Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Privacy Rights

RSS Feed   
ALSO CALLED: Trustmarks, Privacy Laws, Rights, Right of Privacy, Internet Privacy, Online Privacy, Web Privacy, Privacy
DEFINITION: On the Internet, privacy, a major concern of users, can be divided into these concerns:What personal information can be shared with whomWhether messages can be exchanged without anyone else seeing themWhether and how one can send messages anonymously Personal Information PrivacyMost Web users want to understand that personal information they share will not be shared with anyone else without their  … 

Privacy Rights definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary
Privacy Rights Reports
1 - 25 of 108 Matches Previous Page  |  Next Page
Key Steps in Satisfying Your CCPA and Other Privacy Obligations
sponsored by PerimeterX
WHITE PAPER: In order to avoid the severe financial, legal and reputational penalties that can apply to companies fail to meet regulations, organizations need to ensure that their data protection strategy is fine-tuned for 2020. In this Osterman Research report, uncover key steps your organization needs to take to prepare for the CCPA.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

PerimeterX

California Consumer Privacy Act: The Need for Data-Centric Security
sponsored by Comforte AG
WHITE PAPER: CCPA is one of the latest in a series of new privacy regulations globe that affects businesses and comes with significant penalties. This whitepaper outlines the key steps necessary to prepare for CCPA and highlights the importance of data-centric security to ensure your organization is adequately prepared for 2020.
Posted: 13 Dec 2019 | Published: 30 Nov 2019

Comforte AG

Addressing CCPA: Legacy ERP and Data Privacy Compliance
sponsored by Appsian
PRODUCT OVERVIEW: With the 2020 launch date for CCPA looming, organizations are scrambling to ensure they have appropriate security measures in place. In this solution brief, highlight the gaps within current security capabilities and explore how organizations can enhance their legacy ERP apps to ensure CCPA compliance.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

Appsian

The New Era of Personal Data Privacy Policy
sponsored by ServiceNow
EGUIDE: GDPR and CCPA are changing the way organizations can use customer data by giving the power back to the individual. In this e-guide, Dimitri Sirota, CEO and co-founder of BigID, addresses some of the key issues that organizations are facing in the era of data access rights. Read on to key into the insights of an industry expert.
Posted: 20 Nov 2019 | Published: 15 Nov 2019

ServiceNow

A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 19 Nov 2019 | Published: 19 Nov 2019

ComputerWeekly.com

State of GDPR in mainland Europe
sponsored by ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

ComputerWeekly.com

Client Insights on Data Protection with IBM Security Guardium
sponsored by IBM
ANALYST REPORT: How do organizations protect their data from persistent, sophisticated and well-funded attackers? Ponemon Institute's latest survey of current IBM Security Guardium clients shows how the Guardium platform has improved organizations' ability to protect their data. Download the report to explore key findings.
Posted: 13 Nov 2019 | Published: 31 Aug 2019

IBM

Access Management is Essential for Cloud Transformation
sponsored by Thales
RESOURCE: This infographic highlights some of the key takeaways from the 2019 Thales Access Management Index. Continue reading to uncover the key takeaways as they relate to top access management tools, the role of data breaches in access management adoption & other significant statistics.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Thales

The Changing Face of Data Security in Europe
sponsored by Thales
RESOURCE: Take a glimpse at the results from the 2019 Thales Data Threat Report – European Edition. This infographic shares some key statistics from the research findings, including the use of sensitive data, multi-cloud environments & the effects of GDPR and other data privacy laws.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Thales

The CISO’s Handbook for Certificate Management
sponsored by AppViewX
WHITE PAPER: Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018
sponsored by ComputerWeekly.com
RESOURCE: David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
sponsored by ComputerWeekly.com
RESOURCE: This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Declaration by David Godkin with 218 exhibits – 17 May 2018
sponsored by ComputerWeekly.com
RESOURCE: A declaration by David Godkin, counsel for app developer Six4Three, producing 218 exhibits. The exhibits cover a wide range of material relating to Facebook, including news cuttings, press releases and blog posts. The exhibits present a timeline of what was publicly known and when.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018
sponsored by ComputerWeekly.com
RESOURCE: The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

ComputerWeekly.com

Executive Summary 2019 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: European enterprises are moving quickly to adopt and deploy transformative technologies to increase their efficiency, while also introducing new risks. Technology changes & data privacy laws are forcing companies to rethink how they provide data security. View this report for top data concerns and threat mitigations in 2019.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Thales

Securing Cloud environments: Five Data Encryption best practices to help reduce your risk
sponsored by IBM
WHITE PAPER: It is just as critical to protect sensitive cloud-based data as it is on-premises data. One way to do this is through data encryption. However, encryption is often complicated and difficult to implement and change. This paper looks at 5 best practices for securing data in multi-cloud environments using the latest data encryption technologies.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

IBM

IBM Security Guardium Analyzer Overview Demo
sponsored by IBM
WEBCAST: Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.
Posted: 28 Oct 2019 | Premiered: Feb 26, 2019

IBM

IBM Security Guardium Analyzer Overview Demo
sponsored by IBM
WEBCAST: Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.
Posted: 28 Oct 2019 | Premiered: Feb 26, 2019

IBM

Forrester Report: Tackle The California Consumer Privacy Act Now
sponsored by IBM
ANALYST REPORT: With the adoption of the California Consumer Privacy Act (CCPA), California has once again taken the initiative among US states to lead on privacy. In less than 1 year, regulators in California will start enforcing the requirements of the CCPA. In this Forrester report, explore the main steps companies must take to kick off their CCPA preparation.
Posted: 23 Oct 2019 | Published: 08 Feb 2019

IBM

IBM Security Guardium Analyzer Data Sheet
sponsored by IBM
PRODUCT OVERVIEW: In today’s digital world, data is our most complex and critical asset. It runs our businesses making it not only crucial to the organizations that store it, but also a high value target to malicious actors. In this brief, learn how IBM Security Guardium Analyzer can help organizations get started on their data security and compliance journeys.
Posted: 22 Oct 2019 | Published: 22 Oct 2019

IBM

Government insists 'nothing sinister' about web user data gathering
sponsored by ComputerWeekly.com
EGUIDE: Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.
Posted: 22 Oct 2019 | Published: 22 Oct 2019

ComputerWeekly.com

Leaders & Laggards: The Latest Findings from the Ponemon Institute's Study on the Cyber Resilient Organization
sponsored by IBM
WEBCAST: In this webinar, Dr. Larry Ponemon will take you through the barriers of becoming cyber resilient and dive into report topics such as implementing automation, aligning privacy and cyber security, and what it takes to become a cyber resilient "High Performer" in 2019.
Posted: 20 Sep 2019 | Premiered: Sep 20, 2019

IBM

The Study on the Cyber Resilient Organization
sponsored by IBM
ANALYST REPORT: Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient's latest report. Download the report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture.
Posted: 19 Sep 2019 | Published: 30 Apr 2019

IBM

Hype Cycle for Privacy, 2019
sponsored by TITUS
ANALYST REPORT: Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.
Posted: 11 Sep 2019 | Published: 11 Jul 2019

TITUS

The Titus Times: The CEO & CTO
sponsored by TITUS
RESOURCE: In this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

TITUS
1 - 25 of 108 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement