Privacy Rights Research
-
Great collaboration begins with good governance
Sponsored by: TechTarget Content ManagementFor a growing number of companies today, collaboration is no longer a “soft,” nice-to-have concept—it’s an essential component for competitive differentiation. In this Tip Guide, learn how organizations can promote and support effective worker collaboration, and how managers can provide effective governance for collaborative efforts.
-
Government insists 'nothing sinister' about web user data gathering
Sponsored by: TechTarget ComputerWeekly.comPrivacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.
-
GDPR: 10 essential facts you need to know
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we give you the top 10 key facts you need to know about the General Data Protection Regulation according to privacy lawyer and KuppingerCole analyst, Karsten Kinast. Taken from the European Identity & Cloud Conference in 2016.
-
Computer Weekly – 16 February 2016: How AstraZeneca saved $350m by insourcing IT
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to pharmaceutical giant AstraZeneca to find out why it brought its outsourced IT back in-house, saving $350m per year as a result. We ask if the new EU/US Privacy Shield agreement will protect citizens' data. And we examine the relative merits of datacentre colocation and the cloud. Read the issue now.
-
A Case for IT Security: The Future of New EU Data Protection
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
-
Cybersecurity and Privacy Compliance: The Delicate Balance
Sponsored by: TechTarget SecurityThis handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.
-
E-Discovery Cross-Border Data Compliance
Sponsored by: ExterroThis white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
-
Computer Weekly – 1 April 2014: Where next for the NHS Care.data programme?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, healthcare IT experts talk about the next steps for the controversial NHS Care.data plan to create a database of medical records. Is Moore's Law running out? We hear about the future of processor technology. And our latest buyer's guide looks at how data analytics can improve IT security. Read the issue now.
-
Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
Sponsored by: IBMThis resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
-
The Mobile Trust Gap
Sponsored by: MobileIronThis important paper discusses the mobile trust gap between users and employers, and examines how your organization can establish a practical set of privacy guidelines in order to ensure successful BYOD and enterprise mobility.
-
Computer Weekly – 20 August 2013: Mixing work and play – how corporate applications can learn from computer games
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at gamification, the trend for corporate software to use techniques developed for computer games. After the Prism internet surveillance scandal, Switzerland hopes to become a safe location for cloud services. And we talk to an NHS CIO about the challenges of a paperless health service. Read the issue now.
-
Tackling the Data Security Challenge
Sponsored by: IBMIn this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
-
Computer Weekly – 30 July 2013: The threat within – balancing security and employee privacy
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as more data breaches come from inside an organisation, we examine how to balance information security and employee privacy. Tech City CEO Joanna Shields talks about the opportunity for CIOs from working with startups. And we look at how mobile technology can help improve patient care in the NHS. Read the issue now.
-
Data Security and Privacy Concerns Pushed into the Spotlight
Sponsored by: GeoTrust, Inc.In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
-
The Human Face of Big Data: Data Driven
Sponsored by: TechTarget ComputerWeekly.comSoftware engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.
-
De-risking IT Lifecycle Management
Sponsored by: TechTarget ComputerWeekly.comAnalysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.
-
Upgrading Wireless Networks in the Hospital
Sponsored by: TechTarget Health ITIn the next few years, hospitals will be rolling out all kinds of technology to improve patient care. Each of these devices and systems must be able to send and receive information instantly.
-
IBM InfoSphere Guardium Data Redaction
Sponsored by: IBMInfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.
-
Whitepaper: IBM Optim Data Redaction: Reconciling openness with privacy
Sponsored by: IBMRedaction is a word that many—if not most—IT organizations have never heard of. If they have, they would probably be hard-pressed to define it or explain its importance. But that situation is changing quickly as organizations realize they must have a solution.
-
Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
Sponsored by: Information Security MagazineThis month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
-
Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
Sponsored by: Information Security MagazineThis issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
-
Knowledge is Power
Sponsored by: IBMYour software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
-
E-Book: Optimizing BI and Analytics in Healthcare
Sponsored by: Tableau SoftwareBI and analytics tools can provide healthcare organizations with valuable insights for assessing and improving patient care and better controlling costs. This E-Book provides an overview of the BI and analytics issues facing healthcare organizations, as well as advice on how to best utilize the available technologies in healthcare.
-
E-Book: New Rules for HIPAA
Sponsored by: TechTarget SecurityOrganizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
-
E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
Sponsored by: TechTarget SecurityRead this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.