Complying with new COPPA regulations

Data Privacy and Protection

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Interpreting 'risk' in the Massachusetts data protection law

    After many changes, it appears that the recent Massachusetts data protection law is here to stay. Contributor David Navetta reviews the important, ambiguous places in the legislation that your legal and compliance teams must zero in on in order to av... 

  • Strategies for using technology to enable automated compliance

    Enterprise compliance programs depend on a variety of people, data and processes, so it's no surprise that many organizations seek to implement automated compliance with the help of technology. However, such efforts can easily fail without due dilige... 

  • How to find virtual machines for greater virtualization compliance

    When it comes to compliance and virtualization, security vulnerabilities and privacy concerns are not the only issues of interest to auditors. Managing internal virtual machines can be a major security and compliance hurdle, particularly in environme... 

  • By addressing data privacy, companies avoid public scrutiny

    Some organizations may believe data privacy laws don't affect them, but those groups may be deluding themselves. Authors Craig Norris and Tom Cadle explain why, and offer a comprehensive overview of the responsibilities that come with handling sensit... 

  • Learning the language of global compliance

    When a company expands its operations to other countries, what compliance issues confront a security manager? Expert Mike Rothman explains how data security and data privacy can be the same in any language. 

  • Breach prevention: Adding security to the purchasing process

    This tip looks at the role of purchasing and offers advice for educating your purchasing team about security to create a solid security/purchasing team. 

  • Data loss prevention (DLP) tools: The new way to prevent identity theft?

    Despite advances in perimeter technologies, data theft has become common in today's enterprises. To protect their confidential information, some security professionals are turning to an emerging technology category: data loss prevention. But don't th... 

  • Complying with breach notification laws

    Learn the general requirements of breach notification laws modeled after the California Security Breach Information Act and strategies for compliance. 

  • Privacy and your offshore operations

    Most companies are used to considering the implications of Sarbanes-Oxley and Gramm-Leach-Bliley on their domestic operations, but thinking about security and privacy offshore is just as important. Contributor Joel Dubin explains how to ensure techni... 

  • Compliance Q&A: Myths, mistakes and management advice

    Keeping organizations continuously compliant with multiple complex and ever-changing regulatory requirements remains a challenge for many infosec pros. But if they don't shape up now, it's only going to get worse. In this interview, Rebecca Herold, C...