Developing a sound data protection strategy is one of the more complex tasks faced by today's IT organizations. Historically speaking, many companies have been concerned about data protection only from access (i.e., authentication and authorization), backup and recovery or business continuity perspectives. Today, an increasing number of regulatory requirements that govern the protection of personal information (e.g., health records, financial statements, credit/debit card information, social security numbers etc.) are driving increased company efforts to protect information and guard against the various ways it may fall out of their control.

http://searchstorage.bitpipe.com/detail/RES/1199459074_778.html? src=wc_sstr_fgru_01_21_08&li=86737&asrc=EM_FGMC_2924825&uid=6570353

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: GET IBM-MAIN INFO
Search the archives at http://bama.ua.edu/archives/ibm-main.html

Reply via email to