Tools Required to Intercept and Obstruct Terrorism Act of 2001 Reports

Europe's controversial digital vision for the next decade
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the European Parliament's digital vision for the next decade, including controversial plans for a regional internet. GDPR is two years old – we find out how well the law is working. And we look at how the coronavirus crisis is affecting digital skills recruitment and training.
Posted: 08 Feb 2021 | Published: 16 Jun 2020

TechTarget ComputerWeekly.com

Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

Declaration by David Godkin with 218 exhibits – 17 May 2018
sponsored by TechTarget ComputerWeekly.com
RESOURCE: A declaration by David Godkin, counsel for app developer Six4Three, producing 218 exhibits. The exhibits cover a wide range of material relating to Facebook, including news cuttings, press releases and blog posts. The exhibits present a timeline of what was publicly known and when.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

CW ANZ: Trend Watch – Security
sponsored by TechTarget ComputerWeekly.com
EZINE: With regulations pushing data protection up the business agenda, we look at how Australia's Notifiable Data Breaches scheme has been received and consider why a survey that found Australian firms are experiencing fewer cyber breach incidents appears to conflict with anecdotal evidence that suggests the opposite.
Posted: 08 Feb 2021 | Published: 18 Jul 2019

TechTarget ComputerWeekly.com

e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk
sponsored by Symantec Corporation
BOOK: This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance.
Posted: 01 Jul 2008 | Published: 01 Jul 2008

Symantec Corporation

Live Chat: Data Integration and Analytics in Healthcare: Unleash the Power of Your Information
sponsored by Orion Health
PRESENTATION TRANSCRIPT: Join Micky Tripathi, President and CEO of the Massachusetts eHealth Collaborative as he tackles data integration and analysis in health care. Turn your data challenges into opportunities with tips and advice from one of the industry's foremost experts.
Posted: 07 Feb 2013 | Published: 07 Feb 2013

All resources sponsored by Orion Health

Using ICD-10 Codes and Electronic Health Records to Achieve Value
sponsored by DellEMC and Intel®
WHITE PAPER: This white paper demonstrates how adopting ICD-10 and EHRs can provide information that would be useful to streamlining administrative burdens that plague both health plans and providers.
Posted: 20 Jun 2012 | Published: 20 Jun 2012

DellEMC and Intel®

ERP Software Selection Criteria for Midsized Businesses
sponsored by Sage Software
EGUIDE: In this E-Guide, you will gain practical advice and best practices for choosing an ERP system from Jim Shepherd, senior vice president of research for AMR Research.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

Sage Software

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: 17 Apr 2014 | Published: 17 Apr 2014

IntraLinks, Inc

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act
sponsored by Information Security Magazine
EZINE: This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

Information Security Magazine