Government Regulations Reports

Achieve HIPAA Compliance While Keeping Data Secure
sponsored by TechTarget Health IT
EBOOK: SearchHealthIT's new handbook provides expert advice on how to navigate security, privacy, and HIPAA compliance goals.
Posted: 20 Feb 2017 | Published: 10 Feb 2017

TechTarget Health IT

Healthcare Networking Classroom
sponsored by TechTarget Health IT
VIRTUAL ENVIRONMENT: Building wireless networks for use in the healthcare field can be challenging, especially in light of HIPAA privacy and security concerns. In these classroom lessons, learn how to overcome the challenges of building these networks, and hear from one hospital that has focused on making mobile technology integration part of its long-term strategy.
Posted: 12 Jun 2013 | Premiered: 10 Jun 2013

TechTarget Health IT

Records Management Strategies to Maintain Regulatory Compliance
sponsored by TechTarget Security
EBOOK: Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
Posted: 04 Apr 2017 | Published: 04 Apr 2017

TechTarget Security

BlueCross BlueShield of Tennessee Cuts Litigation Costs With Value-based Archiving
sponsored by IBM
CASE STUDY: This featured case study outlines the portfolio of solutions BlueCross BlueShield of Tennessee, Inc. put in place to bring discovery operations back in-house – helping them save up to $1 million in third-party vendor fees. View now to learn more!
Posted: 26 Jul 2013 | Published: 31 May 2013

IBM

PCI Council issues mobile application rules for software developers
sponsored by TechTarget Security
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

Best Practices for Managing the Increasing Depth of Compliance Regulation
sponsored by IBM
EGUIDE: According to Gartner Research, 41% of corporations have employed a chief compliance officer to keep up with today’s increasingly complex compliance regulations.  Learn what actions your organization can take to ensure compliance with evolving regulations.
Posted: 18 May 2011 | Published: 18 May 2011

IBM

GDPR Developments Will Dominate Storage and Compliance in 2017
sponsored by Arrow + NetApp
EGUIDE: In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
Posted: 17 May 2017 | Published: 11 May 2017

Arrow + NetApp

IT in Europe - May 2012
sponsored by TechTarget Security
EZINE: While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.
Posted: 22 Jun 2012 | Published: 15 Jun 2012

TechTarget Security

Computer Weekly – 17 May 2016: Countdown begins to new EU data protection rules
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, with the new EU data protection rules ready to become law, firms now have just two years to prepare – we assess the challenges. Manufacturing giant Rolls-Royce talks about why it moved its HR systems to the cloud. And we look back at 50 years of technology innovation in storage. Read the issue now.
Posted: 16 May 2016 | Published: 17 May 2016

TechTarget ComputerWeekly.com

4 issues caused by retaining too much unnecessary data
sponsored by DLT Solutions
EGUIDE: Access this expert SearchDataBackup.com E-Guide to explore four problem points concerning retention of critical and unnecessary data and learn how to discern between the two.
Posted: 18 Jun 2012 | Published: 18 Jun 2012

DLT Solutions