February 2015
-
February 26, 2015
26
Feb'15
AT&T's high-speed service comes with a privacy fee; Google bows to privacy spot checks
AT&T's has begun rollout of a fiber-optic Internet service that furnishes customers with high-speed access, but they must pay an extra monthly charge if they want to keep their browsing habits ... Continue Reading
-
February 23, 2015
23
Feb'15
Planning, follow-up required to ensure mobile compliance and security
In this tip, learn why best practices such as continuous monitoring and third-party vetting are vital to long-term mobile compliance and security. Continue Reading
-
February 20, 2015
20
Feb'15
What changes are businesses experiencing under PCI DSS version 3.0?
New compliance requirements under PCI DSS version 3.0 strive to make cardholder data security part of companies' everyday business processes. Continue Reading
-
February 20, 2015
20
Feb'15
agreed-upon procedures (AUP)
Agreed-upon procedures are the standards a company or client outlines when it hires an external party to perform an audit on specific tests or business process and then report on the results. Continue Reading
-
February 13, 2015
13
Feb'15
Keep devices regulation ready with compliant mobile data management
In this tip, learn how to prepare and implement a mobile data management policy that protects your organization against compliance violations. Continue Reading
-
February 13, 2015
13
Feb'15
Will the new net neutrality proposal create too much regulation?
Does the latest net neutrality plan to ensure an open Internet create a regulatory burden on ISPs? Discuss with us during #GRCchat Feb. 19 at 12 p.m. EST. Continue Reading
-
February 11, 2015
11
Feb'15
FCC chairman urges strong Internet regulation; Anthem breach might set a precedent
In a bold effort to ensure net neutrality, FCC Chairman Tom Wheeler has proposed a new set of rules that would treat the Internet as a public utility and prohibit pay-to-play fast lanes. Also in ... Continue Reading
-
February 06, 2015
06
Feb'15
BYOD compliance: Keep mobile data regulation-ready
As information is increasingly stored and handled outside the traditional corporate network, companies must ensure their mobile policy addresses their organization's unique compliance obligations. In this SearchCompliance handbook, learn BYOD ... Continue Reading
-
February 06, 2015
06
Feb'15
Health data privacy regulations impacting a wide range of industries
Navigating health data privacy compliance requirements is proving complicated for HIPAA business associates and other non-healthcare industries. Continue Reading
-
February 05, 2015
05
Feb'15
Wearables in the workplace strain existing GRC policies
Have you considered the GRC implications of wearables in the workplace? In this #GRCChat recap, participants consider the impact of wearables on established policies and how businesses can ensure data security and privacy. Continue Reading
-
February 05, 2015
05
Feb'15
Keep security controls scalable, sustainable to adapt to new threats
The constant evolution of data threats is forcing companies to continuously monitor and assess security controls to ensure they can adapt to new risks. Continue Reading
-
February 03, 2015
03
Feb'15
mobile governance
Mobile governance refers to the processes and policies used to manage mobile device access to an organization's network or its data. Continue Reading
-
February 03, 2015
03
Feb'15
information silo
An information silo exists when an organization's departments and systems cannot, or do not, communicate freely with one another and encourage the sharing of business-relevant items. Continue Reading