SearchCompliance

New & Notable

Evaluate

Exploring GRC automation benefits and challenges

Governance, risk and compliance is a crucial enterprise task but can be costly and time-consuming. This is where GRC automation fits in. Learn about its benefits and challenges.

Get Started

How to evaluate CSPs on cloud compliance standards efforts

Get guidance on how to select relevant cloud compliance standards, along with tips on evaluating third-party providers' cloud compliance and governance efforts.

News

HHS proposes changes to HIPAA privacy rule

HHS wants to modify the HIPAA privacy rule to encourage better care coordination and make it easier for patients to access their health data.

Manage

The 3 types of open source GRC tools to know about

All organizations need to meet a variety of regulatory compliance requirements, but they don't all have the budget for GRC software. Learn about seven free, open source options.

Find Solutions For Your Project

Pro+ Compliance Downloads

View All

Compliance Management Basics

  • Get Started

    compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting from its failure to act in accordance with industry laws and regulations, internal policies or prescribed best practices.

  • Get Started

    information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and metrics that treat information as a valuable business asset.

  • Get Started

    enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be easily retrieved in the event of a compliance audit or subpoena.

View All Get Started

Multimedia

Videos, Podcasts, Photo Stories and Infographics

Blog: IT Compliance Advisor

Sections from across SearchCompliance

SearchCIO
SearchHealthIT
SearchCloudComputing
SearchDataCenter
SearchDataManagement
SearchSecurity
Close