Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

Monitoring Employees

RSS Feed    Add to Google    Add to My Yahoo!
Monitoring Employees White Papers (View All Report Types)
 
Privacy-Centric Mobile Device Policies: What Your Enterprise Needs to Know
sponsored by MobileIron
WHITE PAPER: This white paper takes the findings from the 2015 Trust Gap Survey and translates them into actionable recommendations for employers in the form of privacy-centric mobile device policies. Read on here to key into the following important insights about bridging the trust gap.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

MobileIron

Latest IT bonus figures - what are IT professionals earning ?
sponsored by ComputerWeekly.com
WHITE PAPER: Bonus payments have long been a feature of the reward package for most IT professionals, but when the UKeconomy went into freefall during late 2008, many employers either reduced such payments or did away withthem altogether.
Posted: 25 Oct 2011 | Published: 18 Nov 2010

ComputerWeekly.com

CW+: Snapshot 360° review of IT
sponsored by ComputerWeekly.com
WHITE PAPER: This is the third Snapshot survey from the Computer Weekly IT Opinion Panel which provides an exclusive insight into the perception of IT from the perspective of the Board, end users and IT professionals themselves.
Posted: 21 Oct 2011 | Published: 10 Aug 2010

ComputerWeekly.com

Equip technical staff with business expertise to get ahead
sponsored by ComputerWeekly.com
WHITE PAPER: As outsourcing, global commerce and constantly improving technologycontinue to change the business world, specialized professionals like scientists,engineers and information technology (IT) workers are increasingly beingasked to take on more business-oriented tasks.
Posted: 24 Oct 2011 | Published: 03 Dec 2010

ComputerWeekly.com

The Extraordinary Failure of Anti-Virus Technology
sponsored by SecureWave
WHITE PAPER: Anti-Virus technology fails to prevent computers from virus infections. This paper examines how whitelisting prevents malware and defends against evolving threats. Learn about five common security breaches and how whitelisting can help prevent them.
Posted: 02 Feb 2007 | Published: 01 Feb 2007

SecureWave

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

5 Fallacies About the Role of Learning Content in Talent Management
sponsored by Skillsoft
WHITE PAPER: This short white paper identifies 5 of the most common fallacies about the role of learning content in talent management, and clears away the confusion by offering truths about how learning content integrates into a well-developed talent management strategy. Read now to learn more.
Posted: 28 Aug 2012 | Published: 30 Apr 2012

Skillsoft

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Top 10 Best Practices for Email Archiving
sponsored by ZANTAZ
WHITE PAPER: Email archive software can address a number of issues from compliance to electronic discovery to storage concerns. This checklist outlines the common mistakes made by administrators when researching, implementing and managing email archive solutions.
Posted: 03 Oct 2006 | Published: 03 Oct 2006

ZANTAZ
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement