Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Regulatory Compliance

RSS Feed   
ALSO CALLED: Compliance (Law), Legal Compliance, Security Compliance, Compliance (Security)
DEFINITION: Conformance testing, also known as compliance testing, is a methodology used in engineering to ensure that a product, process, computer program or system meets a defined set of standards. These standards are commonly defined by large, independent entities such as the Institute of Electrical and Electronics Engineers (IEEE), the World Wide Web Consortium (W3C) or the European Telecommunications Standards  … 

Regulatory Compliance definition sponsored by SearchSoftwareQuality.com, powered by WhatIs.com an online computer dictionary
Regulatory Compliance Reports
1 - 25 of 414 Matches Previous Page  |  Next Page
Addressing CCPA: Legacy ERP and Data Privacy Compliance
sponsored by Appsian
PRODUCT OVERVIEW: With the 2020 launch date for CCPA looming, organizations are scrambling to ensure they have appropriate security measures in place. In this solution brief, highlight the gaps within current security capabilities and explore how organizations can enhance their legacy ERP apps to ensure CCPA compliance.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

Appsian

Computer Weekly - 5 November 2019: The benefits of API-first software development
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how organisations are using an API-based approach to software development to boost digital initiatives. We examine the potential pitfalls in using cloud storage. And we talk to the Department for Work and Pensions about its four-year project to move from outsourced IT to the cloud. Read the issue now.
Posted: 01 Nov 2019 | Published: 05 Nov 2019

ComputerWeekly.com

Computer Weekly – 15 October 2019: Securing the internet of things
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as security concerns prevent many organisations from adopting the internet of things, we examine mitigation strategies. Many firms are still struggling with GDPR policies – we assess if full compliance is ever possible. And we look at the technologies for delivering on-premise object storage. Read the issue now.
Posted: 14 Oct 2019 | Published: 15 Oct 2019

ComputerWeekly.com

3 Ethical and Legal Considerations for Patient Privacy and Data Security
sponsored by FairWarning
WHITE PAPER: Download this white paper to find out how AI can transform healthcare's privacy and security space and empower better decision-making and patient trust.
Posted: 23 Jul 2019 | Published: 23 Jul 2019

FairWarning

Addressing Drug Diversion in Healthcare: Where Do I Start?
sponsored by FairWarning
WHITE PAPER: Download this white paper to learn more about the current drug diversion landscape and the overall effects of drug diversion on the patient, provider and drug diverter. You'll also uncover 9 steps to create a full-lifecycle drug diversion monitoring program.
Posted: 23 Jul 2019 | Published: 23 Jul 2019

FairWarning

Patient Privacy Intelligence: The Intersection of Compliance, Legal and Information Security
sponsored by FairWarning
WHITE PAPER: Download this white paper to explore the critical capabilities of a patient privacy intelligence tool required to meet the business and technical demands of modern care providers for regulatory compliance and information security.
Posted: 23 Jul 2019 | Published: 23 Jul 2019

FairWarning

Consolidating Risk Management and Regulatory Compliance Applications Using a Unified Data Platform
sponsored by InterSystems
WHITE PAPER: More comprehensive and unified data platforms have come out in recent years—greatly simplifying governance and compliance. Businesses should be aware of the operational risk reduction that comes with these modern options—learn more here.
Posted: 15 May 2019 | Published: 31 Dec 2018

InterSystems

Getting Started with eLearning: Eight Questions to Consider
sponsored by SumTotal
WHITE PAPER: What are the benefits of e-learning, and how can you get started? In this white paper, uncover 8 questions you should be asking to develop your learning strategy, and discover how to choose the best e-learning platform for your organization.
Posted: 15 Feb 2019 | Published: 15 Feb 2019

SumTotal

Reduce Compliance Risk with Information Governance
sponsored by Alfresco Software
EBOOK: Read this e-book to learn best practices for invisibly embedding information governance into your ECM system and content-driven processes to keep compliance risk properly managed.
Posted: 11 Jan 2019 | Published: 31 Dec 2018

Alfresco Software

Building a Modern Information Governance Strategy
sponsored by Mimecast
WHITE PAPER: With increasing data volumes, stringent legal and regulatory requirements, and an increased threat of breaches, organizations are having to rethink their information governance strategies. Read on, and see if your archiving strategies can survive the challenges of a shifting information management landscape.
Posted: 14 Dec 2018 | Published: 14 Dec 2018

Mimecast

Is Your Old-Fashioned Information Management Strategy Holding You Back?
sponsored by Mimecast
WEBCAST: Why are businesses abandoning their legacy information management strategies? In this webinar, CEO of Contoural, Mark Diamond, addresses how the information landscape has changed with evolving record-keeping requirements. Find out what you can do to plunge ahead if your business is being held back by archaic information management strategies.
Posted: 13 Dec 2018 | Premiered: Dec 13, 2018

Mimecast

Computer Weekly – 3 July 2018: Future-proofing Gatwick Airport's technology
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at London Gatwick Airport and talk to its CIO about a critical network upgrade to support passenger growth. Our latest buyer's guide examines automation and intelligent systems management. And we assess the latest technologies for boosting storage performance. Read the issue now.
Posted: 29 Jun 2018 | Published: 29 Jun 2018

ComputerWeekly.com

GDPR: Risk, opportunity and what it means for security professionals
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
Posted: 10 May 2018 | Published: 10 May 2018

ComputerWeekly.com

MicroScope - July 2017: Data and storage are the themes, with GDPR and flash up for debate
sponsored by MicroScope
EZINE: An e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know.
Posted: 30 Jun 2017 | Published: 30 Jun 2017

MicroScope

Driving big data & analytics adoption in ASEAN
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, learn how Singapore's central bank as well as universities and research facilities are driving the adoption of analytics and data science, and how SAS is prepping its marketers for the data flood.
Posted: 28 Jun 2017 | Published: 29 Jun 2017

ComputerWeekly.com

Big Data Analytics: How to work smarter with data-driven insights
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, learn about the state of adoption of data analytics in Australia, how Commonwealth Bank is making analytics tools more accessible to small companies and how SAS is prepping its marketers for the data flood.
Posted: 02 Jun 2017 | Published: 02 Jun 2017

ComputerWeekly.com

E-Discovery:How CloudBasedStrategiesAre Changingthe World of Law
sponsored by Mimecast
EGUIDE: Download this e-guide to learn how e-discovery is conquering containerized data with comprehensive cloud-based strategies, and explore how e-discovery's existence has changed the world of law through collaboration.
Posted: 18 Dec 2018 | Published: 10 Dec 2018

Mimecast

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

Records Management Strategies to Maintain Regulatory Compliance
sponsored by SearchCompliance.com
EBOOK: Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
Posted: 04 Apr 2017 | Published: 04 Apr 2017

SearchCompliance.com

Computer Weekly – 25 August 2015: Coping with a crisis
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, IT leaders discuss their experiences of dealing with disaster and the importance of planning to ensure business continuity. Jaeger's CIO talks about bring the iconic fashion brand into the digital age. And we look at the issues around writing supplier contracts for agile software development. Read the issue now.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

ComputerWeekly.com

Records Management Strategies to Maintain Regulatory Compliance
sponsored by SearchCompliance.com
EBOOK: Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
Posted: 16 Apr 2015 | Published: 16 Apr 2015

SearchCompliance.com

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

IDC Flash: IBM Releases IAM for Mobile, Cloud and Enterprise
sponsored by IBM
WHITE PAPER: Gain insights into IBM's threat-aware IAM solutions focused on enabling identity as the new security perimeter.
Posted: 09 Oct 2014 | Published: 29 Nov 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM
1 - 25 of 414 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement