Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security MagazineWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Research Abstract
Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
by Information Security Magazine

> View this now

Published on: December 09, 2010
Type of content: EZINE
Format: Unknown
Length: 50 pages
Price: FREE

Overview:

This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. DATA would mandate reasonable security policies and procedures to protect data containing personal information, as well as breach notification; it would be the closest thing we have to a national data privacy law. In this article, you'll learn details about DATA, including how it defines personal information, encryption requirements outlined in the act, reporting requirements, potential penalties and more.


Also, we cover:


SECURITY’S ROLE IN VENDOR MANAGEMENT


Virtually every business depends to some extent on third parties to provide products and services.  Inevitably, some of those third parties will require access to confidential corporate and/or customer information. It is incumbent that the third party can ensure the data entrusted to them remains confidential. This article will discuss some of the key risk management principles relative to infosecurity within vendor management, including information classification, prioritization, quantification and location, and developing effective due diligence processes.


And finally:


SECURITY CONSIDERATIONS IN DISASTER RECOVERY


In planning for a disaster or outage, companies are intent on ensuring critical business processes remain operational, but they can overlook security, putting sensitive data at risk. This article will look at critical considerations, including recovery site security, and secure transmission of data to backup sites.


Sponsored By: CDW, ArcSight, Check Point, Code Green Guardium, IronKey, ISACA, NETGEAR, Inc., Security Innovation, Websense, RSA, The Academy Pro, SystemExperts, Glasshouse Technologies

> View Company Report
> View all content by this company
> Return to Search Results


         
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts