Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Legal Compliance

RSS Feed    Add to Google    Add to My Yahoo!
Legal ComplianceReports
 
Selecting Data Archiving Tools and Successful DR Planning
sponsored by Rand Secure Data
EGUIDE: In this expert e-guide, learn how to carefully plan for disaster recovery and avoid mishaps with 10 common mistakes such as confusing high availability with disaster recovery as well as trying to back up too much.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Rand Secure Data

Handbook: Medical Image Archiving
sponsored by SearchHealthIT.com
EBOOK: As more and more information heads online, healthcare providers are struggling to secure and store necessary electronic data. Consult this expert handbook to learn cutting-edge archiving strategies that will help you successfully migrate to the next generation of health IT data systems.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchHealthIT.com

PCI Council issues mobile application rules for software developers
sponsored by SearchSecurity.com
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

SearchSecurity.com

Rochester General Relies on MOVEit to Transfer Medical Records and Meet HIPAA/HITECH Compliance
sponsored by Ipswitch File Transfer
CASE STUDY: This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements.
Posted: 09 Jul 2013 | Published: 31 May 2013

Ipswitch File Transfer

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
sponsored by IBM
WHITE PAPER: This resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
Posted: 27 Feb 2014 | Published: 28 Feb 2013

IBM

Hitting the Information Governance and Compliance Sweet Spot
sponsored by IBM
EGUIDE: In this expert e-guide from SearchCompliance.com, technology law expert Jeffrey Ritter discusses the complications and benefits that arise between data governance and compliance rules.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Financial process automation leads to better performance
sponsored by Dolphin
EGUIDE: Financial reporting can be time-consuming and expensive if done manually. In this expert guide, learn how automating financial reporting can offer your organization key benefits and discover recommendations on how to get started.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

Dolphin

Keeping Distributed Endpoints Safe and Compliant
sponsored by IBM
WHITE PAPER: Keeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
Posted: 12 May 2014 | Published: 30 Jun 2012

IBM

Tackling the Data Security Challenge
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement