ComputerWeekly.com Research Library

Powered by Bitpipe.com

Privacy Rights Research

  • Great collaboration begins with good governance

    Sponsored by: TechTarget Content Management

    For a growing number of companies today, collaboration is no longer a “soft,” nice-to-have concept—it’s an essential component for competitive differentiation. In this Tip Guide, learn how organizations can promote and support effective worker collaboration, and how managers can provide effective governance for collaborative efforts.

  • Government insists 'nothing sinister' about web user data gathering

    Sponsored by: TechTarget ComputerWeekly.com

    Privacy and data protection have never been more important. Cambridge Analytica, Facebook, we can count the recent scandals on two hands. But lately, government officials have insisted there is "nothing sinister" in plans to gather user information through the Gov.uk website to help deliver more personalised digital services to citizens.

  • GDPR: 10 essential facts you need to know

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we give you the top 10 key facts you need to know about the General Data Protection Regulation according to privacy lawyer and KuppingerCole analyst, Karsten Kinast. Taken from the European Identity & Cloud Conference in 2016.

  • Computer Weekly – 16 February 2016: How AstraZeneca saved $350m by insourcing IT

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to pharmaceutical giant AstraZeneca to find out why it brought its outsourced IT back in-house, saving $350m per year as a result. We ask if the new EU/US Privacy Shield agreement will protect citizens' data. And we examine the relative merits of datacentre colocation and the cloud. Read the issue now.

  • A Case for IT Security: The Future of New EU Data Protection

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.

  • Cybersecurity and Privacy Compliance: The Delicate Balance

    Sponsored by: TechTarget Security

    This handbook explores the challenges inherent in ensuring cybersecurity and maintaining user privacy, tackling the latest data governance strategies to find solutions that strike a balance between the two imperatives.

  • E-Discovery Cross-Border Data Compliance

    Sponsored by: Exterro

    This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.

  • Computer Weekly – 1 April 2014: Where next for the NHS Care.data programme?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, healthcare IT experts talk about the next steps for the controversial NHS Care.data plan to create a database of medical records. Is Moore's Law running out? We hear about the future of processor technology. And our latest buyer's guide looks at how data analytics can improve IT security. Read the issue now.

  • Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data.

    Sponsored by: IBM

    This resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more.

  • The Mobile Trust Gap

    Sponsored by: MobileIron

    This important paper discusses the mobile trust gap between users and employers, and examines how your organization can establish a practical set of privacy guidelines in order to ensure successful BYOD and enterprise mobility.

  • Computer Weekly – 20 August 2013: Mixing work and play – how corporate applications can learn from computer games

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we look at gamification, the trend for corporate software to use techniques developed for computer games. After the Prism internet surveillance scandal, Switzerland hopes to become a safe location for cloud services. And we talk to an NHS CIO about the challenges of a paperless health service. Read the issue now.

  • Tackling the Data Security Challenge

    Sponsored by: IBM

    In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.

  • Computer Weekly – 30 July 2013: The threat within – balancing security and employee privacy

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, as more data breaches come from inside an organisation, we examine how to balance information security and employee privacy. Tech City CEO Joanna Shields talks about the opportunity for CIOs from working with startups. And we look at how mobile technology can help improve patient care in the NHS. Read the issue now.

  • Data Security and Privacy Concerns Pushed into the Spotlight

    Sponsored by: GeoTrust, Inc.

    In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.

  • The Human Face of Big Data: Data Driven

    Sponsored by: TechTarget ComputerWeekly.com

    Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris.

  • De-risking IT Lifecycle Management

    Sponsored by: TechTarget ComputerWeekly.com

    Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively.

  • Upgrading Wireless Networks in the Hospital

    Sponsored by: TechTarget Health IT

    In the next few years, hospitals will be rolling out all kinds of technology to improve patient care. Each of these devices and systems must be able to send and receive information instantly.

  • IBM InfoSphere Guardium Data Redaction

    Sponsored by: IBM

    InfoSphere Guardium is a key part of the IBM InfoSphere portfolio. IBM InfoSphere software is an integrated platformfor defining, integrating, protecting and managing trusted information across your systems.

  • Whitepaper: IBM Optim Data Redaction: Reconciling openness with privacy

    Sponsored by: IBM

    Redaction is a word that many—if not most—IT organizations have never heard of. If they have, they would probably be hard-pressed to define it or explain its importance. But that situation is changing quickly as organizations realize they must have a solution.

  • Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act

    Sponsored by: Information Security Magazine

    This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.

  • Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor

    Sponsored by: Information Security Magazine

    This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.

  • Knowledge is Power

    Sponsored by: IBM

    Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.

  • E-Book: Optimizing BI and Analytics in Healthcare

    Sponsored by: Tableau Software

    BI and analytics tools can provide healthcare organizations with valuable insights for assessing and improving patient care and better controlling costs. This E-Book provides an overview of the BI and analytics issues facing healthcare organizations, as well as advice on how to best utilize the available technologies in healthcare.

  • E-Book: New Rules for HIPAA

    Sponsored by: TechTarget Security

    Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more.

  • E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa

    Sponsored by: TechTarget Security

    Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.