Laws Research
-
Policing cyber crime
Sponsored by: TechTarget ComputerWeekly.comThis article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
-
How to Create the Most Effective Compliance Program at Your Organization
Sponsored by: IntraLinks, IncIn this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
-
Data Privacy: Where Should I House My Data?
Sponsored by: IntraLinks, IncThis white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
-
E-Discovery Cross-Border Data Compliance
Sponsored by: ExterroThis white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
-
CW Europe – September Edition
Sponsored by: TechTarget ComputerWeekly.comIn this issue of CW Europe read how data discipline ensures you avoid data loss, as well as helping you to think clearer and to be organised.
-
Networking Compliance
Sponsored by: DellEMC and Intel®This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.
-
Best Practices for Managing the Increasing Depth of Compliance Regulation
Sponsored by: IBMAccording to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations. Learn what actions your organization can take to ensure compliance with evolving regulations.
-
The Massachusetts Data Protection Law
Sponsored by: TechTarget SecurityMassachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.
-
The Growing Importance of E-Discovery on Your Business
Sponsored by: Google AppsThe goal of this white paper is to focus on the key issues involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process.
-
e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk
Sponsored by: Symantec CorporationThis whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance.