Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

Email Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Email MonitoringReports
 
European IT Law Briefing: Recruitment and social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

5 strategies for managing a new generation of employees
sponsored by Ultimate Software
WHITE PAPER: It's been estimated that there are 80 million milennials in the US, and roughly half are in today's workforce. But as many companies are discovering, managing milennials requires a dramatically different approach than managing their predecessors. Read on to learn 5 key principles of effectively managing this new generation of employee.
Posted: 11 Jan 2013 | Published: 11 Jan 2013

Ultimate Software

Prepare for change: Seven Questions that Prepare you for BYOD Whitepaper
sponsored by IBM
WHITE PAPER: This white paper provides seven questions you should answer as you take on new mobile capabilities.
Posted: 23 Jul 2014 | Published: 31 Dec 2011

IBM

Onboarding New Employees: Build Long-term Productivity and Retention
sponsored by IBM
WHITE PAPER: This white paper discusses how two efforts -- training and socialization -- can help you make the most of an onboarding program, resulting in faster ROI and better employee performance. Read now to discover best practices for making sure your new employees catch on quickly.
Posted: 04 Aug 2014 | Published: 28 Feb 2014

IBM

Why Your Organization Needs to Focus on Outbound Content Management
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
WHITE PAPER: The abuse of email within a company can have serious legal and security ramifications. This paper focuses on the need to monitor and manage outbound content, discusses key drivers that make it necessary and discusses ways to mitigate this risk.
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Power HR's Business Contribution
sponsored by Oracle Corporation
WEBCAST: In this educational webcast, human resources management expert Gretchen Alarcon explains how HR teams can ramp up their contribution towards meeting business goals by using actionable insights from both embedded and predictive analytics - along with "what if" modeling – to manage the workforce effectively and in real time.
Posted: 16 Jan 2014 | Premiered: Jan 16, 2014

Oracle Corporation

Elliott Reduces Cost and Increases Efficiency with its Kronos Solution
sponsored by Kronos Incorporated
CASE STUDY: Elliott Company decided to implement the Kronos Workforce Central suite in 2004 to help improve its ability to track and manage attendance, overtime, and vacation while remaining compliant with complex labor laws and union pay policies. Read this case study to find out how it worked out for them.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Kronos Incorporated

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009

IronKey
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement