IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Sensitive Personal Data

RSS Feed    Add to Google    Add to My Yahoo!
Sensitive Personal Data Reports
 
Case Study: How Atom Bank Used CEM To Become The UK's First All-Digital Bank
sponsored by Genesys
VIDEO: In the digital age, it's become necessary for businesses to constantly rework and reimagine how they interact with their customers. In this case study, learn how Atom Bank became the UK's first all-digital bank. Discover how customer experience technology was implemented to allow customers to communicate using voice, chat, email or social media.
Posted: 27 Feb 2017 | Premiered: 27 Feb 2017

Genesys

The 2017 SAP Hybris Consumer Insights Report: Thailand
sponsored by SAP Hybris
RESOURCE: Learn about the latest trends in customers' behavior in Thailand, from their expectations to the channels they seek out most, and uncover 5 ways to win customers' hearts.
Posted: 29 Aug 2017 | Published: 29 Aug 2017

SAP Hybris

2017 Consumer Insights Survey, Singapore
sponsored by SAP Hybris
RESEARCH CONTENT: Learn about the latest trends in customers' behavior in Singapore, from their expectations to the channels they seek out most, and uncover 5 ways to win customers' hearts.
Posted: 28 Aug 2017 | Published: 28 Aug 2017

SAP Hybris

10 Tips to Thrive in the Subscription Economy
sponsored by Adyen
WHITE PAPER: Learn 10 tips to thrive in the subscription economy so that you can improve customer experiences and discover a payment platform designed to help you optimize growth across online, in-app, and in-store channels.
Posted: 18 Oct 2017 | Published: 18 Oct 2017


The business impact of data security regulations: Featuring Massachusetts
sponsored by Sophos, Inc.
WHITE PAPER: This article discusses some aspects of a new regulation -- 201 CMR 17:00 -- and offers suggestions on how data security best practices can help with compliance. Companies should discuss the regulation in detail with their legal consul to examine how it affects their unique circumstances and the best course of action to be taken.
Posted: 11 Aug 2009 | Published: 11 Jun 2009

Sophos, Inc.

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance
sponsored by Linoma Software
CASE STUDY: In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Linoma Software

Big Data and Personal Data Lead to the Internet's Most Surprising Consumer Products
sponsored by SAP
WHITE PAPER: In this report from the MIT Technology Review, discover 10 must-read articles about the relationship between personal data and big data. Find out how companies are leveraging customer information and the pros and cons of releasing personal data via the Web or otherwise.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

SAP

Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER: Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

Code Green Networks, Inc.

Lessons Learned: Top Reasons for PCI Audit Failure and How to Avoid Them
sponsored by VeriSign, Inc
WHITE PAPER: The drive to protect credit card data is vital, but many companies have yet to implement technologies and processes needed to address Payment Card Industry (PCI) compliance. This white paper examines top reasons for PCI failure and how to avoid them.
Posted: 21 Nov 2006 | Published: 01 Jul 2006

VeriSign, Inc

15 Minutes to Complete Data Protection
sponsored by CipherOptics
WHITE PAPER: Increasingly, data is the most important asset a company owns. Protecting this data used to mean costly configurations that resulted in increased latency and network speed. This paper examines ways to protect this valuable data in just 15 minutes.
Posted: 13 Mar 2006 | Published: 31 Dec 2005

CipherOptics
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement