Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Internet Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Internet Privacy Reports
 
CW500: Best practice in BYOD
sponsored by ComputerWeekly.com
PRESENTATION: Simon Furber, Network Manager at Brunel University, highlights the key issues to consider when introducing BYOD in your organisation.
Posted: 06 Sep 2013 | Published: 06 Sep 2013

ComputerWeekly.com

Earning consumer trust in big data: a European perspective
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from DLA Piper and the Boston Consulting Group Regulatory explains the fundamentally different approaches and attitudes towards data privacy in the world's three largest markets, and offers advice to businesses on how to earn the trust of consumers.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

ComputerWeekly.com

Recommendations on rolling back government surveillance
sponsored by ComputerWeekly.com
EBRIEF: Four former seniors staff from the US electronic intelligence gathering agency, the NSA, put the case for reform.
Posted: 01 Jul 2014 | Published: 01 Jul 2014

ComputerWeekly.com

Gartner: Time to rethink backup procedures
sponsored by ComputerWeekly.com
ANALYST BRIEF: IT leaders and storage managers can realise cost savings and improve their use of backup infrastructure by rethinking their back-up procedures, says Gartner analyst Dave Russell.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

CW Buyer's Guide: Data Security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth buyer's guide offers advice to CISOs on keeping up with security best practice as new EU data protection rules come into force
Posted: 14 Sep 2012 | Published: 05 Apr 2012

ComputerWeekly.com

Sharing knowledge to tackle online banking fraud
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Computer Weekly – 30 July 2013: The threat within – balancing security and employee privacy
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as more data breaches come from inside an organisation, we examine how to balance information security and employee privacy. Tech City CEO Joanna Shields talks about the opportunity for CIOs from working with startups. And we look at how mobile technology can help improve patient care in the NHS. Read the issue now.
Posted: 29 Jul 2013 | Published: 30 Jul 2013

ComputerWeekly.com

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Tackling the Data Security Challenge
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Safeguarding Your Data with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: The need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement