Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Privacy Laws

RSS Feed   
Privacy Laws Reports
 
Earning consumer trust in big data: a European perspective
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from DLA Piper and the Boston Consulting Group Regulatory explains the fundamentally different approaches and attitudes towards data privacy in the world's three largest markets, and offers advice to businesses on how to earn the trust of consumers.
Posted: 29 Apr 2015 | Published: 29 Apr 2015

ComputerWeekly.com

The Study on the Cyber Resilient Organization
sponsored by IBM
ANALYST REPORT: Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient's latest report. Download the report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture.
Posted: 19 Sep 2019 | Published: 30 Apr 2019

IBM

The Human Face of Big Data: Data Driven
sponsored by ComputerWeekly.com
BOOK: Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Leaders & Laggards: The Latest Findings from the Ponemon Institute's Study on the Cyber Resilient Organization
sponsored by IBM
WEBCAST: In this webinar, Dr. Larry Ponemon will take you through the barriers of becoming cyber resilient and dive into report topics such as implementing automation, aligning privacy and cyber security, and what it takes to become a cyber resilient "High Performer" in 2019.
Posted: 20 Sep 2019 | Premiered: Sep 20, 2019

IBM

Forrester Report: Tackle The California Consumer Privacy Act Now
sponsored by IBM
ANALYST REPORT: With the adoption of the California Consumer Privacy Act (CCPA), California has once again taken the initiative among US states to lead on privacy. In less than 1 year, regulators in California will start enforcing the requirements of the CCPA. In this Forrester report, explore the main steps companies must take to kick off their CCPA preparation.
Posted: 23 Oct 2019 | Published: 08 Feb 2019

IBM

Winning security use cases in the Computer Weekly European 2014 Awards
sponsored by ComputerWeekly.com
CASE STUDY: Warwick Ashford presents five IT security case studies selected from the winners of Computer Weekly's European User Awards.
Posted: 17 Nov 2014 | Published: 17 Nov 2014

ComputerWeekly.com

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 19 Nov 2019 | Published: 19 Nov 2019

ComputerWeekly.com

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

IBM InfoSphere Guardium Data Redaction
sponsored by IBM
WHITE PAPER: InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.
Posted: 13 Apr 2011 | Published: 13 Apr 2011

IBM

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement