Privacy And Security LawWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Privacy And Security Law returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Data Protection and Privacy
 •   Data Security
 •   Security Policies
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Monitoring
 •   Network Security
 •   Intellectual Property Protection/ Extrusion Prevention
 •   Mobile Device Management
 •   Encryption and Key Management
 •   Fraud Detection & Prevention

Related Searches
 •   General Privacy
 •   Privacy And Cycles
 •   Privacy And Definition
 •   Privacy And Metrics
 •   Privacy And Research
 •   Privacy And Security Manage
 •   Privacy And Security Warehouse
 •   Privacy Portals
 •   Resource Privacy And
 •   Softwares Privacy And Security
Advertisement

ALL RESULTS
1 - 25 of 473 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Taming the beast: Data protection in 2014 & beyond by TechTarget

March 18, 2014 - (Free Research)
In this epic time of data breaches, are you doing enough to ensure protection? By contributing to this brief, 5 minute survey, you'll gain immediate access to an expert resource on top data protection tips that will help you answer that question and establish an effective security strategy for the future. 
(RESOURCE)

Employee Use of Personal Devices: Managing risk by balancing privacy and security by McAfee, Inc.

August 23, 2011 - (Free Research)
Organizations today are increasingly allowing employees to use their personal mobile devices for work use, creating a number of security risks. But the tools employers have used to manage and monitor these devices raises concern for privacy. View this editorial brief to discover ways of balancing privacy and security to manage risk. 
(WHITE PAPER) READ ABSTRACT |

Global Sourcing Trends in 2012 by ComputerWeekly.com

March 05, 2012 - (Free Research)
The latest IT outsourcing trends from global law firm Morrison & Foerster. 
(IT BRIEFING) READ ABSTRACT |

Network Faxing and HIPAA: Security and Privacy in the Health Care Industry by Castelle

January 01, 2007 - (Free Research)
The Health Insurance Portability and Accountability Act (HIPAA) prescribes new health care industry rules and recommendations for the handling and transmission of patient health information. 
(WHITE PAPER) READ ABSTRACT |

Employee Use of Personal Devices: Managing Risk by Balancing Privacy & Security by McAfee, Inc.

November 09, 2011 - (Free Research)
In this business brief, Jules Polonetsky, the author of, Employee Use of Personal Devices—Managing risk by balancing privacy and security, outlines the top security and compliance issues that companies need to take into consideration while maintaining privacy balance when employees use their own personal mobile devices for work. 
(WHITE PAPER) READ ABSTRACT |

The Hidden Costs of Microsoft® BitLocker®: White Paper by WinMagic

August 19, 2011 - (Free Research)
This paper explores the issues that you may or may have not known about Microsoft BitLocker. View now to explore enterprise mobile security considerations that will help you make educated decisions on what’s best for your business. 
(WHITE PAPER) READ ABSTRACT |

Strategic Brief – HIPAA by Alliance Storage Technologies

November 23, 2010 - (Free Research)
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) enacted reform and standardization in the healthcare industry to protect patient confidentiality. Continue reading to learn more about the goals of HIPAA. 
(WHITE PAPER) READ ABSTRACT |

Data privacy best practices: time to take action! by IBM

February 24, 2009 - (Free Research)
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Using proven data masking techniques can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish. 
(WHITE PAPER) READ ABSTRACT |

Data privacy best practices: time to take action! by IBM

September 01, 2008 - (Free Research)
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish. 
(WHITE PAPER) READ ABSTRACT |

Data privacy best practices: time to take action! by IBM

September 30, 2008 - (Free Research)
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 01, 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

Secure Your Journey to the Cloud with Data Protection by Trend Micro, Inc.

October 07, 2011 - (Free Research)
View this paper to discover how Trend Micro can help tackle cloud security risks with a cloud data protection solution, integrated with VMware, which enables organizations to maximize virtual and cloud benefits without compromising data privacy and security. 
(WHITE PAPER) READ ABSTRACT |

Essential Guide to HIPAA Compliance and Data Protection Strategies by SearchHealthIT.com and SearchSecurity.com

August 17, 2011 - (Free Research)
Effectively addressing the new HIPAA privacy and security rules introduced in the HITECH Act requires an assessment of your organization’s biggest vulnerabilities as well as the deployment of the right technology to reduce the risk of data loss. Inside this expert resource, gain insight on current healthcare security topics. 
(EZINE)

E-Book: Optimizing BI and Analytics in Healthcare by Tableau Software

May 21, 2010 - (Free Research)
BI and analytics tools can provide healthcare organizations with valuable insights for assessing and improving patient care and better controlling costs. This E-Book provides an overview of the BI and analytics issues facing healthcare organizations, as well as advice on how to best utilize the available technologies in healthcare. 
(EBOOK) READ ABSTRACT |

Bailing Out Your Budget: How Websense Lowers Your TCO by Websense, Inc.

January 13, 2011 - (Free Research)
The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the same time that the resources available to mitigate them are diminishing or, at best, remaining constant. 
(WHITE PAPER) READ ABSTRACT |

Bailing Out Your Budget: How Websense Lowers Your TCO by Websense, Inc.

December 01, 2010 - (Free Research)
The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the sametime that the resources available to mitigate them are diminishing or, at best, remaining constant. Check out this white paper to learn how to efficiently secure your data while lowering your overall total cost of ownership. 
(WHITE PAPER) READ ABSTRACT |

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition by IBM

March 13, 2009 - (Free Research)
Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge. 
(CASE STUDY) READ ABSTRACT |

Securely Publish and Manage Web APIs with CloudControl by Layer 7 Technologies

July 20, 2011 - (Free Research)
Cloud computing offers the opportunity for an enhanced computing experience, but truly feeling the benefits of cloud computing requires exposing provisioning protocols, applications and APIs to external partners. Access this resource to learn how you can enhance access control, privacy and security through APIs. 
(PRODUCT OVERVIEW)

Business leaders agenda 2012 by ComputerWeekly.com

March 16, 2012 - (Free Research)
This report from KPMG identifies business priorities across a wide range of geographies and industries, and assesses the economic outlook. 
(RESOURCE) READ ABSTRACT |

E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa by SearchCompliance.com

February 05, 2010 - (Free Research)
Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards. 
(EBOOK) READ ABSTRACT |

Expert Discussion: Mobile device security in health care by Hewlett-Packard Company

April 12, 2012 - (Free Research)
This E-Guide discusses some of the most significant trends and themes concerning mobile device security in health IT. Discover what it will take to deploy a stable, cost-efficient mobile security system in your hospital. 
(EGUIDE) READ ABSTRACT |

The Massachusetts Data Protection Law by SearchSecurity.com & SearchCompliance.com

June 18, 2009 - (Free Research)
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned. 
(EBOOK) READ ABSTRACT |

Open, Manage, and Accelerate SSL Encrypted Applications by BlueCoat

September 01, 2007 - (Free Research)
Enterprise users and their data have never been further apart. Business pressures that keep employees out of headquarters and close to customers and partners have met head-on with other drivers that are bringing far flung servers back to the datacenter. 
(WHITE PAPER) READ ABSTRACT |

Big Data Integration and Governance Considerations for Financial Services by IBM

December 23, 2013 - (Free Research)
This white paper examines key big data integration and governance considerations for the financial services industry. 
(WHITE PAPER) READ ABSTRACT |

Best Practices In Document Management: Five Tests to Evaluate Cloud Enterprise Content Management (ECM) by SpringCM

January 2007 - (Free Research)
Document management, either as a stand-alone technology or as part of a broader ECM initiative, enables an organization to effectively and efficiently control and leverage its content. This white paper will explore five tests to determine whether your organization can benefit from a Cloud ECM solution. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 473 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts