Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Regulatory Compliance

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Compliance (Law), Legal Compliance, Security Compliance, Compliance (Security)
DEFINITION: Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance,  … 
Definition continues below.
Regulatory Compliance Reports
1 - 25 of 707 Matches Previous Page  |  Next Page
Big Data E-discovery Management's Need for an Information Governance Policy
sponsored by Symantec Corporation
EGUIDE: Big data creates many e-discovery challenges. In this e-guide, read about August's #GRCchat on Twitter and the overwhelming need for a comprehensive information governance policy to alleviate these challenges.
Posted: 17 Jun 2015 | Published: 17 Jun 2015

Symantec Corporation

The Future of the Contact Center: 7 Key Trends in 2015
sponsored by Five9
WEBCAST: In this webcast, Liz Osborn, VP of Product and Solution Marketing at Five9, discusses 7 key trends that are shaping the future of the contact center, from social engagement to OmniChannel capabilities. Watch now to access useful advice on maximizing the benefits of these trends within your organization.
Posted: 04 Jun 2015 | Premiered: Apr 2, 2015

Five9

Addressing Compliance Issues Around Public Cloud for Content Collaboration with Box for Financial Services
sponsored by Box
WHITE PAPER: This white paper explores how content collaboration with Box for Finanical Services addresses compliance issues. Read now to learn how providing enterprise-class content collaboration capabilities can tackle compliance risk.
Posted: 20 May 2015 | Published: 20 May 2015

Box

How to Streamline the Regulatory Filings Process
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores one approach to streamline the regulatory filing process, ensure granular control, and avoid penalties.
Posted: 19 May 2015 | Published: 29 Apr 2015

IntraLinks, Inc

Planning Out Your Financial Software Strategy
sponsored by IBM
EGUIDE: In this e-guide, explore the user-friendly, financial reporting and analytics tools to choose from that offer sophisticated insight into financial health. Additionally, uncover valuable tips on how to plan the migration from Excel to financial management software.
Posted: 13 May 2015 | Published: 13 May 2015

IBM

The Collaborative Data Privacy Handbook
sponsored by IntraLinks, Inc
WHITE PAPER: As more organizations share sensitive data, the risk of leak or theft increases.  This white paper outlines six steps to improving data privacy and sharing principles and preventing regulatory and market sanctions.
Posted: 13 May 2015 | Published: 10 Dec 2014

IntraLinks, Inc

The Outliers of HR (Out)sourcing
sponsored by NGA Human Resources
WHITE PAPER: Access this white paper to find out how to create the optimal HR situation between people, process, service management and technology, and between in-house or outsourced.
Posted: 06 May 2015 | Published: 06 May 2015

NGA Human Resources

Financial Organizations: Controlling Secure Communications
sponsored by IntraLinks, Inc
WHITE PAPER: In this white paper, you will learn how to build more structured and controlled processes for assembling, refining, and sharing information. View now to examine several case studies presenting common financial information sharing challenges and how to craft your security strategy to overcome them.
Posted: 04 May 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Intralinks VIA™ for Managing Regulatory Examinations
sponsored by IntraLinks, Inc
WHITE PAPER: Access this resource to learn about the leading vendor in the enterprise collaboration and social software market.
Posted: 30 Apr 2015 | Published: 30 Apr 2015

IntraLinks, Inc

Records management strategies to maintain regulatory compliance
sponsored by SearchCompliance.com
EBOOK: Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
Posted: 16 Apr 2015 | Published: 16 Apr 2015

SearchCompliance.com

Managing Food Safety and Quality Using Enterprise Software
sponsored by IFS
WHITE PAPER: Access this white paper to learn how to get a solid grip on process manufacturing with the use of software.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

IFS

Extend Compliance and Risk Management to What Really Matters For Your Business
sponsored by Absolute Software
ANALYST REPORT: Access this informative report to find out how the current focus of risk and compliance efforts is too narrow because many GRC programs largely ignore the risks that cause companies to fail. Discover how to impact performance by expanding the fundamentals of GRC to the aspects of the business that drive success with customer interactions.
Posted: 22 Jan 2015 | Published: 31 Dec 2014

Absolute Software

A Prescription for Privacy
sponsored by Symantec Corporation
WHITE PAPER: This white paper examines the challenges surrounding the emerging world of EHR technology, including the requirements that govern the protection of confidential patient data online; the measures that organizations need to take right now to prepare for these upcoming changes to the healthcare industry; and more.
Posted: 14 Jan 2015 | Published: 28 Feb 2014

Symantec Corporation

Financial Services Firm Supports Compliance with Archiving
sponsored by Hewlett-Packard Company
CASE STUDY: Learn why a leading financial institution deployed HP Digital Safe and other HP tools to help manage terabytes of data.
Posted: 12 Jan 2015 | Published: 12 Jan 2015

Hewlett-Packard Company

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

The Compliance and Security Balancing Act
sponsored by Mimecast
EGUIDE: In this expert guide, Karen Scarfone provides several practical tips on technologies that improve enterprise email security, and Christine Parizo discusses how to strike an ideal balance between compliance and security, when "compliant" doesn't necessarily mean "secure."
Posted: 22 Dec 2014 | Published: 22 Dec 2014

Mimecast

Email Archives: Why Old Solutions Aren't Sufficient for Modern Enterprises
sponsored by Mimecast
WHITE PAPER: This white paper examines the difficulties that organizations encounter as they seek a solution to ever-increasing volumes of stored emails and the need for faster, more flexible accessibility to this data.
Posted: 19 Dec 2014 | Published: 31 May 2013

Mimecast

Email Security Checklist: Eight Steps for Healthcare Organizations
sponsored by Mimecast
WHITE PAPER: This white paper explains how you can embrace email as a core communication tool while still adhering to guidelines.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Mimecast

Healthcare Email Management: Balancing Security, Compliance, and Cost
sponsored by Mimecast
WHITE PAPER: This white paper discusses a number of email management challenges facing healthcare CIOs, including HITECH and HIPAA compliance, budget constraints, cloud-based email and collaboration technologies, and data security.
Posted: 17 Dec 2014 | Published: 17 Dec 2014

Mimecast

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM

Protect People, Processes and Technology from Web Application Threats
sponsored by IBM
WHITE PAPER: Securing externally facing applications is an important step toward safeguarding your critical assets. Find out why.
Posted: 08 Oct 2014 | Published: 29 Nov 2013

IBM
1 - 25 of 707 Matches Previous Page    1 2 3 4    Next Page
 
REGULATORY COMPLIANCE DEFINITION (continued): … Governance, Risk and Compliance (GRC) is a combined area of focus within an organization that developed because of interdependencies between the three components. GRC software products, available from a number of vendors, typically facilitate compliance with legal requirements, such as those specified in the Sarbanes-Oxley Act (SOX) or occupational health and safety regulations. Learn more about governance, risk and compliance at SearchCompliance.com
Regulatory Compliance definition sponsored by SearchFinancialSecurity.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement