Privacy Rights Research
-
CW Buyers Guide To Finance and Insurance
Sponsored by: TechTarget ComputerWeekly.comThis 11-page buyer's guide looks at mitigating the risks of data breaches with liability insurance; how to finance your organisation's technology platforms; and funding software investment for the economic recovery while budgets remain tight.
-
Great collaboration begins with good governance
Sponsored by: TechTarget Content ManagementFor a growing number of companies today, collaboration is no longer a “soft,” nice-to-have concept—it’s an essential component for competitive differentiation. In this Tip Guide, learn how organizations can promote and support effective worker collaboration, and how managers can provide effective governance for collaborative efforts.
-
Cybersecurity and Privacy Compliance: The Delicate Balance
Sponsored by: TechTarget SecurityThis handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.
-
E-Discovery Cross-Border Data Compliance
Sponsored by: ExterroThis white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
-
Computer Weekly – 1 April 2014: Where next for the NHS Care.data programme?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, healthcare IT experts talk about the next steps for the controversial NHS Care.data plan to create a database of medical records. Is Moore's Law running out? We hear about the future of processor technology. And our latest buyer's guide looks at how data analytics can improve IT security. Read the issue now.
-
Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.
Sponsored by: IBMThis resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.
-
The Mobile Trust Gap
Sponsored by: MobileIronThis important paper discusses the mobile trust gap between users and employers, and examines how your organization can establish a practical set of privacy guidelines in order to ensure successful BYOD and enterprise mobility.
-
Computer Weekly – 20 August 2013: Mixing work and play – how corporate applications can learn from computer games
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we look at gamification, the trend for corporate software to use techniques developed for computer games. After the Prism internet surveillance scandal, Switzerland hopes to become a safe location for cloud services. And we talk to an NHS CIO about the challenges of a paperless health service. Read the issue now.
-
Tackling the Data Security Challenge
Sponsored by: IBMIn this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
-
Computer Weekly – 30 July 2013: The threat within – balancing security and employee privacy
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, as more data breaches come from inside an organisation, we examine how to balance information security and employee privacy. Tech City CEO Joanna Shields talks about the opportunity for CIOs from working with startups. And we look at how mobile technology can help improve patient care in the NHS. Read the issue now.
-
Data Security and Privacy Concerns Pushed into the Spotlight
Sponsored by: GeoTrust, Inc.In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
-
The Human Face of Big Data: Data Driven
Sponsored by: TechTarget ComputerWeekly.comSoftware engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.
-
De-risking IT Lifecycle Management
Sponsored by: TechTarget ComputerWeekly.comAnalysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.
-
Upgrading Wireless Networks in the Hospital
Sponsored by: TechTarget Health ITIn the next few years, hospitals will be rolling out all kinds of technology to improve patient care. Each of these devices and systems must be able to send and receive information instantly.
-
IBM InfoSphere Guardium Data Redaction
Sponsored by: IBMInfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.
-
Whitepaper: IBM Optim Data Redaction: Reconciling openness with privacy
Sponsored by: IBMRedaction is a word that many—if not most—IT organizations have never heard of. If they have, they would probably be hard-pressed to define it or explain its importance. But that situation is changing quickly as organizations realize they must have a solution.
-
Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
Sponsored by: Information Security MagazineThis month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
-
Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
Sponsored by: Information Security MagazineThis issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
-
Knowledge is Power
Sponsored by: IBMYour software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
-
E-Book: Optimizing BI and Analytics in Healthcare
Sponsored by: Tableau SoftwareBI and analytics tools can provide healthcare organizations with valuable insights for assessing and improving patient care and better controlling costs. This E-Book provides an overview of the BI and analytics issues facing healthcare organizations, as well as advice on how to best utilize the available technologies in healthcare.
-
E-Book: New Rules for HIPAA
Sponsored by: TechTarget SecurityOrganizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.
-
E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
Sponsored by: TechTarget SecurityRead this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
-
Safeguarding Your Data with Red Hat Enterprise Virtualization for Desktops
Sponsored by: Red Hat and JBossThe need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence.
-
Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops
Sponsored by: Red Hat and JBossThe PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates.
-
Achieving HIPAA Compliance with Red Hat Enterprise Virtualization for Desktops
Sponsored by: Red Hat and JBossThis paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific HIPAA mandates, while at the same time increasing their overall efficiency and agility.