Information technology laws

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Murkogram

    A Murkogram is spam (unsolicited commercial e-mail) that includes a disclaimer to the effect that the message cannot be considered spam because it is in compliance with Bill S.1618 Title III, known as the Inbox Privacy Act.  

  • Budgeting for compliance: Executive Guide

    The SearchCIO budgeting for compliance Executive Guide includes valuable resources and practical information and advice to help CIOs with planning and budgeting for compliance. 

  • VoIP and SOX: Tricky recipe for CIOs

    Adam I. Cohen is a partner in the litigation department in the New York office of Weil, Gotshal & Manges LLP. Nationally recognized for his work on discovery and document retention issues associated with electronic information, he is the co-author of... 

  • Advertising for help can showcase security weaknesses

    A digital forensics expert warns that online job postings detailing IT skills also broadcast potential security problems. 

  • Sarbanes-Oxley: Seven steps to CYA

    Don't repeat the same Sarbanes-Oxley mistakes you made last year. Take this tip sheet to your next compliance meeting. 

  • Compliance shouldn't be a primary security driver

    Addressing regulatory compliance won't protect your organization from attack. One analyst notes what will help with up to 80% of your security issues. 

  • A Compliance Conversation: PEMCO's Kip Boyle

    Kip Boyle was hired as chief security officer of Pemco Corp. in October 2003. Compliance was not originally part of the job. But as compliance activities grew and became more important at his organization, Boyle was asked to take on the role of corpo... 

  • Data breach law goes too far, critics warn

    Congress wants to pass a national data breach disclosure law, but concerns over too many security breach reports dulling public fear has slowed the process. 

  • Deloitte: Value, compliance among top 10 challenges for CIOs

    Deloitte consultants have found 10 challenges and opportunities are most pressing for CIOs in 2005. They've also found that the CIO has become an essential part of the executive suite. 

  • E-legal and IMbarassing – CIOs must help tame e-mail beast

    E-mail and IM policies are crucial if companies want to stay out of the newspaper or the court. So why do so many let e-mail run wild at work?