Security And Privacy LawsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security And Privacy Laws returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Network Security
 •   Wireless Security
 •   Encryption and Key Management
 •   Application Security
 •   Wireless Technologies and Mobile Computing

Related Searches
 •   Budget Security And Privacy
 •   Improvements Security And Privacy
 •   Learning About Security And
 •   Retail Security And
 •   Security And Metrics
 •   Security And Privacy Profile
 •   Security Measures
 •   Security Ohio
 •   Security Risk
 •   Security Schedule
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Security Awareness with Protecting Information by Information Shield, Inc.

Protecting Information is a quarterly security and privacy awareness newsletter that you can easily customize and distribute to your entire organization. 
(SOFTWARE PRODUCT)

Data Security and Privacy: A Holistic Approach by IBM

September 01, 2011 - (Free Research)
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization’s business goals, achieving compliance and reducing risk. 
(WHITE PAPER) READ ABSTRACT |

Data Security and Privacy Concerns Pushed into the Spotlight by GeoTrust, Inc.

July 19, 2013 - (Free Research)
In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD. 
(EGUIDE) READ ABSTRACT |

Overview of RSD Glass by RSD

October 03, 2011 - (Free Research)
This white paper includes valuable information about information governance along with a solution to many governance challenges. 
(WHITE PAPER) READ ABSTRACT |

Network Faxing and HIPAA: Security and Privacy in the Health Care Industry by Castelle

January 01, 2007 - (Free Research)
The Health Insurance Portability and Accountability Act (HIPAA) prescribes new health care industry rules and recommendations for the handling and transmission of patient health information. 
(WHITE PAPER) READ ABSTRACT |

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 27, 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

Security strategy roadmap for cloud computing by IBM

April 24, 2012 - (Free Research)
The benefits of the cloud cannot be fully realized without tackling the security and privacy concerns associated with cloud environments. In this resource, uncover a security roadmap that can help you build a sound approach for successfully achieving your cloud security needs. 
(DATA SHEET) READ ABSTRACT |

Discover information integration and governance in your organization by IBM

May 05, 2011 - (Free Research)
In this presentation transcript, Ron Powell will provide an overview of the information integration and governance theme and discuss the importance of the five topics within that theme: information integration, MDM, data warehousing and analytics, database management and tools, and database security and privacy, and lifecycle management. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 01, 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

The Massachusetts Data Protection Law by SearchSecurity.com & SearchCompliance.com

June 18, 2009 - (Free Research)
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned. 
(EBOOK) READ ABSTRACT |

E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa by SearchCompliance.com

February 05, 2010 - (Free Research)
Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards. 
(EBOOK) READ ABSTRACT |

Healthcare and Compliance - The New Reality by Juniper Networks, Inc.

April 13, 2011 - (Free Research)
This paper outlines the three most important mandates for Healthcare today. 
(WHITE PAPER) READ ABSTRACT |

Reducing the Risks of Social Media by SearchSecurity.com

November 15, 2013 - (Free Research)
Social Media can enhance brand reputation, build connections with external customers, improve collaboration and more. However using social media also carries risks. Fortunately, this expert e-guide explores the potential identity, security and privacy threats associated with social media. 
(EGUIDE) READ ABSTRACT |

The SMB Cloud Atlas by SearchCIO.com

August 07, 2013 - (Free Research)
Access this expert resource to find out CIOs are reaping the benefits of cloud computing while still ensuring security, privacy and cost are appropriately managed. 
(EBOOK) READ ABSTRACT |

E-Book: Optimizing BI and Analytics in Healthcare by Tableau Software

May 21, 2010 - (Free Research)
BI and analytics tools can provide healthcare organizations with valuable insights for assessing and improving patient care and better controlling costs. This E-Book provides an overview of the BI and analytics issues facing healthcare organizations, as well as advice on how to best utilize the available technologies in healthcare. 
(EBOOK) READ ABSTRACT |

Data Protection Masterclass: Global Privacy by ComputerWeekly.com

May 24, 2012 - (Free Research)
This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Enterprise Information Protection - The Impact of Big Data by IBM

March 31, 2013 - (Free Research)
In this comprehensive resource, explore the requirements for information security and privacy in the age of big data. You'll discover how a holistic approach to enterprise information, along with the right big data technologies, enables you to keep data classified, secure, and organized. 
(WHITE PAPER) READ ABSTRACT |

End-to-End Secure Client to Cloud Access Presentation Transcript by Intel

May 06, 2011 - (Free Research)
In this presentation transcript, gain helpful insight on the information security issues surrounding cloud computing, including: data confidentiality, identity and access management and more. Learn how you can protect your critical data in the cloud. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

European IT Law Briefing:  Practical steps for companies using social media by ComputerWeekly.com

May 20, 2013 - (Free Research)
Leading European law firms offer practical advice for companies using social media in France, Germany, UK and Italy. 
(ESSENTIAL GUIDE) READ ABSTRACT |

European IT Law Briefing: Monitoring employees' use of social media by ComputerWeekly.com

May 20, 2013 - (Free Research)
Leading European law firms explain the key legal requirements for companies monitoring employees' social media use in France, Germany, UK and Italy. 
(ESSENTIAL GUIDE) READ ABSTRACT |

European IT Law Briefing: Recruitment and social media by ComputerWeekly.com

May 20, 2013 - (Free Research)
Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Implementing a Secure Wireless Network in an Educational Setting by NETGEAR Inc.

October 11, 2010 - (Free Research)
Wireless connectivity has become a necessity in educational institutions of all levels. Students require Internet connectivity to conduct research, download assignments and communicate with their instructors. Likewise, educators utilize web portals to post assignments, and update class materials. Read this white paper to learn more.  
(WHITE PAPER) READ ABSTRACT |

Mobility and Security: Dazzling Opportunities, Profound Challenges by McAfee, Inc.

August 23, 2011 - (Free Research)
Mobility offers a number of dazzling opportunities, but it also comes with some profound challenges relating to security and privacy. This report examines the current state of mobile security, including common problems mobility can present, and offers key recommendations that all businesses and consumers should consider to mitigate risks. 
(ANALYST REPORT) READ ABSTRACT |

PC-Disable Delivers Intelligent Client-Side Protection for Lost or Stolen Notebooks by Absolute Software

December 14, 2009 - (Free Research)
Read this white paper to learn how new hardware-based technology, could help reduce the incidence of notebook theft. The result can be better protection of assets and sensitive data on notebooks, rapid reactivation when systems are returned, and reduced business risk. 
(WHITE PAPER) READ ABSTRACT |

Security in the Cloud: New Intel® technologies enable more secure business computing in the cloud by Intel

April 08, 2011 - (Free Research)
Intel has developed new technologies to help improve cloud security, and has been collaborating with leading hardware and software solution providers to enable more comprehensive and integrated solutions that can make it easier for businesses to adopt cloud computing. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts