Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

Email Monitoring

RSS Feed    Add to Google    Add to My Yahoo!
Email Monitoring Reports
 
Business analyst skillset well-suited to change management
sponsored by ComputerWeekly.com
WHITE PAPER: The most successful organizations are able to identify opportunities for selfimprovement and conceive of changes that can make them more efficient, more successful and better equipped to achieve their goals.
Posted: 21 Oct 2011 | Published: 06 Dec 2010

ComputerWeekly.com

Maximizing the Value of Human Capital Management in Healthcare
sponsored by Infor
EBOOK: Learn how you can maximize human capital management (HCM) by adding employee assessment software to your HR tool belt. Looking at HR shifts in the healthcare industry, explore how you can better determine whether employees are worth hiring, where workers need to improve, and drive improved outcomes.
Posted: 31 Aug 2016 | Published: 29 Apr 2016

Infor

European IT Law Briefing: Monitoring employees' use of social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Leading European law firms explain the key legal requirements for companies monitoring employees' social media use in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Uncovering assessment response bias
sponsored by IBM
WHITE PAPER: The following white paper details the importance of being able to evaluate nearly every aspect of a potential candidate and most importantly, how to do so.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

IBM

IBM Cognos 8 Business Intelligence Online Demo
sponsored by IBM Cognos
SOFTWARE DEMO: Complete capabilities in a single product. See key features for IT and business users.
Posted: 11 Sep 2008 | Premiered: 11 Sep 2008

IBM Cognos

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009

IronKey

2010 Asset Management Operations and Compensation Survey Findings
sponsored by Advent Software, Inc
WHITE PAPER: In this survey you will learn how asset management has changed over the years and the different challenges asset management professionals have been facing.
Posted: 18 May 2011 | Published: 17 May 2011

Advent Software, Inc

Managing Access to Critical Data for Protection and Privacy
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper today and learn more about how to effectively secure company data with effective access management and monitor and secure valuable company information to ensure that it doesn't fall into the wrong hands.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement