Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

E-mail Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
E-mail MonitoringReports
 
European IT Law Briefing: Recruitment and social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

5 strategies for managing a new generation of employees
sponsored by Ultimate Software
WHITE PAPER: It's been estimated that there are 80 million milennials in the US, and roughly half are in today's workforce. But as many companies are discovering, managing milennials requires a dramatically different approach than managing their predecessors. Read on to learn 5 key principles of effectively managing this new generation of employee.
Posted: 11 Jan 2013 | Published: 11 Jan 2013

Ultimate Software

Learning in the Cloud: SuccessFactors Learning and the Future of Learning Management Systems
sponsored by SuccessFactors
WEBCAST: In this informative webcast, Sharon Newton, Managing Partner and SAP Mentor with hyperCision, points to where the focus should be with so much going on in learning management, from social, talent management, microlearning and more. Additionally, discover how mobility and the cloud are rapidly changing the learning environment.
Posted: 18 Nov 2014 | Premiered: Oct 29, 2014

SuccessFactors

HR Leadership: 3 Learning & Development Lessons from Deloitte
sponsored by SuccessFactors
WEBCAST: Many organizations are shifting away from "pushing" training at employees. Instead, they facilitate environments where people can "pull" skills to themselves when and where they need them. Watch this webcast to learn about 3 barriers to employee engagement with learning and how to overcome them.
Posted: 13 Nov 2014 | Premiered: Oct 28, 2014

SuccessFactors

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009

IronKey

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.

The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Workday Solutions: Human Capital Management
sponsored by Workday
SOFTWARE LISTING: Change is the one constant in business. Workday Human Capital Management is designed to help your organization develop its global workforce. People are your company's most valuable resource. Commit to growing not only your business, but also you..
Posted: 15 Aug 2008 | Published: 15 Aug 2008

Workday

Why Your Organization Needs to Focus on Outbound Content Management
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
WHITE PAPER: The abuse of email within a company can have serious legal and security ramifications. This paper focuses on the need to monitor and manage outbound content, discusses key drivers that make it necessary and discusses ways to mitigate this risk.
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement