New & Notable
Information technology laws News
March 26, 2013
In a big data era, one of the sacrificial lambs is personal data privacy. This is a risk for each of us and the companies we work for.
March 18, 2013
Two recent incidents point up the looming conflicts related to privacy in the workplace. Things are going to get worse before they get better.
September 05, 2012
Cloud service provider execs from Microsoft, Amazon.com, Rackspace and Salesforce.com take on the intricacies of SLAs and data ownership.
August 30, 2012
Execs from cloud providers Microsoft, Amazon, Rackspace and Salesforce speak on top customer questions: security, outages, SLAs and data ownership.
Information technology laws Get Started
Bring yourself up to speed with our introductory content
Pretexting is a form of social engineering in which one individual lies to obtain privileged data about another individual in order to engage in identity theft or corporate espionage. A pretext is a false motive. Continue Reading
This FAQ provides guidance to IT professionals on e-discovery law, including how it affects IT operations, who it affects, what's required and what penalties can be applied. Continue Reading
The Sarbanes-Oxley Act of 2002 (often shortened to SOX) is legislation passed by the U.S. Congress to protect shareholders and the general public from accounting errors and fraudulent practices in the enterprise, as well as improve the accuracy of ... Continue Reading
Evaluate Information technology laws Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
E-discovery and litigation concerns are serious responsibilities for IT staffs. Learn how to tackle them with this CIO Briefing. Continue Reading
Keeping your IT organization safe and secure is one battle. Doing it while staying in compliance with all applicable laws and regulations is another. These CIO Briefings will help you do both, and then some. Continue Reading
Compliance regulations require CIOs to be more familiar with the law than ever before. This Executive Guide offers tips, news and resources to make the job easier. Continue Reading
Manage Information technology laws
Learn to apply best practices and optimize your operations.
In this SearchCIO video, security expert Pauline Neville-Jones discusses why mapping IT infrastructure is needed to improve cybersecurity. Continue Reading
Pauline Neville-Jones offers U.S. corporations a page out of her cybersecurity awareness campaign. Continue Reading
CIO tip: Companies are getting serious about risk management plans -- and leaning on CIOs to help them. Continue Reading
Problem Solve Information technology laws Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Email does not drive records retention policy -- it's about what's in the email. With a few simple steps you can help prevent electronic discovery surprises and costly fines. Continue Reading
There's an elephant in the e-discovery room: data security, in the form of porous networks, sophisticated hackers, malicious insiders and the specter of altered electronic records. Continue Reading
Electronic discovery can turn into an e-nightmare. But an efficient and lean IT organization and a good litigation contingency plan is the key to sustained success. Continue Reading