law

Results 176 - 200 of 311Sort Results By: Published Date | Title | Company Name
Published By: Sage     Published Date: Jan 30, 2015
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, interactive customer experience, hr perspective, intellectual property
    
Sage
Published By: Sage     Published Date: Nov 23, 2015
Learn how to protect yourself and your organization from government scrutiny, noncompliance penalties, or expensive employee lawsuits. Sage created this guide to help you stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
compliance, noncompliance, employer compliance, hr manager, employment laws
    
Sage
Published By: NAVEX Global     Published Date: Nov 18, 2013
Download this paper to explore the 4 areas that are key to managing social media use by employees in your organization.
Tags : 
social media policy, risk management, best practices, policy management, social media training, social media laws, national labor relations act, nlra, retaliation, harassment, mobile training, risk assessment, data, culture assessment, program assessment
    
NAVEX Global
Published By: Paycor     Published Date: Jun 05, 2014
Did you know that a study shows that almost 39 percent of franchise businesses fail after four years? Or that defaults on loans in the early 2000s were higher for franchised businesses than for independents? Is your business at risk of becoming such a statistic? Staying on top of changes to tax laws and health care reform can be overwhelming. This whitepaper will empower you to mitigate risk and ensure your franchise’s profitability.
Tags : 
franchise, compliance, labor law, wage and hour, tax law, healthcare reform, enterprise applications
    
Paycor
Published By: Paycor     Published Date: Jun 05, 2014
Did you know the Department of Labor assessed $82 million in penalties in 2013? Misclassified employees, lack of documentation, payroll errors and employment discrimination lawsuits add up to costly mistakes for healthcare organizations every day. If you’re using spreadsheets to track employee data and relying on disconnected information systems, your organization is at risk of becoming a statistic. This whitepaper will empower you to mitigate risk and ensure your organization can continue to serve its mission.
Tags : 
healthcare, compliance, labor law, wage and hour, tax law, healthcare reform
    
Paycor
Published By: The Vitality Group     Published Date: Jan 28, 2014
This technical brief streamlines and simplifies the key issues in the new regulatory landscape and provides information to help inform important business decisions regarding Wellness programs. "The Legal Environment of Wellness" offers in depth information abuot wellness program requirements under the ACA, and reviews how corporate wellness programs are impacted by the rulings of the Affordable Care Act (ACA) and HIPAA. In addition to the ACA, it covers information companies need to be aware of regarding how other legislation may impact their health promotion efforts. Choosing a new wellness program or bringing current programs into compliance will require a thorough understanding of new and existing laws and sometimes complex decisions and structural redesign.
Tags : 
employee wellness, employee wellness program, employee health, employee benefits, corporate health program, corporate wellness program, corporate wellness incentive program, employee health and wellness program, employee health incentive pgoram, employee wellness incentive program, workpace wellness program, workplace health program, workplace health promotion, health and wellness program, workpace health program, workplace health promotion, health and wellness program, corporate health program cost, affordable care act compliance, afordable care act provisions
    
The Vitality Group
Published By: Sage     Published Date: Mar 26, 2014
Here’s a riddle: What have you used for a very long time, occasionally pulled your hair out over, contains lots of cells with mathematical formulas, and is very stressful to update whenever a tax law or GAAP principle changes?
Tags : 
sage, fixed assets, spreadsheets, tax payments, sarbanes-oxley, depreciation, tracking, planning, reporting
    
Sage
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
This book explores the security challenges of virtualization in the data center, at the endpoint, and in the cloud. I explain why using traditional security products built for physical systems is a mistake for virtual systems. Finally, I explain how virtualaware security solutions provide in-depth security without compromising performance in virtual, cloud, and hybrid environments that include a mix of virtual and physical systems.
Tags : 
cloud security, virtualization security, virtualization, data center, security, it management, wireless, knowledge management
    
CDW-Trend Micro
Published By: Polycom     Published Date: Jun 29, 2017
Law firms are under increasing pressure to respond quickly – often within hours – to client demands. Failure to increase agility can result in costly client churn, but law firms are often ill-equipped to be so nimble. As a result, it may be time to consider a technology that has been proven integral to law firms around the world - video collaboration. In under 30 minutes, we'll explain: Common use cases for video collaboration - going way beyond team meetings to the tasks at the heart of practicing law The types of solutions deployed - if you think an expensive, wall-mounted, on premise solution is your only option, you may be surprised by what's available From the meeting room to the courtroom - hear how a this technology is proliferating the courtroom and how the best lawyers will be equipped to take full advantage
Tags : 
video collaboration, law technology, client satisfaction, response time
    
Polycom
Published By: HPE Intel     Published Date: Feb 19, 2016
The rising demands for capturing and managing video surveillance data are placing new pressures on state and local governments, law enforcement agencies, and education officials. The challenges go beyond the expanding costs of equipment, storage, software and management time. Officials must also lay the right foundation to scale their capabilities, improve performance and still remain flexible in a rapidly evolving ecosystem of surveillance tools. Find out what state, local government and education IT leaders need to know, and what steps you can take to: • Improve performance and ROI on cameras-per-server for the dollars invested • Optimize and simplify the management of daily surveillance processing, including the integration of facial recognition, redaction and analysis software • Fortify reliability and dependability to reduce the risk of surveillance data retrieval failures.
Tags : 
    
HPE Intel
Published By: ThousandEyes     Published Date: Nov 17, 2016
Greg Schellenberg, Senior Systems and Network Engineer, uses ThousandEyes to rapidly locate issues with his LAN, WAN, cloud partners and remote employees. Watch this customer testimonial video to learn more!
Tags : 
    
ThousandEyes
Published By: ThousandEyes     Published Date: Mar 14, 2017
Greg Schellenberg, Senior Systems and Network Engineer, uses ThousandEyes to rapidly locate issues with his LAN, WAN, cloud partners and remote employees.
Tags : 
    
ThousandEyes
Published By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : 
java, network security, security breach, security flaws, network intrusion
    
Rapid7
Published By: Qualys     Published Date: Nov 05, 2013
Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process. This white paper describes an approach to patch management that allows you to prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied. Also inside, find ten steps to improve patching – read on to learn more.
Tags : 
qualys, qualysguard, security, patch acceleration, vulnerability, vulnerability management, robustness, patching system, patching vulnerabilities, remediation, cloud platform, patching, patch report, it infastructure, business technology
    
Qualys
Published By: G/O Digital     Published Date: Nov 13, 2014
It doesn't matter the legal field you specialize in – personal injury, bankruptcy, real estate, family law – you probably don’t have the time to focus on clients, the daily operations of your practice, and grow your business at the same time. To maintain a local business, you continually need to search for new business leads while still providing the best service to your clients and still find some time to sleep at night. This guide is here to help you boost your online lead generation with simple-to-execute solutions and best practices. Download this guide to help boost your online lead generation with simple-to-execute solutions and best practices.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media, email marketing, web development, web design, enterprise applications
    
G/O Digital
Published By: Black Duck Software     Published Date: May 18, 2016
Using open source code is not necessarily a problem, but not knowing what open source you’re using can be extremely dangerous, particularly when so much open source contains security flaws. In fact, the latest Future of Open Source Survey found that: - 55 percent of respondents had no formal policy or procedure for open source consumption - 98 percent were unaware of the open source code they were using "Application Security in 2016," a complimentary report from Black Duck Software, considers the key application security challenges your organization will face, with a special focus on staying both agile and secure with open source. Download the report today!
Tags : 
black duck, application security, security, open source, code, enterprise applications, business technology
    
Black Duck Software
Published By: IntelliCorp     Published Date: May 31, 2012
Need to implement a pre-employment screening solution for your organization or want to evaluate your current program? Download this free whitepaper to receive a clear explanation of what you should consider to help mitigate risk.
Tags : 
intellicorp, background check, pre-employment screening, background screening company, fcra, consumer report, criminal search, sex offender registry, ssn verification, terrorist search, motor vehicle reports, credit reports, education verification, e-verify, drug testing, professional reference, address history, work history, civil records, professional licensing
    
IntelliCorp
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard
    
Qualys
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities
    
Qualys
Published By: Mimecast     Published Date: Sep 30, 2008
Today, email management is not only a filing and storage challenge. Because law firms and attorneys must be equipped to take control of litigation, email authenticity must be unquestionable with strong chains of custody, constant availability, and tamper-proof security. This white paper summarizes the author's experiences of litigating in fractured environments, particularly as they pertain to email. Learn the 12 steps that will help you gain control of your electronically stored data.
Tags : 
mimecast, saas, email solutions, evidence, security, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast
Published By: Arkadin     Published Date: Sep 11, 2013
The legal industry, like almost all others, is faced with doing more with fewer resources. This whitepaper provides valuable information on how remote collaboration solutions such as audio, video, and web conferencing can help lower costs, increase productivity, and drive incremental revenue.
Tags : 
legal, legal solutions, legal communications, legal collaboration, legal conferencing, legal issues, compliance laws, law, legal services, remote collaboration, remote conferencing, remote communications, arkadin, remote depositions, litigation, cost effectiveness, legal market place, web and audio conferencing, web conference, audio conference
    
Arkadin
Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance, security, knowledge management, enterprise applications, data management, data center
    
Intralinks
Published By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : 
data privacy, technology, data, security, safeguards, cloud computing, enterprise applications, data management, business technology, data center
    
Intralinks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee