Business of Information Technology  >   Business Environment  >   Legal Environment  >   Laws  >   Employment Law  >  

Monitoring Employees

RSS Feed   
Monitoring Employees Reports
 
E-Guide: Uniting SIM and IAM to Boost Security
sponsored by SearchSecurity.com
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

SearchSecurity.com

European IT Law Briefing:  Practical steps for companies using social media
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Leading European law firms offer practical advice for companies using social media in France, Germany, UK and Italy.
Posted: 20 May 2013 | Published: 20 May 2013

ComputerWeekly.com

Boost business analyst performance with eight key competencies
sponsored by ComputerWeekly.com
WHITE PAPER: Each year, organizations across the globe face astronomical project failure rates, often wasting millions of dollars per failed project. This paper examines the roots of project failure and centers in on the elusive, often undefined role of the business analyst.
Posted: 24 Oct 2011 | Published: 01 Dec 2010

ComputerWeekly.com

2018 State of Privacy and Security Awareness Report
sponsored by MediaPRO
WHITE PAPER: Find out how over 1,000 U.S. employees were ranked on their cybersecurity and data privacy know-how in this 2018 State of Privacy and Security Awareness Report.
Posted: 22 Oct 2018 | Published: 22 Oct 2018

MediaPRO

Expert guide: How to design job roles and plan careers structures in the IT department
sponsored by ComputerWeekly.com
WHITE PAPER: Somewhere between our in-depth consultants’ guides and our short AnalystNotes that discuss specific aspects of IT careers, there is a need for an up-to-dateoverview of IT career structures. This is it.
Posted: 25 Oct 2011 | Published: 23 Nov 2010

ComputerWeekly.com

Securing the Organization: Creating a Partnership between HR and Information Security
sponsored by ISC2
WHITE PAPER: The goal of this white paper is to help Human Resource professionals understand the full scope of the growing information security profession and how it affects every aspect of an organization.
Posted: 14 Apr 2009 | Published: 09 Sep 2008

ISC2

E-LOAN Improves Sales Performance with Speech Analytics
sponsored by UTOPY, Inc.
CASE STUDY: In this case study you will learn how the company E-LOAN turned to speech analytics to determine the effectiveness of its sales process. You'll also learn how E-LOAN used speech analytics to refine their sales process to increase sales performance and increase revenue.
Posted: 06 Oct 2009 | Published: 06 Oct 2009

UTOPY, Inc.

Your Employee Security Checklist: 10 Tips
sponsored by Kaspersky Lab
WHITE PAPER: Careless employees were the single biggest cause of serious incidents involving data loss or leakage— involved in 1 in 5 serious data breaches. Find 10 tips for employee security to prevent serious incidents at the employee level.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by Symantec Corporation
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013

Symantec Corporation

Employees Behaving Badly? Why Awareness Training Matters
sponsored by Mimecast
EBOOK: Employee behavior and the culture you influence greatly impact the effectiveness of your overall cyber resilience strategy. Read on for 6 ways you can make security awareness apart of your organization's culture.
Posted: 05 Nov 2018 | Published: 05 Nov 2018

Mimecast
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement