Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Web Privacy

RSS Feed   
Web Privacy White Papers (View All Report Types)
 
CCPA Readiness Checklist
sponsored by BigID
WHITE PAPER: As of January 1, 2020, the CCPA has come into effect. Given the steep penalties for failing to comply, organizations should make certain that they’re positioned to responsibly safeguard customer data. Use this comprehensive checklist to ensure your organization meets the requirements of California’s new data privacy regulation.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

BigID

How to manage data privacy
sponsored by ComputerWeekly.com
WHITE PAPER: Data privacy refers to the evolving relationship between technology and the legal right to, or public expectation of, privacy in the collection,  storing, management and sharing of data.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

The CISO’s Handbook for Certificate Management
sponsored by AppViewX
WHITE PAPER: Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

Executive Summary 2019 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: European enterprises are moving quickly to adopt and deploy transformative technologies to increase their efficiency, while also introducing new risks. Technology changes & data privacy laws are forcing companies to rethink how they provide data security. View this report for top data concerns and threat mitigations in 2019.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Thales

Hitachi ID Privileged Access Management
sponsored by Hitachi ID
WHITE PAPER: This white paper identifies why it is essential for public and private sector organizations to select an integrated PAM platform that can secure all types of privileged access. Read on to learn more.
Posted: 02 May 2019 | Published: 02 May 2019

Hitachi ID

Safeguarding Your Data with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: The need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
sponsored by IBM
WHITE PAPER: This resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
Posted: 27 Feb 2014 | Published: 28 Feb 2013

IBM

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine

Knowledge is Power
sponsored by IBM
WHITE PAPER: Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info