ComputerWeekly.com Research Library

Powered by Bitpipe.com

Privacy Rights Research

  • The controversial CLOUD Act

    Sponsored by: IONOS

    Amid the induction of other data privacy laws, the US enacted the Clarifying Lawful Overseas Use of Data (CLOUD) Act as a way of regulating the handling of data existing outside the US. So, will European companies be affected by the CLOUD Act? If so, how? Download this white paper to take a closer look at the key aspects of this regulation.

  • NIST Cybersecurity Framework Implementation Overview

    Sponsored by: Absolute Software Corporation

    In 2018, the National Institute of Standards and Technology (NIST) revised their cybersecurity framework (CSF) to reflect today’s threat landscape. This white paper outlines the 5 functions of the NIST CSF, specifically for endpoints, and provides actionable guidelines for implementation. Read on to get started.

  • Bovis Homes

    Sponsored by: Absolute Software Corporation

    In this case study, follow the journey of Bovis Homes, a residential development company in the UK, as they partner with Absolute Software to establish visibility and control over their disparate mobile endpoints to ensure security and meet GDPR compliance.

  • Cisco - From Privacy to Profit: Achieving Positive Returns on Privacy Investments

    Sponsored by: Cisco Umbrella

    Privacy has become a critical business imperative, with organizations seeing significant ROI due to improvements in privacy and operational efficiency. Download this year’s Cisco Data Privacy Benchmark Study to take a closer look at the key findings around the benefits of data privacy.

  • CCPA compliance guide for email

    Sponsored by: Egress Software Technologies Inc

    2020 marks the initiation of the United States’ first data privacy law – the CCPA. How has your organization prepared? Download this white paper to uncover the 3-phase approach to compliance and recommended tactics related to email security & file sharing.

  • Protecting Intellectual Property: Black, White, and Shades of Gray

    Sponsored by: InteliSecure

    Complying with data privacy regulations is important, but rarely is regulated data the only data worth protecting. Losses associated with regulatory fines present far less risk than the potential losses associated with intellectual property theft. In this white paper, learn how a data protection program can help you protect even unstructured IP.

  • CIO Trends #10: Middle East

    Sponsored by: ComputerWeekly.com

    If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes are a big one. Also find out how Saudi Arabia could become the Silicon Valley of the Middle East. Read more about it in this issue of our CIO Trends Middle East series.

  • California Consumer Privacy Act vs GDPR: What You Need to Know

    Sponsored by: BigID

    The CCPA is the first of its kind law in the US that will put privacy rights in the hands of California consumers. It builds on many core principles that defined Europe’s GDPR, but there are some variations that are important to distinguish. In this white paper, explore the key differences and similarities between these 2 regulations.

  • 4 Steps to Building a PII Catalog for Privacy

    Sponsored by: BigID

    Data catalogs digest an input of data in order to accurately organize what it is and where it comes from. Effective catalogs enable organizations to automate policy, implement data security and maintain compliance. This white paper highlights a 4-step process designed to guide an organization in its catalog journey. Read on to learn more.

  • A Buyer’s Guide to Privacy-Centric Data Discovery

    Sponsored by: BigID

    Protecting customer data has never been easy. And with the introduction of regulations like GDPR and CCPA, organizations face heavy penalties for failing to address this issue. Use this buyer’s guide to stay informed on the key components to look for in data discovery partner.

  • CCPA Readiness Checklist

    Sponsored by: BigID

    As of January 1, 2020, the CCPA has come into effect. Given the steep penalties for failing to comply, organizations should make certain that they’re positioned to responsibly safeguard customer data. Use this comprehensive checklist to ensure your organization meets the requirements of California’s new data privacy regulation.

  • Data protection, a live issue that affects us all

    Sponsored by: ComputerWeekly.com

    Defined as the process of protecting important information from corruption, compromise or loss, the importance of data protection now cannot be understated. In this e-guide we will explore some of the key issues around data protection, which should be an integral, core part of your organisation's cyber security strategy.

  • California Consumer Privacy Act: The Need for Data-Centric Security

    Sponsored by: Comforte AG

    CCPA is one of the latest in a series of new privacy regulations globe that affects businesses and comes with significant penalties. This whitepaper outlines the key steps necessary to prepare for CCPA and highlights the importance of data-centric security to ensure your organization is adequately prepared for 2020.

  • Addressing CCPA: Legacy ERP and Data Privacy Compliance

    Sponsored by: Appsian

    With the 2020 launch date for CCPA looming, organizations are scrambling to ensure they have appropriate security measures in place. In this solution brief, highlight the gaps within current security capabilities and explore how organizations can enhance their legacy ERP apps to ensure CCPA compliance.

  • The New Era of Personal Data Privacy Policy

    Sponsored by: ServiceNow

    GDPR and CCPA are changing the way organizations can use customer data by giving the power back to the individual. In this e-guide, Dimitri Sirota, CEO and co-founder of BigID, addresses some of the key issues that organizations are facing in the era of data access rights. Read on to key into the insights of an industry expert.

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Sponsored by: ComputerWeekly.com

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

  • State of GDPR in mainland Europe

    Sponsored by: ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

  • Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018

    Sponsored by: ComputerWeekly.com

    David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.

  • Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated

    Sponsored by: ComputerWeekly.com

    This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.

  • Declaration by David Godkin with 218 exhibits – 17 May 2018

    Sponsored by: ComputerWeekly.com

    A declaration by David Godkin, counsel for app developer Six4Three, producing 218 exhibits. The exhibits cover a wide range of material relating to Facebook, including news cuttings, press releases and blog posts. The exhibits present a timeline of what was publicly known and when.

  • Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018

    Sponsored by: ComputerWeekly.com

    The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.

  • Government insists 'nothing sinister' about web user data gathering

    Sponsored by: ComputerWeekly.com

    Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.

  • Hype Cycle for Privacy, 2019

    Sponsored by: TITUS

    Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.

  • The Titus Times: The CEO & CTO

    Sponsored by: TITUS

    In this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.

  • Talkdesk GDPR Compliance

    Sponsored by: Talkdesk

    In this e-book, discover what steps Talkdesk has taken to ensure compliance with General Data Protection Regulation (GDPR). Get a comprehensive overview of Talkdesk personal data processing protocols, and review how Talkdesk ensures data security, controls third-party access to personal data, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.