Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Privacy Rights

RSS Feed   
ALSO CALLED: Trustmarks, Privacy Laws, Rights, Right of Privacy, Internet Privacy, Online Privacy, Web Privacy, Privacy
DEFINITION: On the Internet, privacy, a major concern of users, can be divided into these concerns:What personal information can be shared with whomWhether messages can be exchanged without anyone else seeing themWhether and how one can send messages anonymously Personal Information PrivacyMost Web users want to understand that personal information they share will not be shared with anyone else without their  … 

Privacy Rights definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary
Privacy Rights Reports
1 - 25 of 87 Matches Previous Page  |  Next Page
Security Powered by Understanding
sponsored by Armorblox
PRODUCT OVERVIEW: Social engineering has become the top attack vector for stealing data, and even experienced users struggle to mitigate these risks. Traditional DLP solutions are ineffective in detecting such risks because they lack context. In this brief, learn how Armorblox brings contextual understanding to security.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Armorblox

The Difference Between Format-Preserving Encryption and Tokenization
sponsored by Comforte AG
RESOURCE: Format-preserving encryption (FPE) and tokenization have similar objectives, but the difference between the 2 can be confusing at times. Download this resource for a brief overview of both the similarities and differences between these 2 data-centric security methods. Also, explore examples of when 1 method might be used instead of the other.
Posted: 06 Aug 2019 | Published: 06 Aug 2019

Comforte AG

Is Microsoft O365 Good Enough Protection & Recovery Webinar?
sponsored by Mimecast
WEBCAST: Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

How to Secure the Human Link
sponsored by Mimecast
ANALYST REPORT: Security and risk management leaders must provide security awareness training to ensure employees protect the enterprises' data and intellectual property. But, finding the best way to do this can be difficult. In this Gartner research report, explore 3 best practices to develop and maintain a cybersecure workforce.
Posted: 31 Jul 2019 | Published: 02 May 2018

Mimecast

Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.
Posted: 19 Jul 2019 | Published: 23 Jul 2019

ComputerWeekly.com

CW ANZ: Trend Watch – Security
sponsored by ComputerWeekly.com
EZINE: With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
Posted: 11 Jul 2019 | Published: 18 Jul 2019

ComputerWeekly.com

Computer Weekly – 9 July 2019: Steering a voyage to the cloud at Maersk
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the world's largest shipping company, Maersk, is steering a course to public cloud. We analyse SAP's latest attempts to ease customers' software licensing concerns. And we hear how one London borough, Hackney, is taking a lead in transforming digital government across the capital. Read the issue now.
Posted: 08 Jul 2019 | Published: 09 Jul 2019

ComputerWeekly.com

Computer Weekly – 11 June 2019: Are schools delivering on digital skills?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.
Posted: 07 Jun 2019 | Published: 11 Jun 2019

ComputerWeekly.com

Are Your People Sharing Too Much Information?
sponsored by BT
RESOURCE: What is published on the internet may be there forever, and in the wrong hands this open source intelligence could be used against you. In this article, explore 3 steps organizations can take to help prevent sensitive company data form being unintentionally shared.
Posted: 07 Jun 2019 | Published: 31 May 2019

BT

California Consumer Privacy Act and the Role of IAM
sponsored by WSO2, Inc.
VIDEO: Tune into this webinar to explore the basics of the California Consumer Privacy Act (CCPA) as well as how enterprises can prepare for it, the difference between GDPR and CCPA, and how IAM can help with CCPA and other privacy regulations.
Posted: 14 May 2019 | Premiered: 14 May 2019

WSO2, Inc.

Case Study: CIO interview - Stephen Docherty on NHS data sharing
sponsored by ComputerWeekly.com
EGUIDE: The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why
Posted: 09 May 2019 | Published: 09 May 2019

ComputerWeekly.com

Hitachi ID Privileged Access Management
sponsored by Hitachi ID
WHITE PAPER: This white paper identifies why it is essential for public and private sector organizations to select an integrated PAM platform that can secure all types of privileged access. Read on to learn more.
Posted: 02 May 2019 | Published: 02 May 2019

Hitachi ID

PCI and GDPR Data Protection Requirements Met with Zero Downtime
sponsored by Comforte AG
WHITE PAPER: Bankart is a card payments processing center which has several files and databases in their network that contain cardholder data, all of which need to be protected from threats. In this case study, learn how Bankart was able to protect the sensitive data by using comforte's SecurDPS.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Comforte AG

PCI DSS as a Foundation
sponsored by Comforte AG
WHITE PAPER: There are many risks to personal and cardholder data. However, the GDPR and PCI DSS provide a clear roadmap on how organizations can most effectively protect that data. In this white paper, learn how to take advantage of the overlap between GDPR and PCI DSS to improve your overall data security strategy.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Comforte AG

Carnival Navigates Sea of Data With Splunk
sponsored by Splunk
CASE STUDY: In this case study, learn how Carnival Corporation deployed the Splunk platform to increase visibility across all systems, secure shipboard systems and protect customer data. Since deploying Splunk, Carnival has seen many benefits.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks
sponsored by ComputerWeekly.com
RESOURCE: Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

ComputerWeekly.com

Data Protection by the Numbers
sponsored by Veeam Software
EBOOK: It is critical for companies to gain an understanding of and a formulaic approach to quantifying technical recovery capabilities, business impacts, and financial concerns related to data protection. In this eBook, learn about the 3 different "languages" of data protection.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Veeam Software

Splunk 2019 Predictions
sponsored by Splunk
WHITE PAPER: We're always at the cusp of the next big thing or moments away from the next technological change that will affect us. In this white paper, learn about the top predictions for AI, Security, IT Ops and IoT for 2019. The list of predictions for 2019 will give you a better understanding of what you'll see coming this year.
Posted: 20 Dec 2018 | Published: 20 Dec 2018

Splunk

The difficulties of defending against web tracking
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
Posted: 22 May 2018 | Published: 22 May 2018

ComputerWeekly.com

Data protection & compliance for Australian/New Zealand businesses
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about the state of data breaches in Australia and what firms need to do to stay on the right side of new data breach notification regulations coming into force in Australia and globally.
Posted: 03 May 2018 | Published: 04 May 2018

ComputerWeekly.com

CW Benelux May 2018
sponsored by ComputerWeekly.com
EZINE: GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.
Posted: 01 May 2018 | Published: 01 May 2018

ComputerWeekly.com

Marketing analytics, big data and ethics
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we discuss the how important respecting the data privacy of customers and prospective customers is for companies trying to make a profit.  For commercial organisations, finding this ethical balance between making money from data and safeguarding the privacy of personal data is more important than ever thanks to the EU's GDPR.
Posted: 03 Apr 2018 | Published: 03 Apr 2018

ComputerWeekly.com

Gamma International: The Macedonia files
sponsored by ComputerWeekly.com
RESOURCE: This PDF download contains source documents showing how the UK approved export licences to Gamma International UK to supply sophisticated mobile phone surveillance equipment, known as IMSI catchers, to the Republic of Macedonia.
Posted: 23 Nov 2017 | Published: 23 Nov 2017

ComputerWeekly.com

The APAC Guide to Data Protection & GDPR
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, learn more about what governments in APAC are doing to keep companies on their toes in securing personal data, what organisations can do to stem potential data issues and the implications of the European Union's upcoming General Data Protection Regulation (GDPR) on businesses in the region.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

ComputerWeekly.com

GDPR: 10 essential facts you need to know
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we give you the top 10 key facts you need to know about the General Data Protection Regulation according to privacy lawyer and KuppingerCole analyst, Karsten Kinast. Taken from the European Identity & Cloud Conference in 2016.
Posted: 18 May 2018 | Published: 18 May 2018

ComputerWeekly.com
1 - 25 of 87 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement