Internal compliance program for Massachusetts data protection law

Internal compliance program for Massachusetts data protection law

Date: Jun 14, 2010
Having a holistic internal compliance program is crucial to successfully complying with data security and privacy regulations.

In this video, Rick Gammell, director of enterprise information risk management at MassMutual Financial Group, describes how his company tackled compliance with the Massachusetts data protection law.

More on Data governance best practices

  • canderson

    GRC for financial firms: Managing risk, vendors and change

    VIDEO - Learn about managing risks, vendors and change in the first part of a two-part interview with financial-services security expert Eric Holmquist.
  • canderson

    GRC for financial firms: The latest threats

    VIDEO - In this video, expert Eric Holmquist explains what to look out for in the current threat landscape, including Automated Clearing House (ACH) fraud. He also discusses pandemic planning and how tabletop exercises are critical for successful disaster recovery planning.
  • canderson

    Seven GRC best practices for information security

    VIDEO - Learn the seven most important practices to use when implementing governance, risk and compliance at your enterprise.
  • wipe

    Definition - Wipe, in a computing context, means to erase all data on a hard drive to render it unreadable. The term is often used in reference to making data stored on a computer, smartphone or tablet inaccessible before disposing of the device.
  • security awareness training

    Definition - Security awareness training is a formal process for educating employees about corporate policies and procedures for working with information technology (IT). Regular training is particularly necessary in organizations with high turnover rates and those that rely heavily on contract or temporary staff.
  • Shifting to a flexible information security framework

    Tip - Financial-services executives often view information security as locks and keys that impede business, which makes it hard for security to win funding. In this tip, Randall Gamby explains how adopting an information security framework built on the idea of information security as a business enabler will help bridge the gap between security professionals and business managers.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: