Understanding of laws, obligations key to data privacy compliance

Data Privacy and Protection

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • HP steps up its game in data protection

    HP boxes up Microsoft Data Protection Manager; OEMs database archiving software from OuterBay and remote backup software from Asigra for electronic vaulting service. 

  • Review: Elemental Compliance System 1.1 innovative, solid

    Information Security magazine says this tool is cool when it comes to helping enterprises meet regulatory security components. 

  • ID theft remains No. 1 worry

    For the fifth straight year, the FTC said most complaints came from identity theft victims. And that's a problem for enterprises. 

  • ISD Conference '04: Regulatory compliance in the real world

    The best way to meet "squishy" security provisions in regulations like Sarbanes-Oxley is to match appropriate controls against anticipated threats and create a defensible case to support those decisions. 

  • Privacy: Security pros should practice what they preach

    Calling privacy "a neglected area" in information security, expert Sarah Gordon says security professionals need to set an example by taking advantage of technical and policy solutions that can help mitigate risks to corporations. 

  • As security breaches increase, groups struggle over disclosure

    As organizations consider the speed and extent to which they should acknowledge network break-ins, a victim and an industry expert agree those who wait too long and offer few details risk a PR backlash that can be as bad as the breach itself. 

  • Markle task force hammers government again

    A Markle Foundation task force report suggests ways for government to get data it needs without violating individuals' privacy or civil liberties. 

  • How privacy costs impact infrastructure

    A new survey indicates companies with IT safeguards over individual data still have poor privacy policies and business practices that undermine that technology. 

  • Data assurance: E-voting still up for grabs

    This week's Super Tuesday primaries involved more computerized voting than ever—and concerns with just how tamper-proof those machines are remain. 

  • Security legislation: Where's the breach?

    Security legislation isn't all that it's cracked up to be. Find out how California's SB 1386 is letting some breaches fall through the cracks.