X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 policy privacy


Microsoft Hopes to Win Over Consumer Privacy Advocates
Microsoft aims to assist users understand privacy issues by embedding privacy agents into its web browser

policy privacy  equally clear. An opt-in policy clearly provides more protection to surfers than an opt-out policy; just as clearly it can have the effect of scaring users for no good reason. As Microsoft itself notes, cookies offer many advantages to surfers if they are not misused. Surfers should know that they can block cookies in their browsers even now. There are also software packages that can block ads from appearing on web pages. For the truly paranoid, security engineers do have the ability to block Internet

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Firewall RFI/RFP Template

Firewall Type, Decision Engine, Scalability, Network Interfaces, Operating Systems, Routing and Network Protocols, SNMP, NAT, Policy Features, Proxies, Authentication, Logging, Content Filtering, VPN and Encryption, Attack Resiliency, Certification, and more 

Start Now

Documents related to » policy privacy

Yet Another Crumby Cookie Story


Take a company with a simple and honest business model but without all of its privacy policies clearly stated and a second company which a gift for hyperbole. Mix well, bake at 350 degrees, and take out the faux cookie disaster story of the week. Serve with crow.

policy privacy   Read More

DoubleClick Merger Good News For Privacy Advocates?


DoubleClick agreed to purchase NetCreations in a stock exchange valued at $191 million. NetCreations is the leader in ethical direct mail advertising. DoubleClick’s policies have led to protests and front-page news. How will a marriage between these two kids from different sides of the tracks work out?

policy privacy   Read More

I Know What You Did Last Week - But I'll Never Tell


Internet advertising is under attack from privacy advocates and private citizens as DoubleClick reveals that it can correlate surfing behavior with individual identities. DoubleClick points out that this is only possible when the personal identification is provided voluntarily. Opponents question whether the average surfer understands the implications of providing information.

policy privacy   Read More

Ponemon Institute


Ponemon Institute conducts independent research on privacy, data protection, and information security policy with the goal of enabling organizations in both the private and public sectors to have a clearer understanding of the trends in practices, perceptions, and potential threats that will affect the collection, management, and safeguarding of personal and confidential information about individuals and organizations. 

policy privacy   Read More

Bullet-proofing Instant Messaging


As more corporations adopt instant messaging (IM), chief information officers (CIOs) and IT managers are learning that it can be a serious source of liability and security exposure. Users, it seems, simply don’t understand the losses and exposures that can result from incautious IM use. Find out how security software solutions can help you reap the benefits of IM without exposing your company to unnecessary risk.

policy privacy   Read More

E-mail Archiving: A Business-critical Application


Small and medium businesses are especially vulnerable to disruptions caused by e-mail loss, compliance demands, and the threat of e-discovery. Yet these companies may not have adequate resources to deal with these risks on their own. Learn how your business can benefit from e-mail archiving, and in particular a hosted e-mail archiving service, to combat data loss, and realize greater productivity and competitiveness.

policy privacy   Read More

Feds Buckle Down on Customer Information Security


In an effort to improve the state of consumer privacy, Federal Reserve Board, the Federal Deposit Insurance Corporation (FDIC), the Office of the Comptroller of the Currency (OCC), and the Office of Thrift Supervision, on January last year announced that they have put together joint guidelines to safeguard confidential customer information. The guidelines, that took effect last July, implement section 501(b) of the Gramm-Leach-Bliley Act (GLBA) initiated by the Senate Banking Committee, and passed into law on November 4, 1999. This announcement had significant implications for online banking institutions.

policy privacy   Read More

Managing Mobile Devices in a Device-Agnostic World


As the “bring your own device” (BYOD) trend sweeps across the business world, it raises a huge management challenge for many companies. It changes who within an organization gets access to mobility. It also affects the way a business operates, with implications that go far beyond simply IT. BYOD presents new, fundamental questions about security, liability, and cost. Answers depend on two aspects of mobility management: device management policy and the technology used to fulfill and enforce a policy.

policy privacy   Read More

Case Study: Agitar Technologies


Agitar provides Java testing solutions to its customers around in the world in various industries. Agitar has been using a network licensing platform since 2004, and now offers floating licenses from a re-distributed server, with stand-alone license server or embedded options. Unlike other license servers that can’t be embedded, there’s no separate licensing process. Learn how this benefits Agitar—and its customers.

policy privacy   Read More

Bring Your Own Device (BYOD) Policy Guidebook


Whether yours is a large multinational organization, a midsize regional company, or anything in between, you should consider implementing bring your own device (BYOD) policies that meet your company’s specific needs. Any decisions about your policies should be made by your executive management, IT, HR, finance, and legal teams. It is important that your decisions fit your company needs, meet your financial goals, and consider the security, legal, regulatory, tax, and other requirements that exist in the countries where you do business. This policy guidebook will answer common questions and help you through your policy development process.

policy privacy   Read More