1,039 Results for:E-discovery and compliance

  • Sort by: 

A thorough data retention strategy needs more than just IT oversight

By Kevin Beaver 27 May 2011

A data retention strategy is often considered IT's responsibility. But adhering to today's data retention requirements depends on input from many departments across the enterprise. Read More

Can you help us predict the IT compliance future?

By Ben Cole 07 Dec 2010

What will be the issues, trends and developments that will have the biggest impact on the IT compliance world in 2011? We here at SearchCompliance.com have our own thoughts about that, but we would ... Read More

The economics of application development in the cloud

24 Feb 2010

In part two of our interview with Greg Arnette, the CTO and founder of Sonian, he discusses the economics of developing applications in cloud environments. Read More

Choosing the best email security tools for your business

By Kevin Beaver 26 Feb 2014

Once you've decided to look at third-party security tools, you'll have to decide between on-premises or cloud-based options. Read More

Data classification key to IP protection, says Titus

By Warwick Ashford 29 May 2015

Data classification can help organisations get more value out of encryption and data loss prevention systems Read More

Google beefs up Search Appliance - will e-Discovery search follow?

By Beth Pariseau 02 Jun 2009

Google Inc.'s Search Appliance (GSA) got a facelift today with the release of version 6.0. The focus of the release was adding scalability. Google claims that racks full of the modular appliances ... Read More

The Web of social media and compliance: Online privacy regulations

17 Aug 2009

Compliance officers should review online privacy regulations before drafting social media usage policies that set expectations for online privacy. Read More

What online privacy expectations exist for social media use at work?

By Guy Pardon 04 Aug 2009

If you read Professor Jonathan Zittrain’s rebuttal on cloud computing to Bernard Golden at CIO.com today, you know that both agree that privacy is the No. 1 concern for cloud computing. Compliance ... Read More

PCI encryption requirements: Limiting PCI scope with P2P encryption

By Ed Moyle 30 Nov 2010

P2P encryption, or encryption of data in transit, has long been a point of confusion for PCI DSS-bound merchants. In this tip, expert Ed Moyle explains the PCI SSC's recent guidance on P2P encryption. Read More

Building digital trust: Making the most of your information assets

By Ben Cole 06 Feb 2014

Corporate success is increasingly reliant on information asset management. Jeffrey Ritter explains why building 'digital trust' can help. Read More