• What is the speed of a PCI-X expansion bus?

    What is the speed of a PCI-X expansion bus?

    Babyc12095 pointsBadges:
  • TAPI

    Is quick books TAPI compliant?

    Bevbouv5 pointsBadges:
  • Is Outlook 2007 IRM HIPAA compliant?

    Trying to figure out if by using Permissions in Outlook 2007 to encrypt and password protect information--it that considered HIPAA compliant?

    ITKE361,740 pointsBadges:
  • How soon is PCI scan required on new application?

    Hello, The larger team I work in is about to release a new ecommerce website that allows the secure storage and usage of personal and corporate credit cards. As far as system components go, the payment card info. is stored securely in Oracle and the DB itself is in the private network behind a...

    U00bka5 pointsBadges:
  • Oracle licensing: I need the documents related with the file F0092

    Needs to identify named users in JDE World and One World to ensure compliance with Oracle Licenses. A user may have multiple profiles in multiple environments which in Oracle's eyes would be counted as one named user We are looking at using the following fields to capture a unique identifier that...

    Bhuvanendar5 pointsBadges:
  • Industry standard SOX audit checklist?

    Working through SOX compliance issues with updated infrastructure, documented interfaces, reviewed controls and on and on -- but is there an industry SOX audit checklist to show exactly what auditors are looking for concerning compliance? If so, would someone point me to it? Thank you. Moderator...

    BrentSheets6,925 pointsBadges:
  • Free IT Book: Stealing the Network

    This week's free IT book is a little bit different than the ones we usually feature. Stealing the Network from Sygress contains fictional stories of real life possibilities meant to inspire security and technology pros alike to wonder and muse on the what ifs of security vulnerabilities. For a...

    MelanieYarbrough6,345 pointsBadges:
  • FDA Regulatory Requirements for data center

    Is anyone knowledgable on the FDA regulatory requirements for data centers?

    Eduzo5 pointsBadges:
  • Auditing Feature

    Anyone know the best source (Slides,Simulation,Graphical representation) from which I totally get guideline how to use auditing and Even viewers feature in Windows Server 2003. Thanks Muhammad Usman

    Muhammad usman125 pointsBadges:
  • FINRA Guide to IT Compliance

    I am looking to set up a whole new network infrastructure for an Investment Bank - DATA and VOICE - covering ALL of their devices - onsite and remote. Does FINRA or anyone for that matter a publish a comprehensive guide with rules and regulations?

    Davidavdavid5 pointsBadges:
  • Checklists for Router, Firewall and Switch security

    I have recently been shifted to Information security audit department. I need some checklists to check the security compliance for Router, Switch, and Firewall. Please provide me some checklists to audit the same.

    ISMS130 pointsBadges:
  • Do I need digital certificates to be sox compliant?

    Dear LS, I'd like to understand to which extend I need digital certificates (PKI) in order to be in compliance with current most important regulations including sox, but also other relevant regulations that might be applicable. This includes topics like WIFI within an Enterprise on a Global scale...

    Mhoddenbagh5 pointsBadges:
  • Is it practical to track all changes to our infrastructure at every level for compliance?

    For compliance reasons, we need to track all changes to our infrastructure at nearly every level (physical, software/patches, and policy changes). Is this practical? This question was asked during the Microsoft System Center live chat on IT Knowledge Exchange in January 2010.

    ITKE361,740 pointsBadges:
  • Who is authorized to give ISO compliance?

    I have a set of test cases for testing various applications and their integration in a Telco. Now I want to have ISO compliance for these Test Case. Who is authorized to give ISO compliance?

    SatyaDas5 pointsBadges:
  • CPOE compliance – General entry vs CPOE

    As a Urology practice we have many older patients with LONG histories and medication lists that have been provided by the referring PCP.  Can a "Non Credentialed" staff member transfer the PCP information into our EHR as a "PRELOAD" prior to appointment date and then allow the patient to review...

    MARYJOCC4SURGERY5 pointsBadges:
  • HIPAA Compliant Server in Amazon EC2

    Hi, I have an instance in Amazon EC2 and need to be HIPAA compliant. I have two doubts, 1. Should I need to do a block level encryption of the database storage. 2. Should I need to encrypt sensitive data before storing in the database. 3. Best database software to handle with the encryption Any...

    Rinshad5 pointsBadges:
  • What do you think of the NSA programs that monitor Internet activity and phone records?

    After news broke of the U.S. National Security Agencies (NSA) access to information from a large segment of Internet traffic (social media and domestic companies), discussions about national security and online privacy issues have reached a new high. What do you think of the NSA programs that...

    Michael Tidmarsh38,530 pointsBadges:
  • Experience with Change Management Software

    Currently evaluating solutions for iSeries, WDSC & Websphere running on Linux on PCs. Down to Aldon & Turnover. Anyone have enough experience with these products to compare strengths & weaknesses in production?

    Formula10 pointsBadges:
  • Information security questions

    Hi everyone, I am new to this field as a 2nd career, previously was in mfg. engineering for a lot of years. Need some help with the following questions for a class I am taking. Need to get feedback with professionals in the field to determine what issues they think are important for information...

    FrankAZ0 pointsBadges:
  • Data vs. perimeter vs. network security

    A short time ago, author Wes Noonan wrote some tips for SearchWindowsSecurity.com about deperimeterization. He explained how security is always pitted against business needs, and perimeters have become porous because businesses require traffic from SMTP, HTTP or VPNs to pass through the firewall....

    RobynLorusso230 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following