IT Compliance Reports

Understanding Data Privacy and CCPA
sponsored by Micro Focus
EGUIDE: In this e-guide, get a better understanding of data privacy through two expert articles about the intersection of marketing and data privacy as well as everything you need to know about the California Consumer Privacy Act.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Micro Focus

Checklist: 5 Impactful Tips for Securing BYOD in the Enterprise
sponsored by Code42
WHITE PAPER: This comprehensive checklist includes 5 critical things to consider when constructing a mobile security strategy so that your organization can confidently utilize BYOD initiatives without worry of risk.
Posted: 24 Dec 2013 | Published: 24 Dec 2013

Code42

How to Create the Most Effective Compliance Program at Your Organization
sponsored by IntraLinks, Inc
EGUIDE: In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
Posted: 16 May 2014 | Published: 16 May 2014

IntraLinks, Inc

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Avoid HIPAA Compliance Violations Amid the Rise of BYOD
sponsored by Imprivata
EGUIDE: This expert e-guide from SearchHealthIT.com offers 5 tips on how to secure a mobility strategy so that HCOs can enjoy the benefits of a more flexible workforce while maintaining HIPAA compliance.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Imprivata

Imprivata Cortext: HIPAA Compliant Texting for Clinicians
sponsored by Imprivata
WHITE PAPER: This white paper reveals the top 2 best practices to ensure secure, HIPAA-compliant text messaging for the healthcare industry.
Posted: 11 Apr 2014 | Published: 31 Dec 2012

Imprivata

The SOX Effect
sponsored by TechTarget Security
EBOOK: In this SearchCompliance handbook, learn about the effects of SOX on corporate governance and IT operations and how to remain compliant with data retention requirements.
Posted: 20 Oct 2014 | Published: 20 Oct 2014

TechTarget Security

How to Protect the Increasingly Vulnerable Energy Industry
sponsored by IBM
WHITE PAPER: Learn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
Posted: 24 Mar 2014 | Published: 31 Jul 2013

IBM

Improving Revenue and Population Health: New Strategies for Health IT
sponsored by Medfusion
EGUIDE: Orlando Health found a way to create a more efficient and accurate revenue cycle, while saving money. But how did they do it? Plus, could the gamification of healthcare apps influence a positive change on population health? Access this e-guide to discover the answers to these question and more.
Posted: 08 Feb 2021 | Published: 02 Sep 2016

Medfusion

GRC Strategies for the Digital Business
sponsored by TechTarget Security
EBOOK: Digitization has become a fact life for businesses, but the increased data volumes and associated information security risk puts a strain on digital governance, risk and compliance resources. In this SearchCompliance handbook, learn how companies are adapting GRC budgeting and strategic processes to keep up with the speed of digital business.
Posted: 19 Aug 2016 | Published: 19 Aug 2016

TechTarget Security