Information technology laws

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • FAQ: What is the impact of e-discovery law on IT operations?

    This FAQ provides guidance to IT professionals on e-discovery law, including how it affects IT operations, who it affects, what's required and what penalties can be applied. 

  • Avoid lawsuit nightmares: New rules of engagement for e-discovery

    The revised U.S. Federal Rules of Civil Procedure went into effect Dec. 1. This report from Info-Tech Research Group reviews the new e-discovery law and offers recommendations for following the rules. 

  • Regulatory compliance management guide for CIOs

    Compliance regulations require CIOs to be more familiar with the law than ever before. This Executive Guide offers tips, news and resources to make the job easier. 

  • IT governance and legal compliance strategies for CIOs

    Between IT-related laws and governance regulations, IT executives today deal with more legal issues than ever before. These issues include compliance regulations, privacy rules and data protection. This Executive Guide provides resources to help CIOs... 

  • Compliance Theme Month

    Welcome to compliance month on Each week we'll be adding new articles, tips, columns and webcasts on compliance issues specific to (but not limited to) CIOs. Bookmark this page and check back for updates this month. 

  • Budgeting for compliance: Executive Guide

    The SearchCIO budgeting for compliance Executive Guide includes valuable resources and practical information and advice to help CIOs with planning and budgeting for compliance. 

  • pretexting

    Pretexting is a form of social engineering in which one individual lies to obtain privileged data about another individual in order to engage in identity theft or corporate espionage. A pretext is a false motive. 

  • Sarbanes-Oxley Act (SOX)

    The Sarbanes-Oxley Act of 2002 (often shortened to SOX) is legislation enacted in response to the high-profile Enron and WorldCom financial scandals to protect shareholders and the general public from accounting errors and fraudulent practices in the... 

  • Murkogram

    A Murkogram is spam (unsolicited commercial e-mail) that includes a disclaimer to the effect that the message cannot be considered spam because it is in compliance with Bill S.1618 Title III, known as the Inbox Privacy Act.  

About Information technology laws

Information technology and the law are closely related, given compliance regulations, IT standards and other guidelines CIOs must follow -- and when they don't, or things go wrong, there's a good chance it'll make the news. Find the latest information regarding IT and the law in this topic section.