IT Leaders: Learn the Laws Covering E-Mail Retention

Confused about which e-mails to retain, and for how long? IT leaders must demand clear guidance from the enterprise. IT can influence retention policy formation by...

Confidentiality and Non-Disclosure Agreement

Non-disclosure agreements (also known as confidentiality agreements) prohibit the communication of certain non-public business information by individuals. Use this...

IT Security 101

IT security is often overlooked and misunderstood by enterprises. Many feel that they have nothing worth stealing and any money spent on security is a wasted investment....

North American Electronic Waste Laws

A number of legislative issues can pose a liability to organizations that fail to properly dispose of obsolete computers and other electronic equipment. Use this document...

E-Discovery: What It Is and How It Affects IT

Electronic evidence is now a major deciding factor in court cases. Understand the mechanics of e-discovery prior to the acquisition or implementation of records...

Network Printers Represent Serious Security Vulnerability

Most large printers, since 2002, contain physical hard drives used to queue up items to be printed, scanned, copied, faxed and e-mailed by the machine. Ensure that your...

PCI DSS 2.0: On the Right Track!

October 2010 saw the introduction of a new version of the payment card industry data security standard (PCI DSS). Understand the implications of changes within PCI DSS...

Worth the Risk? Bringing Disease into Hospitals via Mobile Devices

Mobile devices compromise biosecurity and information security. Use management of biosecurity risks as both a carrot and stick to enhance hospital IT security compliance.

Risk Management Case Study of a Small University

A small university in the American mid-west needed to introduce its IT stakeholders to key risk concepts as part of a new, broader IT governance mission. By gaining a...

Risk Assessment Management Using COBIT 5

Engaging with Info-Tech to conduct a COBIT-based operations workshop on risk management was a natural next step.
GET HELP Contact Us
×
VL Methodology