ComputerWeekly.com Research Library

Powered by Bitpipe.com

Privacy Rights Research

  • Addressing CCPA: Legacy ERP and Data Privacy Compliance

    Sponsored by: Appsian

    With the 2020 launch date for CCPA looming, organizations are scrambling to ensure they have appropriate security measures in place. In this solution brief, highlight the gaps within current security capabilities and explore how organizations can enhance their legacy ERP apps to ensure CCPA compliance.

  • The New Era of Personal Data Privacy Policy

    Sponsored by: ServiceNow

    GDPR and CCPA are changing the way organizations can use customer data by giving the power back to the individual. In this e-guide, Dimitri Sirota, CEO and co-founder of BigID, addresses some of the key issues that organizations are facing in the era of data access rights. Read on to key into the insights of an industry expert.

  • Preparing for CCPA Compliance

    Sponsored by: Namogoo

    Given the financial and reputational damage of failing to comply with data privacy laws, preparation for the CCPA should be the top priority at any company, regardless of where they are based. In this e-book, explore the components of CCPA, how it compares to GDPR, and 7 steps to CCPA compliance. Read on to prepare your business for 2020.

  • A Computer Weekly buyer's guide to compliance, risk and governance

    Sponsored by: ComputerWeekly.com

    Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach

  • State of GDPR in mainland Europe

    Sponsored by: ComputerWeekly.com

    The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.

  • Client Insights on Data Protection with IBM Security Guardium

    Sponsored by: IBM

    How do organizations protect their data from persistent, sophisticated and well-funded attackers? Ponemon Institute's latest survey of current IBM Security Guardium clients shows how the Guardium platform has improved organizations' ability to protect their data. Download the report to explore key findings.

  • Access Management is Essential for Cloud Transformation

    Sponsored by: Thales

    This infographic highlights some of the key takeaways from the 2019 Thales Access Management Index. Continue reading to uncover the key takeaways as they relate to top access management tools, the role of data breaches in access management adoption & other significant statistics.

  • The Changing Face of Data Security in Europe

    Sponsored by: Thales

    Take a glimpse at the results from the 2019 Thales Data Threat Report – European Edition. This infographic shares some key statistics from the research findings, including the use of sensitive data, multi-cloud environments & the effects of GDPR and other data privacy laws.

  • The CISO’s Handbook for Certificate Management

    Sponsored by: AppViewX

    Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.

  • Memorandum of points and authorities by David Godkin (with highlights) - 20 May 2018

    Sponsored by: ComputerWeekly.com

    David Godkin, counsel for app developer Six4Three, outlines the legal arguments that will be used in the case against Facebook, as well as the relevant cases, statutes and authorities that apply.

  • Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated

    Sponsored by: ComputerWeekly.com

    This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.

  • Declaration by David Godkin with 218 exhibits – 17 May 2018

    Sponsored by: ComputerWeekly.com

    A declaration by David Godkin, counsel for app developer Six4Three, producing 218 exhibits. The exhibits cover a wide range of material relating to Facebook, including news cuttings, press releases and blog posts. The exhibits present a timeline of what was publicly known and when.

  • Declaration by David Godkin producing 212 sealed exhibits - 16 May 2018

    Sponsored by: ComputerWeekly.com

    The exhibits produced in this declaration by David Godkin, counsel for app developer Six4Three, contain internal Facebook communications, including emails between CEO Mark Zuckerberg and senior executives, correspondence and chat-logs, spreadsheets and strategy presentations.

  • Executive Summary 2019 Thales Data Threat Report

    Sponsored by: Thales

    European enterprises are moving quickly to adopt and deploy transformative technologies to increase their efficiency, while also introducing new risks. Technology changes & data privacy laws are forcing companies to rethink how they provide data security. View this report for top data concerns and threat mitigations in 2019.

  • Securing Cloud environments: Five Data Encryption best practices to help reduce your risk

    Sponsored by: IBM

    It is just as critical to protect sensitive cloud-based data as it is on-premises data. One way to do this is through data encryption. However, encryption is often complicated and difficult to implement and change. This paper looks at 5 best practices for securing data in multi-cloud environments using the latest data encryption technologies.

  • IBM Security Guardium Analyzer Overview Demo

    Sponsored by: IBM

    Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.

  • IBM Security Guardium Analyzer Overview Demo

    Sponsored by: IBM

    Public sentiment is changing around data privacy. In this video, see how IBM Security Guardium Analyzer can help organizations efficiently address regulated data risk through data discovery, data classification, vulnerability scanning and database risk scoring for on-premises and cloud databases.

  • Forrester Report: Tackle The California Consumer Privacy Act Now

    Sponsored by: IBM

    With the adoption of the California Consumer Privacy Act (CCPA), California has once again taken the initiative among US states to lead on privacy. In less than 1 year, regulators in California will start enforcing the requirements of the CCPA. In this Forrester report, explore the main steps companies must take to kick off their CCPA preparation.

  • IBM Security Guardium Analyzer Data Sheet

    Sponsored by: IBM

    In today’s digital world, data is our most complex and critical asset. It runs our businesses making it not only crucial to the organizations that store it, but also a high value target to malicious actors. In this brief, learn how IBM Security Guardium Analyzer can help organizations get started on their data security and compliance journeys.

  • Government insists 'nothing sinister' about web user data gathering

    Sponsored by: ComputerWeekly.com

    Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.

  • Leaders & Laggards: The Latest Findings from the Ponemon Institute's Study on the Cyber Resilient Organization

    Sponsored by: IBM

    In this webinar, Dr. Larry Ponemon will take you through the barriers of becoming cyber resilient and dive into report topics such as implementing automation, aligning privacy and cyber security, and what it takes to become a cyber resilient "High Performer" in 2019.

  • The Study on the Cyber Resilient Organization

    Sponsored by: IBM

    Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient's latest report. Download the report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture.

  • Hype Cycle for Privacy, 2019

    Sponsored by: TITUS

    Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.

  • The Titus Times: The CEO & CTO

    Sponsored by: TITUS

    In this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.

  • Talkdesk GDPR Compliance

    Sponsored by: Talkdesk

    In this e-book, discover what steps Talkdesk has taken to ensure compliance with General Data Protection Regulation (GDPR). Get a comprehensive overview of Talkdesk personal data processing protocols, and review how Talkdesk ensures data security, controls third-party access to personal data, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.