ComputerWeekly.com Research Library

Powered by Bitpipe.com

Privacy Rights Research

  • Computer Weekly – 4 August 2020: The UK's $500m space technology gamble

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly we ask why the UK gov-ernment is spending $500m on a bankrupt satellite technolo-gy company. After a European court quashes the EU-US data sharing agreement, we examine the implications for a UK-EU data protection deal after Brexit. And how have small cloud suppliers coped in the pandemic? Read the issue now.

  • GDPR, CCPA, & Beyond

    Sponsored by: Talend

    Access this white paper to learn about the data sovereignty regulations that dictate data privacy across the globe including GDPR and CCPA and discover 16 steps to enact a data governance program for data privacy with Talend.

  • CIO Trends APAC: Developing a data-driven culture

    Sponsored by: ComputerWeekly.com

    In this e-guide, read more about what organisations in Asia-Pacific are doing to sharpen their data analytics strategies to cope with business demands in a challenging economic climate.

  • Where Law and Tech Will Collide in 2020

    Sponsored by: RSA Conference

    The acceleration of “tech disruption” across all industries is exacerbating privacy risks to consumers globally. NIST has released draft privacy controls, providing guidance for companies to manage privacy risks. Watch this RSA Conference webinar to see industry experts discuss where technology and the law might find friction in 2020.

  • Computer Weekly - 7 July 2020: The privacy challenges of easing lockdown

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as pubs in the UK re-open after lockdown, we examine the privacy issues around collecting customer data for contact tracing. We look at how interconnected devices are revolutionising the manufacturing and engineering sectors. And we assess GDPR progress two years after its introduction. Read the issue now.

  • Case Study: CIO interview - Stephen Docherty on NHS data sharing

    Sponsored by: ComputerWeekly.com

    The Cambridge Analytica scandal raised awareness about privacy. Stephen Docherty, CIO of South London and Maudsley NHS Trust, explains why

  • Unlocking value in the railway network's data

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.

  • Europe's controversial digital vision for the next decade

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.

  • Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.

  • Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.

  • Government insists 'nothing sinister' about web user data gathering

    Sponsored by: ComputerWeekly.com

    Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.

  • Securing data across the enterprise while simplifying IT operations

    Sponsored by: Thales

    The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.

  • Operationalizing Privacy Policy from Discovery to Enforcement

    Sponsored by: Ionic Security

    In this webinar, join security experts at BigID and Ionic as they discuss how automating the identification and mitigation of risk to consumer data can help organizations meet the requirements of data privacy laws that require extensive audit trails, like GDPR and CCPA. Watch now to learn more.

  • A Mandate to Execute a New Data Security Strategy

    Sponsored by: Ionic Security

    In this video panel, join Ionic Security experts as they discuss the age of rapidly increasing digital threats, the importance of a data-centric approach to security, the impacts of GDPR, and more.

  • Infographic: Gartner AI and compliance spending forecast

    Sponsored by: ComputerWeekly.com

    More than 60 jurisdictions around the world have proposed or are drafting postmodern privacy and data protection laws as a result. This infographic shows Gartner AI and compliance spending forecast.

  • Data Analytics in Healthcare: Opportunities & Challenges

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the promises of healthcare data analytics, the challenges faced by healthcare providers in digital transformation and what some cloud providers are doing to assuage the security concerns of cloud among healthcare service providers.

  • NIST Cybersecurity Framework Implementation Overview

    Sponsored by: Absolute Software Corporation

    In 2018, the National Institute of Standards and Technology (NIST) revised their cybersecurity framework (CSF) to reflect today’s threat landscape. This white paper outlines the 5 functions of the NIST CSF, specifically for endpoints, and provides actionable guidelines for implementation. Read on to get started.

  • Cisco - From Privacy to Profit: Achieving Positive Returns on Privacy Investments

    Sponsored by: Cisco Umbrella

    Privacy has become a critical business imperative, with organizations seeing significant ROI due to improvements in privacy and operational efficiency. Download this year’s Cisco Data Privacy Benchmark Study to take a closer look at the key findings around the benefits of data privacy.

  • CCPA compliance guide for email

    Sponsored by: Egress Software Technologies Inc

    2020 marks the initiation of the United States’ first data privacy law – the CCPA. How has your organization prepared? Download this white paper to uncover the 3-phase approach to compliance and recommended tactics related to email security & file sharing.

  • CIO Trends #10: Middle East

    Sponsored by: ComputerWeekly.com

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.

  • California Consumer Privacy Act vs GDPR: What You Need to Know

    Sponsored by: BigID

    The CCPA is the first of its kind law in the US that will put privacy rights in the hands of California consumers. It builds on many core principles that defined Europe’s GDPR, but there are some variations that are important to distinguish. In this white paper, explore the key differences and similarities between these 2 regulations.

  • 4 Steps to Building a PII Catalog for Privacy

    Sponsored by: BigID

    Data catalogs digest an input of data in order to accurately organize what it is and where it comes from. Effective catalogs enable organizations to automate policy, implement data security and maintain compliance. This white paper highlights a 4-step process designed to guide an organization in its catalog journey. Read on to learn more.

  • A Buyer’s Guide to Privacy-Centric Data Discovery

    Sponsored by: BigID

    Protecting customer data has never been easy. And with the introduction of regulations like GDPR and CCPA, organizations face heavy penalties for failing to address this issue. Use this buyer’s guide to stay informed on the key components to look for in data discovery partner.

  • CCPA Readiness Checklist

    Sponsored by: BigID

    As of January 1, 2020, the CCPA has come into effect. Given the steep penalties for failing to comply, organizations should make certain that they’re positioned to responsibly safeguard customer data. Use this comprehensive checklist to ensure your organization meets the requirements of California’s new data privacy regulation.

  • Data protection, a live issue that affects us all

    Sponsored by: ComputerWeekly.com

    Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.