The Stored Communications Act and workplace privacy

Information Security Laws, Investigations and Ethics

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Placing the Suspect Behind the Keyboard

    In this excerpt from chapter 11 of Placing the Suspect Behind the Keyboard, author Brett Shavers describes the life and casework of a cyber-investigator. 

  • Best of authentication 2013

    Readers vote for the top authentication products in 2013: Digital identity verification products, services and management systems. 

  • Beyond privacy policies: Practical privacy for websites and mobile apps

    Posting a privacy policy is not enough. Here's practical advice for privacy on websites and mobile apps. 

  • Security rules to live by: Compliance with laws and regulations

    Learn how complying with enterprise and federal laws and regulations affects information security and receive guidelines practitioners can use to protect themselves and their organization, in this excerpt of Chapter 3: Security Rules to Live By from ... 

  • PING with Aviel Rubin

    In this exclusive interview with Information Security magazine, Aviel Rubin, author of "Brave New Ballot" examines security problems in e-voting machines, and details why isn't just a cause for concern, it's a matter of national security. 

  • PING with Heidi Kujawa

    In an exclusive interview with Information Security magazine, Heidi Kujawa, director of enterprise architecture services for Sony Pictures Entertainment, explains how combatting piracy takes more than just keeping bootleggers out of the theaters. 

  • Steal this Computer Book 4.0: Prevent Google hacking

    Learn how to prevent Google hacking in this excerpt from Chapter 8: Stalking the Computer of "Steal this Computer Book 4.0," by Wallace Wang. 

  • The Oversight Function


  • Ensure that legal responsibilities are clear -- Especially when trouble strikes

    Excerpt from Chapter 15 of Information Nation Warrior: Information Management Compliance Boot Camp. 

  • If he had just paid the rent

    In this excerpt of Chapter 3 from "High-Tech Crimes Revealed," author Steven Branigan introduces "Wesley" and the incidents that led to a computer forensics investigation.