Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

E-mail Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
E-mail MonitoringReports
 
European IT Law Briefing: Recruitment and social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

5 strategies for managing a new generation of employees
sponsored by Ultimate Software
WHITE PAPER: It's been estimated that there are 80 million milennials in the US, and roughly half are in today's workforce. But as many companies are discovering, managing milennials requires a dramatically different approach than managing their predecessors. Read on to learn 5 key principles of effectively managing this new generation of employee.
Posted: 11 Jan 2013 | Published: 11 Jan 2013

Ultimate Software

Human Capital Management
sponsored by IBM
WHITE PAPER: The following white paper explores a human capital management solution that HR organizations can leverage to manage content and processes associated with the employee lifecycle. Learn how you can promote efficient, consistent and accurate interaction, collaboration, and much more.
Posted: 22 May 2014 | Published: 22 May 2014

IBM

Password Management Survey
sponsored by RoboForm Enterprise
WHITE PAPER: This report shows how RoboForm Enterprise password management solution can increase corporate security, eliminate password related help desk calls, improve end user productivity, and decrease overall IT costs.
Posted: 18 Sep 2008 | Published: 18 Sep 2008

RoboForm Enterprise

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

TOTSA Unearths Greater IT Efficiency with DYS CONTROL!™
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
CASE STUDY: Messaging management, when deployed effectively, has the power to provide IT with knowledge regarding how many messages have been delivered, system measurements and cost allocation. Learn about an email management system that provides these...
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)

Web Monitoring for Employee Productivity Enhancement
sponsored by GFI Software
WHITE PAPER: Employees both want and don't want to have their Internet use restricted. The key to success in gaining productivity and employee acceptance of the problem is the perception of fairness, clear goals and self enforcement. Web monitoring is good for business.
Posted: 03 Jun 2009 | Published: 01 Jun 2009

GFI Software

Top 10 Best Practices for Email Archiving
sponsored by ZANTAZ
WHITE PAPER: Email archive software can address a number of issues from compliance to electronic discovery to storage concerns. This checklist outlines the common mistakes made by administrators when researching, implementing and managing email archive solutions.
Posted: 03 Oct 2006 | Published: 03 Oct 2006

ZANTAZ

Workday Solutions: Human Capital Management
sponsored by Workday
SOFTWARE LISTING: Change is the one constant in business. Workday Human Capital Management is designed to help your organization develop its global workforce. People are your company's most valuable resource. Commit to growing not only your business, but also you..
Posted: 15 Aug 2008 | Published: 15 Aug 2008

Workday

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement