Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

E-mail Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
E-mail Monitoring Reports
 
European IT Law Briefing: Taking action on misuse of social media by employees
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when taking action against employees who misuse social media in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

European IT Law Briefing:  Practical steps for companies using social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Leading European law firms offer practical advice for companies using social media in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Grain Storage Systems Leader Simplifies Workforce Management
sponsored by Workforce Software
CASE STUDY: Read this white paper to find out how GSI simplified workforce management and generated accurate paychecks and an audit trail for compliance.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Workforce Software

Smarter Automation Simplifies Compliance for Utility Companies
sponsored by Workforce Software
WHITE PAPER: Read this white paper to find out about a single platform that manages schedules, tracks hours and activities, applies pay rules and premiums, and simplifies compliance.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

Workforce Software

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009

IronKey

Why Your Organization Needs to Focus on Outbound Content Management
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
WHITE PAPER: The abuse of email within a company can have serious legal and security ramifications. This paper focuses on the need to monitor and manage outbound content, discusses key drivers that make it necessary and discusses ways to mitigate this risk.
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)

Go Green with Ease: Five Steps for Small IT Shops
sponsored by Cisco Systems, Inc.
WHITE PAPER: Smart information technology (IT) practices reduce the environmental impact of conducting business, and help small and medium-sized businesses (SMBs) reduce expenses.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.

4A Best Practices: Identity Management Convergence Strategies
sponsored by Imprivata
WHITE PAPER: Download this white paper and learn why security professionals are gravitating to a security solution that combines both physical security and IT. Discover a new approach to identity and access management that utilizes a convergence strategy.
Posted: 21 May 2007 | Published: 16 Jan 2007

Imprivata

Seagate: Driving Success through HCM
sponsored by Ramco Systems
WHITE PAPER: Seagate is the worldwide leader in storage solutions, offering the industry's broadest portfolio of hard disc drives. In order to maintain its market leadership, the company needed to centralize its HR services to manage its worldwide operations. View this resource to find out how they simplified HR and workforce management.
Posted: 15 Jul 2013 | Published: 15 Jul 2013

Ramco Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement