Understanding of laws, obligations key to data privacy compliance

Data Privacy and Protection

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • How to prepare for a FERPA audit

    Does your educational institution have to comply with FERPA? David Mortman, security management expert, explains what FERPA requires for school records and what to do when your FERPA audit is right around the corner. 

  • Quiz: Virtualization and compliance

    How much have you gleaned from this Virtualization and compliance Security School lesson? Test you knowledge of cloud compliance best practices and the future of virtualization compliance. 

  • How to find virtual machines for greater virtualization compliance

    When it comes to compliance and virtualization, security vulnerabilities and privacy concerns are not the only issues of interest to auditors. Managing internal virtual machines can be a major security and compliance hurdle, particularly in environme... 

  • Researchers predict SSNs, crack algorithm putting identities at risk

    The success rate is as high as 90% for individuals born after 1989 in less populous states. Some data was gleaned from social networking sites. 

  • Compliance in the cloud

    Rena Mears, global and U.S. privacy and data protection leader at Deloitte, discusses how cloud computing is transforming data classification and security. 

  • PCI compliance requirement 3: Protect data

    Ed Moyle and Diana Kelley review Requirement 3 of the Payment Card Industry Data Security Standard: Protect cardholder data. It's not as simple as it sounds. 

  • Mass. Senate seeks to amend, weaken data breach notification law

    A bill being discussed in the Massachusetts Senate proposes major changes to the state's data breach notification law, including encryption requirements and the law's jurisdiction. 

  • Kodak CISO on virtualization, compliance

    Kodak CISO Bruce Jones on compliance issues, cloud computing and virtualization. Also, security analyst Eric Ogren on virtualization and other trends from the 2009 RSA Conference. 

  • Federal efforts to secure cyberinfrastrucure

    RSA 2009: Former White House senior advisor Paul Kurtz and James Lewis, director of technology policy at the Center for Strategic and International Studies talk about the state of cybersecurity readiness at the federal level. 

  • How automated compliance solutions can help you plan for your next audit

    This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access managemen...