Privacy Laws Reports

Australia's cybersecurity game plan
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, find out how the Australian government is tackling cyber security issues head-on, why local businesses continue to fall prey to ransomware and how to mitigate supply chain security risks.
Posted: 08 Feb 2021 | Published: 24 Aug 2020

TechTarget ComputerWeekly.com

Executive Interview: Unleashing blockchain's potential
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Labrys founder and CEO Lachlan Feeney offers his observations about blockchain adoption in Australia, and what his firm is doing to help organisations unleash the full potential of the technology.
Posted: 13 May 2021 | Published: 14 May 2021

TechTarget ComputerWeekly.com

Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.
Posted: 08 Feb 2021 | Published: 19 May 2020

TechTarget ComputerWeekly.com

MicroScope - July 2017: Data and storage are the themes, with GDPR and flash up for debate
sponsored by MicroScope
EZINE: An e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know.
Posted: 08 Feb 2021 | Published: 30 Jun 2017

MicroScope

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
sponsored by Information Security Magazine
EZINE: This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

Information Security Magazine

E-Book: Compliance in the EU, U.S.A.-- Learn What U.S. Companies Need to Know About European Union Compliance and Vice Versa
sponsored by TechTarget Security
EBOOK: Read this e-book to learn about compliance differences in the U.S.A. and the EU, and differences between global business continuity standards.
Posted: 05 Feb 2010 | Published: 05 Feb 2010

TechTarget Security

E-Discovery Cross-Border Data Compliance
sponsored by Exterro
WHITE PAPER: This white paper highlights two popular cross-border cases and recent developments in global data privacy laws, while also addressing common questions that legal teams are presented when faced with cross-border e-discovery issues and best practices for improving e-discovery and regulatory cross-border privacy processes.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Exterro

State of GDPR in mainland Europe
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

TechTarget ComputerWeekly.com

E-Book: Optimizing BI and Analytics in Healthcare
sponsored by Tableau Software
EBOOK: BI and analytics tools can provide healthcare organizations with valuable insights for assessing and improving patient care and better controlling costs. This E-Book provides an overview of the BI and analytics issues facing healthcare organizations, as well as advice on how to best utilize the available technologies in healthcare.
Posted: 21 May 2010 | Published: 21 May 2010

Tableau Software

Tackling the Data Security Challenge
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCompliance.com, learn about the data governance and security obstacles organizations must consider when implementing a bring your own device (BYOD) policy.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM