Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Right of Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Right of Privacy Reports
 
Earning consumer trust in big data: a European perspective
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from DLA Piper and the Boston Consulting Group Regulatory explains the fundamentally different approaches and attitudes towards data privacy in the world's three largest markets, and offers advice to businesses on how to earn the trust of consumers.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

ComputerWeekly.com

CW500: Best practice in BYOD
sponsored by ComputerWeekly.com
PRESENTATION: Simon Furber, Network Manager at Brunel University, highlights the key issues to consider when introducing BYOD in your organisation.
Posted: 06 Sep 2013 | Published: 06 Sep 2013

ComputerWeekly.com

Governance, Risk Management and Compliance (GRC)
sponsored by ComputerWeekly.com
ANALYST REPORT: Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

De-risking IT Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

European IT Law Briefing: Monitoring employees' use of social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Leading European law firms explain the key legal requirements for companies monitoring employees' social media use in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Information governance Frameworks: The evolving models and the tried and true
sponsored by SearchCIO.com
VIRTUAL ENVIRONMENT: Modern organizations generate more data than ever, forcing them to reexamine governance strategy. This sounds daunting, but does not require reinventing the wheel: In this interactive classroom, learn to adapt proven information governance techniques to the digital age.
Posted: 14 May 2014 | Premiered: 15 May 2014

SearchCIO.com

CW Buyer's Guide: Data Security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This in-depth buyer's guide offers advice to CISOs on keeping up with security best practice as new EU data protection rules come into force
Posted: 14 Sep 2012 | Published: 05 Apr 2012

ComputerWeekly.com

Winning security use cases in the Computer Weekly European 2014 Awards
sponsored by ComputerWeekly.com
CASE STUDY: Warwick Ashford presents five IT security case studies selected from the winners of Computer Weekly's European User Awards.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

ComputerWeekly.com

Strengthening Data Privacy in PeopleSoft
sponsored by Approva Corporation
WHITE PAPER: Understanding the vulnerabilities of ERPs such as Peoplesoft can help your company mitigate the risk of data breaches. This white paper discusses how automated CPM solutions can help to fight the threat of data loss.
Posted: 09 May 2008 | Published: 01 Mar 2008

Approva Corporation

Upgrading Wireless Networks in the Hospital
sponsored by SearchHealthIT.com
EBOOK: In the next few years, hospitals will be rolling out all kinds of technology to improve patient care. Each of these devices and systems must be able to send and receive information instantly.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

SearchHealthIT.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement