Content Controls for Regulatory Compliance

Moeller, Robert
February 2007
Security: Solutions for Enterprise Security Leaders;Feb2007, Vol. 44 Issue 2, p38
Trade Publication
The article focuses on the factors to be considered by businesses when preparing to implement effective content protection controls. Businesses should be aware about the areas where they might have some levels of unprotected information assets. Typical digital information that is at risk includes intellectual property and database lists of customers and vendors. Moreover, it is important for business to identify data assets that are vulnerable.


Related Articles

  • UK companies 'under-invest' in IT, Tory says. Thomson, Rebecca // Computer Weekly;10/9/2007, p50 

    The article presents the comments of Malcolm Harbour, the chairman of the Conservative Technology Forum, on British companies. Harbour, who is also part of the West Midlands Conservative MEP team, said that the government needs to do more to encourage British companies to invest in information...

  • Top ten tips to data security. Mitteregger, Peter // IM@T.Online;Mar2008, p1 

    The article discusses the top ten tips to data security and the four phases of data protection like detect, protect, manage and support. It states that people should not assume that the only devices that they have to protect are the ones that the organization owns. It cites that it is important...

  • Imperfect storm needs full-spectrum defense. Blum, Daniel // Network World;7/10/2006, Vol. 23 Issue 26, p31 

    The article offers advice on how to protect corporate data, avoid identity theft, and prevent corporate fraud. Companies should build a technical control system that integrates and interoperates across multiple platforms, applications, and security technologies. This requires improvements in...

  • CIOs fail to put a price on data loss. Saran, Cliff // Computer Weekly;10/14/2003, p32 

    Sixty seven per cent of information technology chiefs find it difficult to calculate the cost of losing data, according to a survey by market intelligence firm Taylor Nelson conducted on behalf of Unisys. The research also found that nearly 30% of respondents did not test their disaster recovery...

  • Managing security success. Coffee, Peter // eWeek;1/22/2007, Vol. 24 Issue 3, p26 

    The author discusses his views concerning the need for employees to be educated about data protection. According to the author, the role of every worker in considering information as an asset must be articulated clearly, monitored and assessed thoroughly and rewarded promptly when reliably...

  • Return to Sender. Gillmor, Dan // CIO Insight;Sep2005, Issue 57, p27 

    Examines the failure of companies of ensuring that personal information of consumers they gathered are being protected. Detection of lax security of businesses on the access to the information; Criticism on the notion of companies that consumers are a commodity to be bought, sold and traded...

  • SOA: No Governance Needed. Or Is It? Larrivee, Bob // AIIM E-DOC;Sep/Oct2007, Vol. 21 Issue 5, p24 

    The article focuses on the importance of governance of the organization's service-oriented architecture (SOA) for information security. SOA, as an alternative to enterprise application integration (EAI), offers greater flexibility than the more traditional methods of integration to connect...

  • Superficial security. Rothke, Ben // eWeek;2/21/2005, Vol. 22 Issue 8, p37 

    The article focuses on issues related to data protection in business enterprises. Too many organizations deploy security technologies because they feel they have to, yet they often leave them so poorly configured that they do more harm than good. Getting out of the mechanics of information...

  • Backing Into Disaster. Dickerson, Chad // InfoWorld;1/31/2005, Vol. 27 Issue 5, p20 

    This article discusses the importance of having backup and restore capabilities to information technology departments. All too often, information technology departments obsess over backup policies, but forget the most important part, the restoration of data. Every day, all over the world,...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics