Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Web Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Web Privacy Reports
 
NSA insiders reveal what went wrong
sponsored by ComputerWeekly.com
EBRIEF: Former NSA employees explain how the agency missed vital intelligence on 9/11, broke the US constitution through mass surveillance against US citizens, and wasted billions of dollars on technology.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

ComputerWeekly.com

De-risking IT Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.
Posted: 23 Nov 2012 | Published: 23 Nov 2012

ComputerWeekly.com

How to manage data privacy
sponsored by ComputerWeekly.com
WHITE PAPER: Data privacy refers to the evolving relationship between technology and the legal right to, or public expectation of, privacy in the collection,  storing, management and sharing of data.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

Governance, Risk Management and Compliance (GRC)
sponsored by ComputerWeekly.com
ANALYST REPORT: Ensuring that all the stakeholders' information needs are met  requires a holistic approach to managing information – the creation of a GRC platform, say analysts Clive Longbottom and Rob Bamforth.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Computer Weekly – 30 July 2013: The threat within – balancing security and employee privacy
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as more data breaches come from inside an organisation, we examine how to balance information security and employee privacy. Tech City CEO Joanna Shields talks about the opportunity for CIOs from working with startups. And we look at how mobile technology can help improve patient care in the NHS. Read the issue now.
Posted: 29 Jul 2013 | Published: 30 Jul 2013

ComputerWeekly.com

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

Successfully Negotiating the HIPAA Maze - A Sybase, Inc. Healthcare Report on Complying with Administrative Simplification & Security Mandates
sponsored by Sybase, an SAP company
WHITE PAPER: This white paper explores the challenges healthcare organizations are facing with the Healthcare Information Portability and Accountability Act (HIPAA) and the steps needed to successfully negotiate the many aspects of the regulations.
Posted: 02 Jun 2002 | Published: 01 Jan 2002

Sybase, an SAP company

Top 10 Best Practices for Email Archiving
sponsored by ZANTAZ
WHITE PAPER: Email archive software can address a number of issues from compliance to electronic discovery to storage concerns. This checklist outlines the common mistakes made by administrators when researching, implementing and managing email archive solutions.
Posted: 03 Oct 2006 | Published: 03 Oct 2006

ZANTAZ
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement