The Australian Communications and Media Authority (ACMA) hopes to cut bill shock with a renewed emphasis in the coming year on enforcing data usage alerts under the Telecommunications Consumer Protection (TCP) code, according to an ACMA official.
regulatory compliance - News, Features, and Slideshows
Microsoft has extended the data loss prevention features in Office 365 so that they are available not only for its email tools but also for data in SharePoint Online and OneDrive for Business.
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
Microsoft today launched a searchable list of its complete patent portfolio as part of its defense of the patent system, particularly software patents.
More companies are tackling how to best set up their electronic records to be able to respond to any legal requests related to "electronic discovery" to quickly find internal documents for court purposes, but this "e-discovery" process is still a struggle, a survey published today indicates.
IT can never take all the risk out of a supply chain, but it can help organizations minimize their vulnerability in a world of new threats.
Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful reactions.
Whitepapers about regulatory compliance
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
- APJ businesses think they will be breached: Here's why: Read the article NOW
- F5 Security Hub NEW Look - Try us out today
- Hear from those who have been there, done it and transformed their business for the better with AWS Cloud. View their stories and other informative AWS sessions On-Demand.
- NEW Gigamon Transform Security Zone - Find out more now!
- Help us better understand the trends and major practices related to technology use in STEM education. Take this two minute survey NOW.