Asset management, Bandwidth limits, Benchmarking, Budgeting, business process management, Business/IT alignment, Career development, Compliance, Disaster planning, Enterprise software, Green IT, Help Desk, IT, IT answers, IT Books, IT budget, IT budgeting, IT Business Alignment in 2010, IT certification, IT certification and training, IT Compliance, IT education, IT Governance, IT industry, IT Knowledge Exchange, it management, IT outsourcing, IT project management, IT salaries, IT services, It spending, IT training, IT training and certifications, ITIL, Live Migration, Management, Open source, Open source applications, Outsourcing, PCI, Planning, Policies, Project Managers, Regulations, ROI, ROI & cost justification, Sarbanes-Oxley, Sarbanes-Oxley Act, SMB, Tech support VIEW ALL TAGS
Should encryption be explicitly proscribed in Data Security and Provacy legislation like the Massachusetts Data Prvacy Law and the White House cybersecurity initiative? If so, what strength or method? Should there be a minimum strength? What do you think?