regulatory compliance - News, Features, and Slideshows
The Australian Communications and Media Authority (ACMA) hopes to cut bill shock with a renewed emphasis in the coming year on enforcing data usage alerts under the Telecommunications Consumer Protection (TCP) code, according to an ACMA official.
By Adam Bender | 24 October, 2014 15:10
Microsoft has extended the data loss prevention features in Office 365 so that they are available not only for its email tools but also for data in SharePoint Online and OneDrive for Business.
By Juan Carlos Perez | 28 August, 2014 05:57
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
By Juan Carlos Perez | 05 December, 2013 19:28
Microsoft today launched a searchable list of its complete patent portfolio as part of its defense of the patent system, particularly software patents.
By Gregg Keizer | 28 March, 2013 20:43
More companies are tackling how to best set up their electronic records to be able to respond to any legal requests related to "electronic discovery" to quickly find internal documents for court purposes, but this "e-discovery" process is still a struggle, a survey published today indicates.
By Ellen Messmer | 10 January, 2013 13:58
IT can never take all the risk out of a supply chain, but it can help organizations minimize their vulnerability in a world of new threats.
By Howard Baldwin | 30 April, 2014 20:04
Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful reactions.
By Chris Kanaracus | 17 June, 2013 15:56
Whitepapers about regulatory compliance
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
This Dummies Guide explains the relatively new frontier of application-aware network performance management in an easy-to-understand and straightforward way. Find out, what the biggest challenges today’s networks are facing – from BYOD and Voice over IP to increasing complexity and why the end user’s experience is what really matters.
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack
- What we know about North Korea's cyberarmy