ComputerWeekly.com Research Library

Powered by Bitpipe.com

Laws Research

  • Policing cyber crime

    Sponsored by: TechTarget ComputerWeekly.com

    This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space

  • How to Create the Most Effective Compliance Program at Your Organization

    Sponsored by: IntraLinks, Inc

    In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.

  • Data Privacy: Where Should I House My Data?

    Sponsored by: IntraLinks, Inc

    This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.

  • E-Discovery Cross-Border Data Compliance

    Sponsored by: Exterro

    This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.

  • CW Europe – September Edition

    Sponsored by: TechTarget ComputerWeekly.com

    In this issue of CW Europe read how data discipline ensures you avoid data loss, as well as helping you to think clearer and to be organised.

  • Networking Compliance

    Sponsored by: DellEMC and Intel®

    This paper presents a broad overview of the major types of compliance required today. In addition, it considers an approach to compliance based on the network as a whole, rather than on specific devices or areas.

  • Best Practices for Managing the Increasing Depth of Compliance Regulation

    Sponsored by: IBM

    According to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations.  Learn what actions your organization can take to ensure compliance with evolving regulations.

  • The Massachusetts Data Protection Law

    Sponsored by: TechTarget Security

    Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.

  • The Growing Importance of E-Discovery on Your Business

    Sponsored by: Google Apps

    The goal of this white paper is to focus on the key issues involved in developing an e-discovery capability and to help organizations plan to become better prepared for the rigors of the e-discovery process.

  • e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk

    Sponsored by: Symantec Corporation

    This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.