privacy

Results 101 - 125 of 368Sort Results By: Published Date | Title | Company Name
Published By: Druva     Published Date: Oct 02, 2017
To best address HIPAA compliance, maintain productivity, and mitigate risk in the mobile age, HIPAA-regulated enterprises need to ensure high standards of data security and privacy on all endpoint devices that contain or have access to protected health information (PHI). Get this white paper to learn: What HIPAA means for data on endpoint devices Features you should look for when evaluating endpoint backup solutions How to maintain HIPAA compliance whether data is stored on-premise or in the cloud What other organizations are doing to comply with HIPAA/HITECH
Tags : 
hipaa, hipaa compliance, risk mitigation, data security, endpoint devices, protected health information
    
Druva
Published By: Druva     Published Date: Oct 02, 2017
There is increasing urgency for organizations today to comply with regional data protection regulations or face potential financial and legal repercussions, and customer backlash. This awareness is heightened by recent headlines related to data breaches, rising risks of BYOD, and other privacy lapses that have bottom line and reputational consequences. Learn how to prepare for this new world of data privacy with actionable advice for senior IT leaders addressing data privacy concerns in their organizations. This paper covers key issues to consider when it comes to protecting corporate and employee data privacy, including: Sectorial regulations, including HIPAA and FINRA Evolving Data Protection Acts in EU countries with a strong focus on citizen privacy, data residency requirements, and concerns over data production BYOD policies blurring the lines between personal and business data Internal controls for safeguarding PII & PHI
Tags : 
data breaches, data privacy, hipaa, finra, byod, pii, phi
    
Druva
Published By: IBM     Published Date: Jul 09, 2018
If your organisation carries out business in the European Union, then you may be aware that your life is about to become a lot more complicated starting in May 2018. That’s when the new EU General Data Protection Regulation (GDPR) will take effect. IBM is positioned to help you develop strategies to address the challenges of the GDPR. Our Pathways for GDPR readiness are phased programme engagement points and cognitive capabilities which can accelerate your journey. This new, stronger regulation will aim to harmonise data protection across all 28 EU Member States. In some cases, it will merely strengthen or enhance specific rights which are already in place under many local data privacy laws, whilst other rights and obligations will be introduced for the first time.
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
The EU General Data Protection Regulation (GDPR) has arrived. Every company doing business with European customers — regardless of location — must make considerable governance, people, process, and technology changes to comply with the new rules. While companies have made progress, more work remains. To succeed, they must tackle key challenges, including data identification, mapping, and access management. Despite the work ahead, forward-looking businesses understand GDPR is an opportunity. This is a transformation for a data-savvy world, with the potential to yield enhanced customer and business benefits. Investment in solutions with data privacy, security, and compliance offerings that can protect data no matter where it’s stored — on-premises and in the cloud — can ease companies along their readiness journeys and help them achieve and sustain compliance from May 25, 2018, and onward
Tags : 
    
Group M_IBM Q418
Published By: Group M_IBM Q418     Published Date: Oct 23, 2018
Trust can be viewed as a key factor amongst clients and service providers working together towards preparing for readiness with the EU General Data Protection Regulation (GDPR). These stringent regulations come into force in May 2018 to ensure that personal data is processed adhering to strict privacy and security requirements.
Tags : 
    
Group M_IBM Q418
Published By: Amazon Web Services EMEA     Published Date: Sep 09, 2019
This document provides information to assist customers who want to use AWS to store or process content containing personal data, in the context of common privacy and data protection considerations. It will help customers understand:
Tags : 
    
Amazon Web Services EMEA
Published By: Dataguise     Published Date: Aug 20, 2019
Co-presented by Dataguise and Amazon Web Services (AWS), this webinar looks at ways this highly regulated industry uses cloud-based technology to manage data governance and data privacy compliance across multiple services within AWS, including S3, RDS, Aurora, and Redshift. This is especially important given new data privacy laws set forth by the General Data Protection Regulation (GDPR) and the California Consumer Protection Act (CCPA) of 2018. You’ll learn specific steps to take toward successful data privacy compliance.
Tags : 
    
Dataguise
Published By: Selligent Marketing Cloud     Published Date: Sep 24, 2019
Today’s connected consumer expects highly personalized experiences that feel effortless and that respect his or her privacy.
Tags : 
    
Selligent Marketing Cloud
Published By: Schneider Electric     Published Date: Feb 17, 2017
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. This knowledge of how these platforms should be developed and deployed is helpful when evaluating the merits of remote monitoring vendors and their solutions.
Tags : 
cyber security, energy efficiency, power and cooling systems, mean time to recovery, mttr, data privacy, cloud-based platforms, digital remote monitoring, data center
    
Schneider Electric
Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper examines how states like Massachusetts have implemented one of the most stringent and far-reaching requirements for protecting consumer data and how organizations of all sizes can meet the privacy requirements with simple, scalable encryption technologies.
Tags : 
consumer privacy regulation, globalsign, biowrap, encryption solutions, wisp, compliance, personal information, security breach
    
Globalsign Inc.
Published By: Globalsign Inc.     Published Date: Apr 01, 2011
This white paper examines how states like Massachusetts have implemented one of the most stringent requirements for protecting consumer data and how organizations of all sizes can meet the privacy requirements with simple, scalable encryption technologies.
Tags : 
consumer privacy regulation, globalsign, biowrap, encryption solutions, wisp, compliance, personal information, security breach, encryption, privacy, meeting privacy regulations
    
Globalsign Inc.
Published By: uberVU via HootSuite     Published Date: Jan 17, 2014
Customers now expect the same level of service on social media from financial firms, insurance providers, and other regulated enterprises as they receive from technology and retail companies. But without the right compliance controls in place, your organization could violate customer privacy rules and other regulatory guidelines. Are you taking the right steps to ensure compliance?
Tags : 
compliance, social media, social media management, enterprise, hootsuite
    
uberVU via HootSuite
Published By: Good Technology Corporation     Published Date: Oct 23, 2012
Read this whitepaper to learn how to enable mobile collaboration while maintaining data security and strict end user privacy -whether on BYOD or a mix of corporate- and employee-owned devices.
Tags : 
virtualization, collaboration, enterprise applications, cloud computing, mobility management, mobile collaboration
    
Good Technology Corporation
Published By: xMatters     Published Date: Sep 22, 2014
When it comes to data breaches and service outages, it’s no longer a question of if but when. Governments worldwide increasingly have new laws, pending legislation, privacy regulations and “strong suggestions” for protecting sensitive information and taking action when breaches or service outages occur. Get the Complimentary White Paper and learn how you need to prepare for these new laws and more. The white paper examines current regional legislation and how you can implement communication best practices for maintaining transparency and trust in the face of consumer-facing service disruptions.
Tags : 
communication, best practices, data, breaches, enterprise, consumer, confidence, science, attacks, outages, transparency
    
xMatters
Published By: NetApp     Published Date: Mar 06, 2018
This Gartner Report on an effective hyperconvergence strategy includes their research findings and recommendations. It also includes a deep dive analysis of key determinants in a hyperconverged solution decision. For more information, please view our privacy policy here.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Blue Coat     Published Date: Feb 04, 2016
Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances: **Give your security devices an instant look at SSL-encrypted traffic **Protect user privacy **Allow you to control SSL’s use.
Tags : 
    
Blue Coat
Published By: Blue Coat     Published Date: Feb 09, 2016
This Blue Coat white paper details potential issues to consider before using cloud services; and how encryption and tokenization can enable you to safely adopt the cloud while adhering to appropriate guidelines.
Tags : 
    
Blue Coat
Published By: Blue Coat     Published Date: Feb 09, 2016
Don’t let SaaS data security concerns stop you from migrating to the cloud. Learn how encryption and tokenization satisfy legal requirements and industry mandates for protecting sensitive data in SaaS cloud applications.
Tags : 
    
Blue Coat
Published By: SailPoint Technologies     Published Date: Aug 02, 2019
Don’t risk severe financial penalties from CCPA non-complance. Download this brief to find out how to protect your customer data with SailPoint identity governance.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Aug 02, 2019
CCPA is yet another regulation that carries significant financial penalties for non-compliance. Download this eBook to learn how your business can meet the requirements.
Tags : 
    
SailPoint Technologies
Published By: SailPoint Technologies     Published Date: Sep 05, 2019
If you’re not controlling access to documents, spreadsheets, presentations and reports stored in the cloud, your organization is significantly more vulnerable to security breaches and data privacy compliance penalties. Download this white paper to find out why. .
Tags : 
    
SailPoint Technologies
Published By: Workday     Published Date: Feb 27, 2018
The benefits of cloud computing—a high return on investment, greater staff efficiencies, optimisation of IT resources, plus enhanced visibility and access to information—have piqued the interest of CFOs and finance leaders who are actively evaluating the risks versus the rewards of the cloud delivery model. Although a steady migration to the cloud is happening in many areas of the enterprise, finance professionals still have questions regarding the security, performance, privacy, risks and the actual cost and value of cloud computing. Download this whitepaper today and discover the benefits of moving finance operations to the cloud, and how it can drive sustainable ROI.
Tags : 
cloud, computing, workday, migration, enterprise, security, privacy
    
Workday
Published By: Workday     Published Date: Feb 01, 2019
"Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say."
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Workday     Published Date: Feb 01, 2019
Data privacy and cyber security have become an even bigger risk and priority for businesses. Workday surveyed more than 670 finance leaders to get their perspective on the future of the finance function, top risks leaders face today, and how resilience can mitigate risk. View the infographic to see what they have to say.
Tags : 
finance, workday, workforce technology, digital strategy
    
Workday
Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
The General Data Protection Regulation – or GDPR – is a European Union (EU) law that protects the rights of individuals with respect to their data. Adopted as an EU law in April 2016, organizations that hold data about any resident of the EU must be compliant by May 2018. With attention-grabbing fines of €20 million or 4% of global annual turnover, GDPR commands attention at the highest levels. And despite the “legalese” that compliance suggests brands utilize, the brands that balance legal compliance with a human approach will turn GDPR to their advantage. This white paper provides a series of actions you can take to make the most of GDPR to both enhance your customer relationships and mitigate risk.
Tags : 
data driven marketing, gdpr, compliancy, data privacy, customer data, omnichannel, multichannel, automation, loyalty, crm, marketing, personlisation, campaign management, customer marketing, retention marketing, marketing cloud, marketing solution, marketing platform, artificial intelligence, prediction learning
    
Selligent Marketing Cloud
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.