Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >  

Labor Law

RSS Feed    Add to Google    Add to My Yahoo!
Labor Law Reports
 
European IT Law Briefing: Monitoring employees' use of social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Leading European law firms explain the key legal requirements for companies monitoring employees' social media use in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Women in Technology 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are women flourishing in IT ? Find out by downloading the Women in techology report from Computer Weekly and Mortimer Spinks.
Posted: 04 Jul 2014 | Published: 04 Jul 2014

ComputerWeekly.com

European IT Law Briefing:  Practical steps for companies using social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Leading European law firms offer practical advice for companies using social media in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

European IT Law Briefing: Taking action on misuse of social media by employees
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when taking action against employees who misuse social media in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Tactics to combat insider threat
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that the threat to an organisation’s data security from within its workforce requires a considered and objective approach.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

European IT Law Briefing: Recruitment and social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when using social media for recruitment in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Legal briefing: The Draft EU General Data Protection Regulation
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from law firm Morrison & Foerster, sets out some of the most important changes for private sector organisations in the draft EU Data Protection Regulation.
Posted: 28 Jan 2014 | Published: 28 Jan 2014

ComputerWeekly.com

BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by Symantec Corporation
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013

Symantec Corporation

Eliminate Performance Anxiety Manage Employee Performance Better
sponsored by Epicor Software Corporation
WHITE PAPER: How do you manage the performance of your workforce today? Access this guide to learn how to implement effective goal setting around 5 key traits, construct an efficient feedback loop, and harness the right tools to manage performance across your entire organization.
Posted: 30 Jun 2014 | Published: 31 Oct 2012

Epicor Software Corporation

AIIM Report: Paper-Free Progress and Measuring Outcomes
sponsored by EMC
ANALYST REPORT: This exclusive report takes an in-depth look at the challenges of digitizing paper processes, digital mailrooms and multi-channel capture, and learn how to go paper-free and transform your business processes with mobile and cloud.
Posted: 05 Apr 2016 | Published: 31 Dec 2015

EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement