Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Privacy Rights

RSS Feed   
ALSO CALLED: Trustmarks, Privacy Laws, Rights, Right of Privacy, Internet Privacy, Online Privacy, Web Privacy, Privacy
DEFINITION: On the Internet, privacy, a major concern of users, can be divided into these concerns:What personal information can be shared with whomWhether messages can be exchanged without anyone else seeing themWhether and how one can send messages anonymously Personal Information PrivacyMost Web users want to understand that personal information they share will not be shared with anyone else without their  … 

Privacy Rights definition sponsored by SearchDataManagement.com, powered by WhatIs.com an online computer dictionary
Privacy Rights Reports
1 - 25 of 92 Matches Previous Page  |  Next Page
Leaders & Laggards: The Latest Findings from the Ponemon Institute's Study on the Cyber Resilient Organization
sponsored by IBM
WEBCAST: In this webinar, Dr. Larry Ponemon will take you through the barriers of becoming cyber resilient and dive into report topics such as implementing automation, aligning privacy and cyber security, and what it takes to become a cyber resilient "High Performer" in 2019.
Posted: 20 Sep 2019 | Premiered: Sep 20, 2019

IBM

The Study on the Cyber Resilient Organization
sponsored by IBM
ANALYST REPORT: Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient's latest report. Download the report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture.
Posted: 19 Sep 2019 | Published: 30 Apr 2019

IBM

The State of Data Protection and Cloud
sponsored by Veritas
WHITE PAPER: As the enterprise data environment becomes more complex, so does the challenge of ensuring cost-effective, efficient data protection. In a recent survey, 250 IT executives discussed how they were providing comprehensive backup and recovery across their virtual, physical and multi-cloud environments. Download this white paper to learn more.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Veritas

Hype Cycle for Privacy, 2019
sponsored by TITUS
ANALYST REPORT: Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.
Posted: 11 Sep 2019 | Published: 11 Jul 2019

TITUS

The Titus Times: The CEO & CTO
sponsored by TITUS
RESOURCE: In this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

TITUS

Talkdesk GDPR Compliance
sponsored by Talkdesk
EBOOK: In this e-book, discover what steps Talkdesk has taken to ensure compliance with General Data Protection Regulation (GDPR). Get a comprehensive overview of Talkdesk personal data processing protocols, and review how Talkdesk ensures data security, controls third-party access to personal data, and more.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Talkdesk

Data Security for the Way People Work
sponsored by Dell
WHITE PAPER: Data security is at the top of the priority list for most organizations. The dangers of data loss, extortion and identity theft are real. In this white paper, learn how IT leaders can implement security strategies that keep data safe while enabling productivity and collaboration without compromising the user experience.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Dell

Is Microsoft O365 Good Enough Protection & Recovery Webinar?
sponsored by Mimecast
WEBCAST: Many organizations are asking themselves, "Is Microsoft Office 365 good enough protection and recovery?" According to Gartner, investing in third-party tools for "faster, more-flexible recovery options" is a good idea. In this webinar, Shane Harris and Glenn Brown of Mimecast discuss where your biggest risks are and how to mitigate them.
Posted: 01 Aug 2019 | Premiered: Aug 1, 2019

Mimecast

How to Secure the Human Link
sponsored by Mimecast
ANALYST REPORT: Security and risk management leaders must provide security awareness training to ensure employees protect the enterprises' data and intellectual property. But, finding the best way to do this can be difficult. In this Gartner research report, explore 3 best practices to develop and maintain a cybersecure workforce.
Posted: 31 Jul 2019 | Published: 02 May 2018

Mimecast

Computer Weekly – 23 July 2019: How Apollo 11 influenced modern computing
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, on the 50th anniversary of the Moon landings we look at the influence Apollo 11 had on modern hardware and software. Our latest buyer's guide examines data protection. And we find out how retailers with physical stores are using technology to respond to the rise of online shopping. Read the issue now.
Posted: 19 Jul 2019 | Published: 23 Jul 2019

ComputerWeekly.com

CW ANZ: Trend Watch – Security
sponsored by ComputerWeekly.com
EZINE: With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
Posted: 11 Jul 2019 | Published: 18 Jul 2019

ComputerWeekly.com

Computer Weekly – 9 July 2019: Steering a voyage to the cloud at Maersk
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how the world's largest shipping company, Maersk, is steering a course to public cloud. We analyse SAP's latest attempts to ease customers' software licensing concerns. And we hear how one London borough, Hackney, is taking a lead in transforming digital government across the capital. Read the issue now.
Posted: 08 Jul 2019 | Published: 09 Jul 2019

ComputerWeekly.com

Computer Weekly – 11 June 2019: Are schools delivering on digital skills?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the differing approaches to teaching computer science across the UK and assess the pros and cons of each. Our latest buyer's guide examines the technologies and best practices of multicloud environments. And we find out what you get for your money when buying cyber insurance. Read the issue now.
Posted: 07 Jun 2019 | Published: 11 Jun 2019

ComputerWeekly.com

Are Your People Sharing Too Much Information?
sponsored by BT
RESOURCE: What is published on the internet may be there forever, and in the wrong hands this open source intelligence could be used against you. In this article, explore 3 steps organizations can take to help prevent sensitive company data form being unintentionally shared.
Posted: 07 Jun 2019 | Published: 31 May 2019

BT

Case Study: CIO interview - Stephen Docherty on NHS data sharing
sponsored by ComputerWeekly.com
EGUIDE: The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why
Posted: 09 May 2019 | Published: 09 May 2019

ComputerWeekly.com

Hitachi ID Privileged Access Management
sponsored by Hitachi ID
WHITE PAPER: This white paper identifies why it is essential for public and private sector organizations to select an integrated PAM platform that can secure all types of privileged access. Read on to learn more.
Posted: 02 May 2019 | Published: 02 May 2019

Hitachi ID

PCI and GDPR Data Protection Requirements Met with Zero Downtime
sponsored by Comforte AG
WHITE PAPER: Bankart is a card payments processing center which has several files and databases in their network that contain cardholder data, all of which need to be protected from threats. In this case study, learn how Bankart was able to protect the sensitive data by using comforte's SecurDPS.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Comforte AG

PCI DSS as a Foundation
sponsored by Comforte AG
WHITE PAPER: There are many risks to personal and cardholder data. However, the GDPR and PCI DSS provide a clear roadmap on how organizations can most effectively protect that data. In this white paper, learn how to take advantage of the overlap between GDPR and PCI DSS to improve your overall data security strategy.
Posted: 15 Apr 2019 | Published: 15 Apr 2019

Comforte AG

Carnival Navigates Sea of Data With Splunk
sponsored by Splunk
CASE STUDY: In this case study, learn how Carnival Corporation deployed the Splunk platform to increase visibility across all systems, secure shipboard systems and protect customer data. Since deploying Splunk, Carnival has seen many benefits.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

Metropolitan Police Freedom of Information disclosure on investigations into WikiLeaks
sponsored by ComputerWeekly.com
RESOURCE: Letter from the Met Police to Stefania Maurizi, an investigative journalist with Italy's La Repubblica newspaper, confirming that the police service shared correspondence about one or more of three named WikiLeaks British editorial staff with the US Department of Justice. The letter is a response to a freedom of information request by Maurizi.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

ComputerWeekly.com

Data Protection by the Numbers
sponsored by Veeam Software
EBOOK: In this online edition of the popular For Dummies series of reference books, learn how to speak the language of business execs in order to better justify the operational and financial benefits of data protection initiatives.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Veeam Software

How to Prepare for the California Consumer Privacy Act
sponsored by TechTarget
RESOURCE: The California Consumer Privacy Act will go into effect January 1, 2020 and organizations should start preparing. In our new guide, 2019 Roadmap to the California Privacy Laws, uncover 4 steps that can help organizations get started. To access this guide, participate in our Network Security survey now.
Posted: 09 Feb 2019 | Published: 03 Oct 2019

TechTarget

Splunk 2019 Predictions
sponsored by Splunk
WHITE PAPER: We're always at the cusp of the next big thing or moments away from the next technological change that will affect us. In this white paper, learn about the top predictions for AI, Security, IT Ops and IoT for 2019. The list of predictions for 2019 will give you a better understanding of what you'll see coming this year.
Posted: 20 Dec 2018 | Published: 20 Dec 2018

Splunk

The difficulties of defending against web tracking
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series introduces you to web tracking, provides an overview of how organisations track users and discusses a few of the difficulties you may face when trying to defend against tracking.
Posted: 22 May 2018 | Published: 22 May 2018

ComputerWeekly.com

GDPR: 10 essential facts you need to know
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we give you the top 10 key facts you need to know about the General Data Protection Regulation according to privacy lawyer and KuppingerCole analyst, Karsten Kinast. Taken from the European Identity & Cloud Conference in 2016.
Posted: 18 May 2018 | Published: 18 May 2018

ComputerWeekly.com
1 - 25 of 92 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement