Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

Monitoring Employees

RSS Feed    Add to Google    Add to My Yahoo!
Monitoring Employees White Papers (View All Report Types)
 
Expert guide: How to design job roles and plan careers structures in the IT department
sponsored by ComputerWeekly.com
WHITE PAPER: Somewhere between our in-depth consultants’ guides and our short AnalystNotes that discuss specific aspects of IT careers, there is a need for an up-to-dateoverview of IT career structures. This is it.
Posted: 25 Oct 2011 | Published: 23 Nov 2010

ComputerWeekly.com

CW+: Snapshot 360° review of IT
sponsored by ComputerWeekly.com
WHITE PAPER: This is the third Snapshot survey from the Computer Weekly IT Opinion Panel which provides an exclusive insight into the perception of IT from the perspective of the Board, end users and IT professionals themselves.
Posted: 21 Oct 2011 | Published: 10 Aug 2010

ComputerWeekly.com

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Web Monitoring for Employee Productivity Enhancement
sponsored by GFI Software
WHITE PAPER: Employees both want and don't want to have their Internet use restricted. The key to success in gaining productivity and employee acceptance of the problem is the perception of fairness, clear goals and self enforcement. Web monitoring is good for business.
Posted: 03 Jun 2009 | Published: 01 Jun 2009

GFI Software

The future of productivity - Office 365
sponsored by Microsoft India
WHITE PAPER: Access the following white paper to uncover a cloud-based and collaborative solution that allows for both reduction of operating costs as well as an ability to increase the productivity of your employees.
Posted: 20 Dec 2013 | Published: 20 Dec 2013

Microsoft India

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Skill Level and Training Key Factors in IT Project Success
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper provides an analysis of a comprehensive survey with 144 senior IT managers examining the impact training and skill level had on the success of 377 IT projects.
Posted: 01 Dec 2008 | Published: 26 Nov 2008

Hewlett Packard Enterprise

5 Fallacies About the Role of Learning Content in Talent Management
sponsored by Skillsoft
WHITE PAPER: This short white paper identifies 5 of the most common fallacies about the role of learning content in talent management, and clears away the confusion by offering truths about how learning content integrates into a well-developed talent management strategy. Read now to learn more.
Posted: 28 Aug 2012 | Published: 30 Apr 2012

Skillsoft

Why Your Organization Needs to Focus on Outbound Content Management
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
WHITE PAPER: The abuse of email within a company can have serious legal and security ramifications. This paper focuses on the need to monitor and manage outbound content, discusses key drivers that make it necessary and discusses ways to mitigate this risk.
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)

The Extraordinary Failure of Anti-Virus Technology
sponsored by SecureWave
WHITE PAPER: Anti-Virus technology fails to prevent computers from virus infections. This paper examines how whitelisting prevents malware and defends against evolving threats. Learn about five common security breaches and how whitelisting can help prevent them.
Posted: 02 Feb 2007 | Published: 01 Feb 2007

SecureWave
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement