Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

Email Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Email MonitoringReports
 
Legal briefing: The Draft EU General Data Protection Regulation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

ComputerWeekly.com

Recruiting 101: Establish a Process to Hire Right the First Time
sponsored by ConnectWise
WHITE PAPER: Recruiting is an essential process to build the infrastructure of your business. By planning out the recruiting and hiring process, you will have much greater success finding the right candidates the first time around. In this eBook, you'll learn how to plan, interview, and make hiring decisions with confidence.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

ConnectWise

CW+: Snapshot 360° review of IT
sponsored by ComputerWeekly.com
WHITE PAPER: This is the third Snapshot survey from the Computer Weekly IT Opinion Panel which provides an exclusive insight into the perception of IT from the perspective of the Board, end users and IT professionals themselves.
Posted: 21 Oct 2011 | Published: 10 Aug 2010

ComputerWeekly.com

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009

IronKey

Geiger Ready-Mix Improves Decision Making and Controls Costs with Kronos
sponsored by Kronos Incorporated
CASE STUDY: Geiger upgraded from a paper timecard system that required manual processing - a significant challenge for an organization with a weekly payroll cycle. The system could handle some of Geiger's unique pay features, but they had no way to track this information historically. Read on to learn how Geiger overcame this and other challenges.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Kronos Incorporated

CA Cleanup: Mainframe Security Databases: ACF2, Top Secret, IBM RACF
sponsored by CA Technologies.
SOFTWARE DEMO: Over a period of time security databases accumulate unused, obsolete user ids and entitlements. This demonstration showcases the three causes and solution sets to security data accumulation.
Posted: 17 Jun 2008 | Premiered: 13 Jun 2008

CA Technologies.

Uncovering assessment response bias
sponsored by IBM
WHITE PAPER: The following white paper details the importance of being able to evaluate nearly every aspect of a potential candidate and most importantly, how to do so.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

IBM

Go Green with Ease: Five Steps for Small IT Shops
sponsored by Cisco Systems, Inc.
WHITE PAPER: Smart information technology (IT) practices reduce the environmental impact of conducting business, and help small and medium-sized businesses (SMBs) reduce expenses.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement