Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Right of Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Right of Privacy Reports
 
Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Data Protection Masterclass: Global Privacy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions.
Posted: 12 Jun 2012 | Published: 24 May 2012

ComputerWeekly.com

European IT Law Briefing:  Practical steps for companies using social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Leading European law firms offer practical advice for companies using social media in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Jericho Forum: Data Protection
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Retail's digital future
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report highlights eight emerging technology trends in retail, some of the pioneering startups making them happen, and the data protection and privacy issues they raise.
Posted: 10 Oct 2014 | Published: 10 Oct 2014

ComputerWeekly.com

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Computer Weekly – 20 August 2013: Mixing work and play – how corporate applications can learn from computer games
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at gamification, the trend for corporate software to use techniques developed for computer games. After the Prism internet surveillance scandal, Switzerland hopes to become a safe location for cloud services. And we talk to an NHS CIO about the challenges of a paperless health service. Read the issue now.
Posted: 20 Aug 2013 | Published: 20 Aug 2013

ComputerWeekly.com

Balance End User Satisfaction and Business Productivity
sponsored by BlackBerry
WHITE PAPER: This white paper talks about the benefits of corporate owned, personally enabled devices that provide a lot of the same benefits as BYOD, but without the security issues.
Posted: 11 Apr 2014 | Published: 11 Apr 2014

BlackBerry

Tackling the Data Security Challenge
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
sponsored by IBM
WHITE PAPER: This resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
Posted: 27 Feb 2014 | Published: 28 Feb 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement