Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

Email Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Email Monitoring White Papers (View All Report Types)
Equip technical staff with business expertise to get ahead
sponsored by
WHITE PAPER: As outsourcing, global commerce and constantly improving technologycontinue to change the business world, specialized professionals like scientists,engineers and information technology (IT) workers are increasingly beingasked to take on more business-oriented tasks.
Posted: 24 Oct 2011 | Published: 03 Dec 2010

Expert guide: How to design job roles and plan careers structures in the IT department
sponsored by
WHITE PAPER: Somewhere between our in-depth consultants’ guides and our short AnalystNotes that discuss specific aspects of IT careers, there is a need for an up-to-dateoverview of IT career structures. This is it.
Posted: 25 Oct 2011 | Published: 23 Nov 2010

Cloud-Based Time, Scheduling, and Leave Capabilities
sponsored by Workforce Software
WHITE PAPER: In this white paper, learn how a cloud-based time, scheduling, and leave tool can automate complex pay rules with 100% accuracy, streamline compliance, enable smarter decisions across the enterprise, and more. Additionally, learn how better visibility of employee labor activities can drive business strategy.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

Workforce Software

4A Best Practices: Identity Management Convergence Strategies
sponsored by Imprivata
WHITE PAPER: Download this white paper and learn why security professionals are gravitating to a security solution that combines both physical security and IT. Discover a new approach to identity and access management that utilizes a convergence strategy.
Posted: 21 May 2007 | Published: 16 Jan 2007


Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.

Top 10 Best Practices for Email Archiving
sponsored by ZANTAZ
WHITE PAPER: Email archive software can address a number of issues from compliance to electronic discovery to storage concerns. This checklist outlines the common mistakes made by administrators when researching, implementing and managing email archive solutions.
Posted: 03 Oct 2006 | Published: 03 Oct 2006


It's 2008: Do You Know Where Your Talent Is? - Connecting People to What Matters
sponsored by SAP America, Inc.
WHITE PAPER: Demand for knowledge workers is rising even as their skills and abilities are falling into short supply. This research report about acquisition and retention strategies questions the "war for talent" approach to these emerging trends.
Posted: 10 Sep 2008 | Published: 09 Sep 2008

SAP America, Inc.

The Top Six Risks of Employee Internet Use and How to Stop Them
sponsored by St. Bernard Software
WHITE PAPER: Learn the legal issues and security risks associated with unmanaged employee Internet use. This white paper discusses the security controls needed to mitigate risk, reduce threats and achieve compliance in the enterprise.
Posted: 27 Sep 2007 | Published: 27 Sep 2007

St. Bernard Software

Seagate: Driving Success through HCM
sponsored by Ramco Systems
WHITE PAPER: Seagate is the worldwide leader in storage solutions, offering the industry's broadest portfolio of hard disc drives. In order to maintain its market leadership, the company needed to centralize its HR services to manage its worldwide operations. View this resource to find out how they simplified HR and workforce management.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

Ramco Systems

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement