regulatory compliance - News, Features, and Slideshows
The Australian Communications and Media Authority (ACMA) hopes to cut bill shock with a renewed emphasis in the coming year on enforcing data usage alerts under the Telecommunications Consumer Protection (TCP) code, according to an ACMA official.
By Adam Bender | 24 October, 2014 15:10
Microsoft has extended the data loss prevention features in Office 365 so that they are available not only for its email tools but also for data in SharePoint Online and OneDrive for Business.
By Juan Carlos Perez | 28 August, 2014 05:57
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
By Juan Carlos Perez | 05 December, 2013 19:28
Microsoft today launched a searchable list of its complete patent portfolio as part of its defense of the patent system, particularly software patents.
By Gregg Keizer | 28 March, 2013 20:43
More companies are tackling how to best set up their electronic records to be able to respond to any legal requests related to "electronic discovery" to quickly find internal documents for court purposes, but this "e-discovery" process is still a struggle, a survey published today indicates.
By Ellen Messmer | 10 January, 2013 13:58
IT can never take all the risk out of a supply chain, but it can help organizations minimize their vulnerability in a world of new threats.
By Howard Baldwin | 30 April, 2014 20:04
Revelations over the U.S. National Security Agency's Prism surveillance program have much of the general public in uproar, but in terms of the controversy's impact to enterprise IT, some CIOs have measured, albeit watchful reactions.
By Chris Kanaracus | 17 June, 2013 15:56
Whitepapers about regulatory compliance
As your organization implements BYOD, it’s important to maintain compliance with data security and privacy regulations. This paper provides some key best practices to avoid problems and stay vigilant. • Poor compliance can result in financial penalties, litigation and damage to your company’s reputation • Make sure you have the IT solutions you need to avoid data leaks, avert data loss and prevent unauthorized access to information • Employ solutions designed to streamline BYOD management and simplify the process of proving compliance
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
- Google's Project Loon close to launching thosands of balloons
- Shape-shifting robot reveals secrets of Fukushima reactor
- FCC faces seventh net neutrality lawsuit
- Next on the Office expansion list: Windows 10 phone apps
- Why investors are so excited about Slack
- First Apple Watch health IT apps bring important messages to the wrist
- Insurance company now offers discounts -- if you let it track your Fitbit
- Apple's 12-inch MacBook can use third-party USB Type-C cables
- Gurucul identifies cloud threats based on identity, behaviors
- Microsoft shows impressively accurate hand-tracking system for VR
- Docker update speeds and organizes container deployments
- Facebook tries to keep it real by killing more 'fake' likes
- Feds lay down social media rules; enterprises should, too
- Should computers determine how our kids learn to talk? Maybe not
- Keep Windows 10 preview up to date -- or face a dead PC