Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

E-mail Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
E-mail Monitoring Reports
 
European IT Law Briefing: Taking action on misuse of social media by employees
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when taking action against employees who misuse social media in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

CW+: Snapshot 360┬░ review of IT
sponsored by ComputerWeekly.com
WHITE PAPER: This is the third Snapshot survey from the Computer Weekly IT Opinion Panel which provides an exclusive insight into the perception of IT from the perspective of the Board, end users and IT professionals themselves.
Posted: 21 Oct 2011 | Published: 10 Aug 2010

ComputerWeekly.com

Prepare for change: Seven Questions that Prepare you for BYOD
sponsored by IBM
WHITE PAPER: This white paper provides seven questions you should answer as you take on new mobile capabilities.
Posted: 23 Jul 2014 | Published: 31 Dec 2011

IBM

Assessing Talent Management Maturity
sponsored by NGA Human Resources
WHITE PAPER: More and more organizations are making Talent Management a top priority. This means managing employees with specific talents in the best suited position, and ensuring they have the right skillset. Read this white paper to understand the importance of strategic Talent Management.
Posted: 07 May 2015 | Published: 07 May 2015

NGA Human Resources

BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by Symantec Corporation
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013

Symantec Corporation

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

TOTSA Unearths Greater IT Efficiency with DYS CONTROL!™
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
CASE STUDY: Messaging management, when deployed effectively, has the power to provide IT with knowledge regarding how many messages have been delivered, system measurements and cost allocation. Learn about an email management system that provides these...
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Swimming with the Current: Six Major Trends in Workforce Management Compliance
sponsored by Workforce Software
WHITE PAPER: This white paper provides an overview of the major trends affecting workforce management compliance. Discover tips and recommendations to help your organization cultivate a culture of compliance.
Posted: 09 Jun 2014 | Published: 09 Jun 2014

Workforce Software

Uncovering assessment response bias
sponsored by IBM
WHITE PAPER: The following white paper details the importance of being able to evaluate nearly every aspect of a potential candidate and most importantly, how to do so.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement