Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

E-mail Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
E-mail Monitoring Reports
 
Data Protection Masterclass: Global Privacy
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions.
Posted: 12 Jun 2012 | Published: 24 May 2012

ComputerWeekly.com

Hire and Retain Exceptional Employees by Leveraging Workforce Data with Assess Systems
sponsored by IBM
WEBCAST: On Wednesday, November 13, 2012 at 1:00 PM ET, Tune in to this live webcast to learn about the state-of-the-art talent selection technology that will be available to you in the very near future.
Posted: 24 Oct 2013 | Premiered: Nov 13, 2013, 13:00 EST (18:00 GMT)

IBM

Equip technical staff with business expertise to get ahead
sponsored by ComputerWeekly.com
WHITE PAPER: As outsourcing, global commerce and constantly improving technologycontinue to change the business world, specialized professionals like scientists,engineers and information technology (IT) workers are increasingly beingasked to take on more business-oriented tasks.
Posted: 24 Oct 2011 | Published: 03 Dec 2010

ComputerWeekly.com

Business analyst skillset well-suited to change management
sponsored by ComputerWeekly.com
WHITE PAPER: The most successful organizations are able to identify opportunities for selfimprovement and conceive of changes that can make them more efficient, more successful and better equipped to achieve their goals.
Posted: 21 Oct 2011 | Published: 06 Dec 2010

ComputerWeekly.com

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Web Monitoring for Employee Productivity Enhancement
sponsored by GFI Software
WHITE PAPER: Employees both want and don't want to have their Internet use restricted. The key to success in gaining productivity and employee acceptance of the problem is the perception of fairness, clear goals and self enforcement. Web monitoring is good for business.
Posted: 03 Jun 2009 | Published: 01 Jun 2009

GFI Software

BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by Symantec Corporation
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013

Symantec Corporation

Geiger Ready-Mix Improves Decision Making and Controls Costs with Kronos
sponsored by Kronos Incorporated
CASE STUDY: Geiger upgraded from a paper timecard system that required manual processing - a significant challenge for an organization with a weekly payroll cycle. The system could handle some of Geiger's unique pay features, but they had no way to track this information historically. Read on to learn how Geiger overcame this and other challenges.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Kronos Incorporated

What Return On Investment Does e-Learning Provide?
sponsored by Skillsoft
WHITE PAPER: Measuring the actual impact of learning in performance and monetary terms is well within reach. Check out this short white paper to explore how to best measure ROI from elearning, and get answers to frequently asked questions.
Posted: 28 Aug 2012 | Published: 30 Apr 2010

Skillsoft

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement