By Topic

Introduction

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $33
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Charles W. Lickel ; IBM Research Division, USA

The regulatory landscape that enterprises face today has been characterized by an unrelenting increase in the number of governmental regulations. Since 1981, more than 118,000 regulations have been introduced in the United States alone. These include the Health Insurance Portability and Accountability Act (HIPAA) of 1996, the well-known Patriot Act of 2001, and the Sarbanes-Oxley Act of 2002. Similar regulations, such as the Japanese Personal Information Protection Act of April 2005, have been enacted in other countries. Other regulations, such as Basel II for the banking industry, have been issued by international agreement. Regulations have significantly increased the costs and the risks of doing business. The trend of business process outsourcing and the dynamics of disaggregated value nets only compound the challenge of dealing with compliance requirements. The concomitant explosion of information in enterprises adds to the challenge of leveraging that information to improve business performance while developing effective controls to manage the integrity and security of the information.

Note: The Institute of Electrical and Electronics Engineers, Incorporated is distributing this Article with permission of the International Business Machines Corporation (IBM) who is the exclusive owner. The recipient of this Article may not assign, sublicense, lease, rent or otherwise transfer, reproduce, prepare derivative works, publicly display or perform, or distribute the Article.  

Published in:

IBM Systems Journal  (Volume:46 ,  Issue: 2 )