Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

Monitoring Employees

RSS Feed    Add to Google    Add to My Yahoo!
Monitoring EmployeesReports
 
Recruiting 101: Establish a Process to Hire Right the First Time
sponsored by ConnectWise
WHITE PAPER: Recruiting is an essential process to build the infrastructure of your business. By planning out the recruiting and hiring process, you will have much greater success finding the right candidates the first time around. In this eBook, you'll learn how to plan, interview, and make hiring decisions with confidence.
Posted: 22 Jul 2013 | Published: 22 Jul 2013

ConnectWise

Elliott Reduces Cost and Increases Efficiency with its Kronos Solution
sponsored by Kronos Incorporated
CASE STUDY: Elliott Company decided to implement the Kronos Workforce Central suite in 2004 to help improve its ability to track and manage attendance, overtime, and vacation while remaining compliant with complex labor laws and union pay policies. Read this case study to find out how it worked out for them.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Kronos Incorporated

The Powerful Technologies behind Best-of-Breed Internet Filtering
sponsored by St. Bernard Software
WHITE PAPER: This paper outlines the available filtering and classification technologies that can be deployed to secure your Internet access, while reviewing the advantages and disadvantages of filtering systems.
Posted: 20 Feb 2006 | Published: 01 Jul 2005

St. Bernard Software

Top 10 Best Practices for Email Archiving
sponsored by ZANTAZ
WHITE PAPER: Email archive software can address a number of issues from compliance to electronic discovery to storage concerns. This checklist outlines the common mistakes made by administrators when researching, implementing and managing email archive solutions.
Posted: 03 Oct 2006 | Published: 03 Oct 2006

ZANTAZ

BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by Symantec Corporation
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013

Symantec Corporation

4A Best Practices: Identity Management Convergence Strategies
sponsored by Imprivata
WHITE PAPER: Download this white paper and learn why security professionals are gravitating to a security solution that combines both physical security and IT. Discover a new approach to identity and access management that utilizes a convergence strategy.
Posted: 21 May 2007 | Published: 16 Jan 2007

Imprivata

5 Fallacies About the Role of Learning Content in Talent Management
sponsored by Skillsoft
WHITE PAPER: This short white paper identifies 5 of the most common fallacies about the role of learning content in talent management, and clears away the confusion by offering truths about how learning content integrates into a well-developed talent management strategy. Read now to learn more.
Posted: 28 Aug 2012 | Published: 30 Apr 2012

Skillsoft

Making the Abundant Relevant: Solving Today's Learning Challenges through a Next Generation Technology Architecture
sponsored by SkillSoft Corporation
PRODUCT LITERATURE: Integration is the single most difficult issue facing the learning industry today. Read about Open Learning Services Architecture, a technology initiative that enables higher levels of interoperability, flexibility and the freedom to innovate.
Posted: 01 Nov 2007 | Published: 01 Nov 2007

SkillSoft Corporation

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009

IronKey

Web Monitoring for Employee Productivity Enhancement
sponsored by GFI Software
WHITE PAPER: Employees both want and don't want to have their Internet use restricted. The key to success in gaining productivity and employee acceptance of the problem is the perception of fairness, clear goals and self enforcement. Web monitoring is good for business.
Posted: 03 Jun 2009 | Published: 01 Jun 2009

GFI Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement