

Lumension

The Diverse and Exploding Digital Universe
sponsored by EMC Corporation
WHITE PAPER: This white paper, sponsored by EMC, is an update of IDC's inaugural forecast of the digital universe published in March 2007. In this year's update we discuss the implications for business, government, and society.
Posted: 28 Aug 2008 | Published: 27 Aug 2008

EMC Corporation

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine

E-Book: New Rules for HIPAA
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
Posted: 17 May 2010 | Published: 17 May 2010

SearchSecurity.com & SearchCompliance.com

Safeguarding Your Data with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: The need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Upgrading Wireless Networks in the Hospital
sponsored by SearchHealthIT.com
EBOOK: In the next few years, hospitals will be rolling out all kinds of technology to improve patient care. Each of these devices and systems must be able to send and receive information instantly.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

SearchHealthIT.com

Closing the data privacy gap for SAP Applications
sponsored by IBM
WHITE PAPER: This white paper provides insight into the requirements for protecting privacy in SAP non-production environments and describes some of the comprehensive data masking techniques available with the IBM® Optim™ Data Privacy Solution for SAP® Applications.
Posted: 04 Sep 2009 | Published: 01 Oct 2008

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement