Understanding of laws, obligations key to data privacy compliance

Data Privacy and Protection

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Inside the Data Accountability and Trust Act and what it means for security

    This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies archi... 

  • How automated compliance solutions can help you plan for your next audit

    This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access managemen... 

  • Reflections on the impact of Sarbanes-Oxley

    Love them or hate them, Michael Oxley and Paul Sarbanes changed the information security landscape. Read reflections on the legislation's impact, the role of the Web and how CISOs have emerged and matured. 

  • Compliance vs. security: Prevent an either-or mentality

    Do you have to choose between compliance and security? This issue explains strategies to prevent an either/or mentality. Also, read features on sorting out enterprise UTM and reviews of six device control tools. 

  • Tips for navigating the maze of global security regulations

    In this month's issue of Information Security magazine, learn how to navigate the maze of inconsistent global regulations. Read a product review of PatchLink's PatchLink Update 6.3. Learn how to achieve compliance with HIPAA certification and learn t... 

  • Captive to SOX compliance? A compliance guide for managers

    In this month's issue of Information Security magazine, SureWest's Tim Dotson meets SOX compliance with tightened password controls. We review NFR Security's Sentivist 5.0, Centennial Software's DeviceWall 3.1, and more. In the editor's letter, read ... 

  • privacy policy

    A privacy policy is a document that explains how an organization handles any customer, client or employee information gathered in its operations. Most websites make their privacy policies available to site visitors.  A privacy page should specify any... 

  • Cyber Intelligence Sharing and Protection Act of 2011 (CISPA)

    The Cyber Intelligence Sharing and Protection Act (CISPA) of 2011 is a proposed United States federal law that would allow for the sharing of Web data between the government and technology companies. 

  • cypherpunk

    Cypherpunk, a term that appeared in Eric Hughes' "A Cypherpunk's Manifesto" in 1993, combines the ideas of cyberpunk, the spirit of individualism in cyberspace, with the use of strong encryption (ciphertext is encrypted text) to preserve privacy. 

  • Data Encryption Standard (DES)

    Data Encryption Standard (DES) is a widely-used method of data encryption using a private (secret) key that was judged so difficult to break by the U.S. government that it was restricted for exportation to other countries. 

  • P3P (Platform for Privacy Preferences)

    P3P (Platform for Privacy Preferences) is a protocol that specifies a way to determine if a Web site's security policies meet a user's privacy requirements. 

About Data Privacy and Protection

Get information and advice on data protection and privacy policy, laws and issues. Learn best practices on data theft prevention and how to avoid a data privacy incident.