How the Affordable Care Act impacts information security

Information Security Policies, Procedures and Guidelines

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Policy management: Manual vs. automated tools

    Whether you manage policies manually or use automated tools, it is imperative to get your policies and systems in sync. 

  • Blocking Web anonymizers in the enterprise

    As Internet privacy concerns continue to proliferate, so does the use of Web anonymizers. While these tools can help you block employee access to certain Web sites, they are also beneficial in helping employees evade your efforts. In this tip, access... 

  • Strategic IT planning for compliance and beyond

    Regulatory compliance places demands on corporate businesses, but regulations like HIPAA, GLBA and SOX also provide an opportunity for strategic IT planning across the entire business. This article tells you how. 

  • Information security podcasts: 2005 archive

    Listen to past editions of's Security Wire Weekly podcast, offering news, interviews and current events in the information Security market. 

  • Gap analysis procedures

    In this Ask the Expert Q&A, Shon Harris, SearchSecurity's security management expert advises what should be done before a gap analysis is performed, and, provides six common steps of a gap analysis, so organizations will know what to expect before th... 

  • Employee termination procedures


  • Data theft prompts firm to lock down, protect network

    After a disgruntled employee made off with several CDs of data, an automotive data reseller realized it had to install better protection at the endpoints. 

  • When 17 days of security is an 'Olympian' task

    There's no bigger target for attackers than the Olympic Games, but security managers thwarted attacks in Turin by having no patience for abnormal users or devices. 

  • Fidelity laptop snafu spotlights need for security policies

    The theft last week of a Fidelity-owned laptop containing sensitive data could have easily been prevented. Are your users paying attention when it comes to laptop security? 

  • Report: Looking for love in all the wrong places

    Data shows people are using company resources to find mates, shop, gamble and chat with friends while on the clock. Is it time for enterprises to confront the new way of doing business?