Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Right of Privacy

RSS Feed   
Right of Privacy Reports
 
Hype Cycle for Privacy, 2019
sponsored by TITUS
ANALYST REPORT: Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.
Posted: 11 Sep 2019 | Published: 11 Jul 2019

TITUS

Are we trusting social networks too much?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series sheds an often uncomfortable light on the privacy risks people incur by using social media, and offers advice on how to minimise those risks
Posted: 31 Jan 2017 | Published: 31 Jan 2017

ComputerWeekly.com

Presentation: The BBC’s Unified Communications Strategy
sponsored by ComputerWeekly.com
PRESENTATION: Steve Shepherd, head of IT and business alignment at the BBC, explains how unified communications technology is transforming the BBC.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

ComputerWeekly.com

The trust advantage: How to win at big data
sponsored by ComputerWeekly.com
ANALYST REPORT: Without consumer trust, most of the trillions of dollars of social and economic value promised from big data will go to waste, this report from The Boston Consulting Group reveals.
Posted: 11 Nov 2013 | Published: 11 Nov 2013

ComputerWeekly.com

CW Buyers Guide To Finance and Insurance
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

ComputerWeekly.com

Global Sourcing Trends in 2012
sponsored by ComputerWeekly.com
IT BRIEFING: The latest IT outsourcing trends from global law firm Morrison & Foerster.
Posted: 05 Mar 2012 | Published: 05 Mar 2012

ComputerWeekly.com

European IT Law Briefing: Recruitment and social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Data protection: Not just about personal data and compliance
sponsored by ComputerWeekly.com
EGUIDE: Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

ComputerWeekly.com

Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
sponsored by IBM
WHITE PAPER: This resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
Posted: 27 Feb 2014 | Published: 28 Feb 2013

IBM

Safeguarding Your Data with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: The need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement