Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

Monitoring Employees

RSS Feed    Add to Google    Add to My Yahoo!
Monitoring EmployeesReports
 
How To Fix A Broken Performance Management Program
sponsored by SuccessFactors
WEBCAST: Watch this exclusive webcast, and hear from Alexander Pahl, Senior Manager, Head of HRIS at PricewaterhouseCoopers, and Margit Bauer, Cloud HCM Manager at SAP, as they reveal why many performance management (PM) programs fall short of their basic promises.
Posted: 18 Nov 2014 | Premiered: Oct 29, 2014

SuccessFactors

Equip technical staff with business expertise to get ahead
sponsored by ComputerWeekly.com
WHITE PAPER: As outsourcing, global commerce and constantly improving technologycontinue to change the business world, specialized professionals like scientists,engineers and information technology (IT) workers are increasingly beingasked to take on more business-oriented tasks.
Posted: 24 Oct 2011 | Published: 03 Dec 2010

ComputerWeekly.com

E-Guide: Uniting SIM and IAM to Boost Security
sponsored by SearchSecurity.com
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

SearchSecurity.com

Workday and Chiquita - Managing a Fast-Moving, Global Workforce
sponsored by Workday
CASE STUDY: This case study explains how global food giant Chiquita harnessed a unified platform of HR, payroll and expenses to increase the speed of transactions and decrease errors. Learn how this platform in the cloud helped Chiquita free up IT resources and increase visibility at all levels of the organization.
Posted: 06 Oct 2014 | Published: 06 Oct 2014

Workday

HR Meets Social Media: Fireworks or Fizzle
sponsored by Workday
EGUIDE: This e-guide reveals how forward-thinking businesses are leveraging social media to identify the best talent and overhaul traditional performance evaluations and communications between employees and HR.
Posted: 29 Sep 2014 | Published: 29 Sep 2014

Workday

European IT Law Briefing: Taking action on misuse of social media by employees
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Four leading European law firms help you navigate the legal maze when taking action against employees who misuse social media in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

Elliott Reduces Cost and Increases Efficiency with its Kronos Solution
sponsored by Kronos Incorporated
CASE STUDY: Elliott Company decided to implement the Kronos Workforce Central suite in 2004 to help improve its ability to track and manage attendance, overtime, and vacation while remaining compliant with complex labor laws and union pay policies. Read this case study to find out how it worked out for them.
Posted: 17 Jun 2009 | Published: 17 Jun 2009

Kronos Incorporated

The Desktop Dilemma: Liberty vs. Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: CIOs and IT departments are under tremendous pressure to implement better processes over how software is deployed, managed, and used by their employees on their company computers. This document will outline a nine-step methodology that can make or break your transition to a well-managed and controlled Windows environment.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

Comparing Approaches for Desktop Software Lockdown
sponsored by Bit9, Inc.
WHITE PAPER: The variety of stability, security and legal risks with the installation and execution of unauthorized software is a huge burden for organizations. This paper will compare and contrast techniques for detecting and preventing unauthorized code.
Posted: 30 Aug 2006 | Published: 30 Aug 2006

Bit9, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement