Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Privacy Laws

RSS Feed    Add to Google    Add to My Yahoo!
Privacy LawsReports
 
CW500: Best practice in BYOD
sponsored by ComputerWeekly.com
PRESENTATION: Simon Furber, Network Manager at Brunel University, highlights the key issues to consider when introducing BYOD in your organisation.
Posted: 06 Sep 2013 | Published: 06 Sep 2013

ComputerWeekly.com

International technology adoption & workforce issues
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This study from CompTia,  looks at technology and workforce recruitment trends across 10 countries.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Enabling a secure and convenient online banking experience
sponsored by HID
WHITE PAPER: In this white paper, discover security solutions that are scalable, secure and simple to implement for online banking.
Posted: 09 Jul 2014 | Published: 03 May 2013

HID

Data Protection Masterclass: Global Privacy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions.
Posted: 12 Jun 2012 | Published: 24 May 2012

ComputerWeekly.com

UK IT priorities 2012
sponsored by ComputerWeekly.com
IT BRIEFING: This exclusive Computer Weekly research reveals how UK IT departments are prioritising their budgets in 2012, which technologies they are investing in, and the impact of cloud computing, mobile and other disruptive technology on their IT strategies.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

ComputerWeekly.com

E-Book: New Rules for HIPAA
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
Posted: 17 May 2010 | Published: 17 May 2010

SearchSecurity.com & SearchCompliance.com

Top 10 Best Practices for Email Archiving
sponsored by ZANTAZ
WHITE PAPER: Email archive software can address a number of issues from compliance to electronic discovery to storage concerns. This checklist outlines the common mistakes made by administrators when researching, implementing and managing email archive solutions.
Posted: 03 Oct 2006 | Published: 03 Oct 2006

ZANTAZ

Tackling the Data Security Challenge
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Knowledge is Power
sponsored by IBM
WHITE PAPER: Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement