Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Regulations

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Government Regulations
DEFINITION: Authoritative rules or orders issued by a government agency and often having the force of law.
Regulations Reports
101 - 125 of 127 Matches Previous Page  |  Next Page
The E-Discovery “How-To” Guide: Practical Recommendations for Streamlining Corporate E-Discovery
sponsored by Clearwell Systems
WHITE PAPER: This paper breaks down the e-discovery process into phases, discusses best practices and relevant technologies for each phase, and provides a matrix to guide an e-discovery team’s decision making process.
Posted: 13 Oct 2009 | Published: 01 Oct 2008

Clearwell Systems

Realizing Asset-Centric and User-Centric Approaches to Security
sponsored by RES Software
WHITE PAPER: This white paper presents an overview of both the asset-centric and the user-centric approaches to security. These approaches will be mapped towards the standard for Information Security: ISO 17799.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

RES Software

Critical Technologies for Compliance and Risk Management
sponsored by Siperian, Inc.
WHITE PAPER: Smart decision-makers are seeking technology investments -- such as Master Data Management -- to help establish good governance models that will help with regulatory compliance and lower their operational risk.
Posted: 16 Sep 2009 | Published: 16 Sep 2009

Siperian, Inc.

Essential Guide to PCI DSS
sponsored by Information Security Magazine
EGUIDE: This E-Guide will explain the new changes in Version 1.2 and how the standard will tackle emerging technologies such as cloud computing and virtualization. Specific topics include avoiding audit trouble, wireless encryption, tokenization, and more.
Posted: 14 Sep 2009 | Published: 14 Sep 2009

Information Security Magazine

The Path to IFRS Conversion: Considerations for the banking and capital markets industry
sponsored by Deloitte
WHITE PAPER: As acceptance of IFRS in the United States becomes imminent, more banks and capital markets institutions are asking key questions: How does IFRS affect my institution? What events would influence my institution's pace of IFRS adoption? What obstacles might we need to consider? Read this paper to learn the answers to these questions and more.
Posted: 04 Sep 2009 | Published: 03 Sep 2009

Deloitte

PODCAST: SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
PODCAST: What do SOX, GLBA, and HIPPA all have in common? These important regulations all require technical safeguards to protect or guarantee the veracity of critical information. In this Q&A podcast, gain an understanding of the above regulations and discover what capabilities and organization must have in place to address the requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.

SOX, GLBA and HIPAA: Multiple Regulations, One Compliance Solution
sponsored by Tripwire, Inc.
WEBCAST: SOX, GLBA and HIPAA share a common regulatory compliance thread - the need to use automation to ensure continuous compliance with required IT controls. View this webcast for an overview of each regulation. Also, gain an understanding of the capabilities an organization must have in place to address these requirements.
Posted: 01 Sep 2009 | Premiered: Aug 24, 2009

Tripwire, Inc.

The business impact of data security regulations: Featuring Massachusetts
sponsored by Sophos, Inc.
WHITE PAPER: This article discusses some aspects of a new regulation -- 201 CMR 17:00 -- and offers suggestions on how data security best practices can help with compliance. Companies should discuss the regulation in detail with their legal consul to examine how it affects their unique circumstances and the best course of action to be taken.
Posted: 11 Aug 2009 | Published: 11 Jun 2009

Sophos, Inc.

The Critical Need for Encrypted Email and Secure File Transfer Solutions
sponsored by Proofpoint, Inc.
WHITE PAPER: This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.
Posted: 04 Aug 2009 | Published: 01 Jul 2009

Proofpoint, Inc.

Countdown to Copenhagen: Government, business and the battle against climate change
sponsored by SAP AG
WHITE PAPER: Government, business and the battle against climate change is an EIU report that investigates the current regulatory outlook within key regions of the world.
Posted: 21 Jul 2009 | Published: 21 Jul 2009

SAP AG

The Massachusetts Data Protection Law
sponsored by SearchSecurity.com & SearchCompliance.com
EBOOK: Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
Posted: 18 Jun 2009 | Published: 18 Jun 2009

SearchSecurity.com & SearchCompliance.com

Meeting Compliance Objectives in SharePoint®
sponsored by AvePoint, Inc.
WHITE PAPER: This document is intended to aid IT administrators and other stakeholders responsible for managing SharePoint deployments, in planning and implementing a comprehensive, reliable, and efficient compliance strategy appropriate to their organizational needs.
Posted: 11 Jun 2009 | Published: 01 Feb 2009

AvePoint, Inc.

eBook: Compliance for the Midmarket: Governance, Risk and Technology
sponsored by SearchCIO.com
EBOOK: Read this E-book to learn about how you can take a proactive approach to regulatory compliance. Rather than waste time and resources tackling one regulation at a time, find out how companies are looking at the big picture and forming security strategies based on their needs. Sponsored By: Imperva and StoredIQ
Posted: 09 Jun 2009 | Published: 09 Jun 2009

SearchCIO.com

Laws, regulations and compliance: Top tips for keeping your data under your control
sponsored by Sophos, Inc.
WHITE PAPER: This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
Posted: 22 Dec 2008 | Published: 22 Dec 2008

Sophos, Inc.

The Top 12 Most Difficult Active Directory Management Tasks
sponsored by Dell Software
WHITE PAPER: This paper explains the top 12 Most Difficult Active Directory Management Tasks and provides solution for making them easier.
Posted: 20 Oct 2008 | Published: 17 Oct 2008

Dell Software

Turning the Compliance Challenge into a Business Advantage
sponsored by SAP America, Inc.
WHITE PAPER: New rules have spawned an army of consultants, vendors and solutions to address the "compliance" problem. Read this paper to learn how to turn the compliance challenge into a business advantage.
Posted: 26 Sep 2008 | Published: 18 Sep 2008

SAP America, Inc.

Expert Ebook: Mastering PCI
sponsored by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco
BOOK: This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

Becoming Value-driven: Focusing on What Matters Most
sponsored by IBM
WHITE PAPER: This white paper provides insight into the six key areas essential for becoming a value-driven organization. Discover how to gain the visibility and control essential to meet and exceed customer needs.
Posted: 20 Aug 2008 | Published: 20 Aug 2008

IBM

Total Economic Impact Of Oracle Enterprise Content Management Suite
sponsored by Oracle Corporation
WHITE PAPER: This whitepaper examines the financial impact and potential ROI on companies who use OracleEnterprise Content Management Suite. It provides companies with the ability to easily manage, reuse, and retain content and to streamline related business processes
Posted: 07 Aug 2008 | Published: 10 Jul 2008

Oracle Corporation

Lean and Green: Reducing IT Energy Drain for Business Gain
sponsored by BlueArc Corp.
WHITE PAPER: Download this report to see top-level findings of 150 IT professional surveyed to measure and quantify their current needs, obstacles and attitudes as they weigh decisions about investing in green technology.
Posted: 28 Apr 2008 | Published: 01 Apr 2008

BlueArc Corp.

5 Keys to a Successful Identity and Access Management Implementation
sponsored by CA Technologies.
WHITE PAPER: An effective Identity and Access Management (IAM) solution is quickly becoming a must-have or enterprise organizations. In this paper learn the five keys to successful identity and access management implementation.
Posted: 20 Feb 2008 | Published: 01 Dec 2007

CA Technologies.

Assuring Asset Documentation Integrity
sponsored by McLaren Software
WHITE PAPER: In this whitepaper, we will discuss best practices for assuring the integrity of your asset documentation.
Posted: 01 Feb 2008 | Published: 01 Jul 2007

McLaren Software

Pervasive Data Profiler v4
sponsored by Pervasive Integration
PRODUCT DEMO: Pervasive Data Profiler™ ensures data quality. Proactively audit all types of data; automate testing against changing business data quality needs and compliance regulations. Get hyper-fast, multithreaded processing of large data sets or sample data
Posted: 11 Jan 2008 | Premiered: 11 Jan 2008

Pervasive Integration

Kazeon Data Privacy & Security Solution
sponsored by Kazeon
WHITE PAPER: This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines.
Posted: 22 Nov 2006 | Published: 01 Nov 2006

Kazeon

Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
sponsored by VeriSign, Inc
WHITE PAPER: The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
Posted: 21 Nov 2006 | Published: 01 Jul 2006

VeriSign, Inc
101 - 125 of 127 Matches Previous Page    3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement