Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Criminal Law  >   Crime  >  

Internet Piracy

RSS Feed   
Internet Piracy Reports
 
7 Key Factors to Software Protection
sponsored by Arxan
WHITE PAPER: This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
Posted: 08 Jun 2007 | Published: 01 Jun 2007

Arxan

CW500: Key trends for IT leaders in 2017 – technology trends
sponsored by ComputerWeekly.com
PRESENTATION: A look forward to the 12 months ahead for IT leaders and the key trends of the coming year - this presentation came from Spencer Izard, chief analyst in the enterprise advisory team at Ovum, discussing the major technology trends for this year.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

ComputerWeekly.com

UK police unlawfully processing over a million people's data on Microsoft 365
sponsored by ComputerWeekly.com
EGUIDE: The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

ComputerWeekly.com

CW ASEAN: European data law - be aware and prepare
sponsored by ComputerWeekly.com
EZINE: Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

ComputerWeekly.com

Discover the Unique Benefits of Enterprise Search Technology for Your Organization
sponsored by Google Search Appliance
EGUIDE: Read this e-guide and uncover how enterprise search technology is helping knowledge workers find relevant information quickly and easily. Learn about how enterprise search has positively impacted the content management applications market.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

Google Search Appliance

Networking Compliance
sponsored by DellEMC and Intel®
WHITE PAPER: This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

DellEMC and Intel®

ACOs: Treat Patients More Effectively with Health Analytics
sponsored by IBM
EGUIDE: This e-guide from SearchHealthIT.com highlights the importance of data analytics in the success of today's ACOs. Read now to learn the difference between collaborative and captive ACOs and discover how predictive analytics can provide the information necessary to dramatically improve patient care.
Posted: 29 Mar 2013 | Published: 29 Mar 2013

IBM

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

Do Your Employees Have the Freedom to Roam? CW Mobility E-Zine: January 2016
sponsored by ComputerWeekly.com
EZINE: In this issue of CW Europe, you will take an in-depth look at the major mobile roaming charge concern that is set to impact people across 28 European Union member states. Read on to see if the end of roaming charges will lead to more enterprises adopting video conferencing services.
Posted: 21 Jan 2016 | Published: 21 Jan 2016

ComputerWeekly.com

Storage strategies for the health IT professional
sponsored by EMC Isilon
PRESENTATION TRANSCRIPT: In this presentation transcript, Marc Staimer, president of Dragon Slayer Consulting, describes the basics of tiered storage architecture and demonstrates how health care organizations can set policies to automate the process of moving data to different tiers.
Posted: 31 Aug 2012 | Published: 31 Aug 2012

EMC Isilon
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2022, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences