Tagged - privacy

Chief Privacy Officer

The role of the Chief Privacy Officer is to provide vision and leadership for developing and supporting initiatives critical to the organization's information privacy...

Data Security Policy Template

Info-Tech's Security Policy templates allow you to easily develop new policy documents.

IT Leaders: Learn the Laws Covering E-Mail Retention

Confused about which e-mails to retain, and for how long? IT leaders must demand clear guidance from the enterprise. IT can influence retention policy formation by...

E-Mail Archiving? Update the E-Mail Acceptable Use Policy

E-mail archiving adoption should trigger an evaluation of existing e-mail acceptable use policies. Enterprises should establish a clear, explicit understanding with...

IT World Canada - This e-mail message will self-destruct in ...

(25-May-10) Technology that promises highly secure, confidential and self-destructing messages over the Internet isn’t only available to top secret intelligence...

ITBusiness - Lax privacy rules get Google off the hook

(29-Oct-10) Weaknesses in privacy legislation both in Canada and the U.S. helped Google escape with a mere slap on the wrist over the StreetView WiFi snooping snafu,...

Safety on the Net: Authentication, Pseudonymity, and Resilience vs. Increasing Threats

Vint Cerf, Google's Chief Evangelist and the "Father of the Internet," joins his longtime friend Larry Smarr, himself one of the technology heroes of the age, onstage for...

Commercial Surveillance

Which are you more concerned about spying on you and your data: national intelligence agencies or corporations? If national intelligence agencies have access to virtually...

Special Letter: Cyber Security in a Mobile World

The very infrastructure we have created as an e-commerce highway has turned out to also be the preferred path for thieves and miscreants of every kind. What now? How do...

Data Protection Policy

Info-Tech's Data Protection Policy template is for internal use and ensures that data privacy best practices are supported and enforced within the organization.
Visit our Exponential IT Research Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us