Email Alerts
-
Policies and regulatory compliance
An overview of the type of policies needed for regulatory compliance. Information Security maga
-
Making sense of the maze
The program director of regulatory compliance for the Object Management Group discusses a new project known as Compliance Global Regulatory Information Database, which should help businesses manage regulatory compliance demands across international b... Executive Briefing
-
Ensure that legal responsibilities are clear -- Especially when trouble strikes
Excerpt from Chapter 15 of Information Nation Warrior: Information Management Compliance Boot Camp. Book Chapter
-
Nominate your peers
Security Seven Awards
-
Do you speak geek: Respecting the letter of the law
Test your knowledge of security laws and regulations. Quiz
-
Quiz: Compliance
Test your knowledge of legislation and standards. Quiz
-
Regulators issue standardized privacy notice form for GLBA compliance
Model form aims to make it easier for consumers to understand banks' privacy policies and help financial institutions meet GLBA requirements Article | 17 Nov 2009
-
Getting compliance on the GRID
The Object Management Group is attempting to build a database that may one day serve as a clearinghouse for all the world's IT-related regulations. Some say it's impossible, but others say it's badly needed to keep companies secure and out of the leg... Article | 17 Jan 2008
-
IBM to boost security spending, push PCI DSS program
IBM plans to invest $1.5 billion on security research in 2008. The company is also using recent acquisitions to introduce a PCI DSS program. Article | 01 Nov 2007
-
ISO 27001 could bridge the regulatory divide, expert says
Karen Worstell, former CISO at Microsoft and AT&T Wireless, recently joined the advisory board of Neupart A/S, a five-year-old European security risk management and awareness firm that just launched a North American office in the Seattle area. The co... Interview | 11 Jul 2007
-
Where hard drives go to die, or do they?
A number of enterprises are using asset disposal firms to ensure sensitive corporate data is destroyed, but the process is hardly foolproof. In fact, a convicted felon could have his hands on your data right now. Article | 04 May 2006
-
CSOs seek regulatory sanity in 2006
IT security officers long for a common system to comply with laws that are similar, but often have conflicting demands. Some say a single set of federal guidelines could help, but others fear the implications. Article | 26 Dec 2005
-
Active Directory getting critical look from regulators
Auditors are honing in on directory services to see if companies have internal controls now mandated by law. Article | 27 Sep 2005
-
Cheat sheet: 10 ways to prep for auditors
There are 10 ways to prepare for those auditors knocking at your door -- and avoid wasting time and money. Article | 30 Jun 2005
-
CSO INTERVIEW: Regulatory pain is a two-way street
You might not expect someone from the agency enforcing the Sarbanes-Oxley Act to describe regulatory compliance as something bogged down with "bureaucratic overlap" that's "killing" enterprises. But that's exactly how Chrisan Herrod sees it.Interview | 30 Jun 2005
-
Experts: Better prepare for the regulations to come
Compliance officers would love it if the federal government simplified today's regulatory maze, but recent data breaches make it more likely the maze will get more confusing. Article | 23 Jun 2005
- See more News on Gramm-Leach-Bliley Act (GLBA)
-
GLBA compliance and emerging technologies
In order to meet GLBA requirements, companies must analyze the risks before moving customer information into new technologies like VoIP and cloud computing. Tip
-
Insuring compliance: Nationwide tackles GLBA
GLBA requires all financial institutions to design, implement and maintain safeguards to protect customer information. This case study reveals Nationwide's biggest task for GLBA compliance. Tip
-
Compliance guide for managers: Lessons learned and best decisions
Compliance guide for managers: Lessons learned and best decisions Tip
-
Become compliant -- without breaking the bank
Re-use your existing tools to meet regulatory demands. Tip
-
Separating fact from fiction: Security technologies for regulatory compliance
This presentation by Burton Group analyst Diana Kelley explores what companies need to think about when creating policies for compliance. Tip
-
Standards-based compliance: A how-to guide
This presentation by Dick Mackey discusses the pros and cons of using standards as the vehicles to improve regulatory compliance. Tip
-
The 5 pillars of successful compliance
Find out how to put the key benefits of what Pamela Fusco achieved at Merck & Co. to work in your own organization as she covers five key areas associated with security's role in compliance. Tip
-
What to tell senior management about regulatory compliance
The IT Governance Institute offers actionable advice for implementing security governance as it relates to regulatory compliance. Tip
-
Complying with multiple regulations and contending with conflicts
This tip reviews how to comply with multiple regulations and what to do when they conflict. Tip
-
Choosing a compliance archiving tool
Discover how compliance archiving tools are used, how they are evolving and what the competitive landscape looks like. Tip
- See more Tips on Gramm-Leach-Bliley Act (GLBA)
-
GLBA compliance and emerging technologies
In order to meet GLBA requirements, companies must analyze the risks before moving customer information into new technologies like VoIP and cloud computing. Tip
-
Regulators issue standardized privacy notice form for GLBA compliance
Model form aims to make it easier for consumers to understand banks' privacy policies and help financial institutions meet GLBA requirements Article
-
Getting compliance on the GRID
The Object Management Group is attempting to build a database that may one day serve as a clearinghouse for all the world's IT-related regulations. Some say it's impossible, but others say it's badly needed to keep companies secure and out of the leg... Article
-
Insuring compliance: Nationwide tackles GLBA
GLBA requires all financial institutions to design, implement and maintain safeguards to protect customer information. This case study reveals Nationwide's biggest task for GLBA compliance. Tip
-
IBM to boost security spending, push PCI DSS program
IBM plans to invest $1.5 billion on security research in 2008. The company is also using recent acquisitions to introduce a PCI DSS program. Article
-
ISO 27001 could bridge the regulatory divide, expert says
Karen Worstell, former CISO at Microsoft and AT&T Wireless, recently joined the advisory board of Neupart A/S, a five-year-old European security risk management and awareness firm that just launched a North American office in the Seattle area. The co... Interview
-
Policies and regulatory compliance
An overview of the type of policies needed for regulatory compliance. Information Security maga
-
Where hard drives go to die, or do they?
A number of enterprises are using asset disposal firms to ensure sensitive corporate data is destroyed, but the process is hardly foolproof. In fact, a convicted felon could have his hands on your data right now. Article
-
Compliance guide for managers: Lessons learned and best decisions
Compliance guide for managers: Lessons learned and best decisions Tip
-
Become compliant -- without breaking the bank
Re-use your existing tools to meet regulatory demands. Tip
- See more All on Gramm-Leach-Bliley Act (GLBA)
About Gramm-Leach-Bliley Act (GLBA)
In this introduction get advice about the compliance requirements of the Gramm-Leach-Bliley Act of 1999 (GLBA) and related issues such as risk assessment, auditing, violations and the nuisances of section 501(b).
Security Management Strategies for the CIO