law

Results 226 - 250 of 311Sort Results By: Published Date | Title | Company Name
Published By: Aflac     Published Date: Feb 15, 2013
Is your business prepared for important health care decisions in 2013? Navigate health care reform with Aflac’s Health Care Essentials.
Tags : 
health care reform, employer-sponsored health insurance, benefits, workforce, affordable care act, aca, ppaca, obama care, health care, exchange, private exchange, public exchange, supplemental, insurance, voluntary insurance, regulations, health care law
    
Aflac
Published By: IBM     Published Date: Jul 17, 2018
Ensuring your data is compliant can be a fairly straightforward task. Your IT team works their way through the checklist, and stays out of trouble with lawyers and regulatory agencies. There’s value to that. But true data protection is more than regulatory compliance. In fact, even if you’re compliant, your organization could still be at risk unless you strategically identify and protect your most valuable data. Traditionally, you’ve been presented with IT security metrics—sometimes reassuring, other times alarming. But simply reviewing IT security metrics is not meaningful in and of itself. As an executive, you don’t evaluate issues in siloes. Instead, you excel at assessing issues in the broader context of your organizational operations. In other words, technical security data and metrics lack value unless viewed through the lens of business risk. When you’re presented with IT security metrics, your question is: What does this mean for my business? And ultimately, what data should I
Tags : 
    
IBM
Published By: Group M_IBM Q418     Published Date: Sep 25, 2018
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so after GDPR went into effect May 25, 2018. Under GDPR, organizations are subject to new, uniform data protection requirements—or could potentially face hefty fines. So what factors played into GDPR’s passage? • Changes in users and data. The number, types and actions of users are constantly increasing. The same is true with data. The types and amount of information organizations collect and store is skyrocketing. Critical information should be protected, but often it’s unknown where the data resides, who can access it, when they can access it or what happens once
Tags : 
    
Group M_IBM Q418
Published By: IAG Consulting     Published Date: Aug 24, 2010
Requirements quality is tangible. It is possible to look at the specific characteristics of requirements documentation and determine if it is sufficiently clear, accurate and complete to lead to a successful project. Since flawed requirements trigger about 70% of all project failures,1 this paper will present some hard and fast rules for looking at requirements documents, in any format, and being able to determine if they are reasonably well constructed. It will outline the key points to look for in a requirements document, and why this can save a company hundreds of thousands of dollars. Finally, it will offer five straightforward questions to address when evaluating requirements quality. The paper is not intended to be a full audit of requirements, but rather act as a guide and checklist for evaluation.
Tags : 
iag, project management, project management, maturity, consulting, business requirements
    
IAG Consulting
Published By: VeriSign Incorp.     Published Date: Jul 02, 2008
Learn about governmental standards and regulations, such as HIPAA and Sarbanes-Oxley, covering data protection and privacy. Then, learn how your enterprise can be compliant utilizing the latest encryption technologies.
Tags : 
verisign, pci, hipaa, sarbanes-oxley, fisma, gramm-leach-bliley act, state notice of breach laws, security, ssl, authentication, online security, online business, ssl certificates, ssl certificate, certificate authority, code signing, 128-bit, 256-bit, 128-bit encryption, 256-bit encryption
    
VeriSign Incorp.
Published By: InMage     Published Date: Feb 24, 2009
Leveraging DR-Scout: Howard Rice Lowers TCO and Streamlines Backups with a Disas­ter Recovery Solution Howard Rice Nemerovski Canady Falk & Rabkin P.C. is a San Francisco-based law firm with leading national and international practices, representing entities and individuals across a comprehensive range of practice areas.
Tags : 
inmage, backup windows, rising tco, dr-scout, disaster recovery, data backup, data recovery, network-attached storage, nas, continuous data protection, cdp, data management
    
InMage
Published By: Cisco     Published Date: Nov 17, 2014
This whitepaper informs you on what you should know in order to protect your networks.
Tags : 
sourcefire, antimalware protection, network protection, evolving threats, antimalware vendors, malware, security
    
Cisco
Published By: HR.BLR.com     Published Date: Mar 23, 2012
This special report shows you how to accomplish several objectives in order to plan a customized training program that will keep your company out of court.
Tags : 
    
HR.BLR.com
Published By: Quantcast     Published Date: Aug 30, 2012
In this whitepaper, you'll discover the six reasons why some perfectly reasonable hypotheses of RTB 1.0 have turned out to be flawed.
Tags : 
rtb, real time bidding, quantcast, search marketing, display advertising, retargeting ads, remarketing
    
Quantcast
Published By: Yext     Published Date: May 21, 2013
The paper will show every law firm the most common data location problems. It will explain why these problems need to be fixed and then show you the best strategies to fix them.
Tags : 
advertising, marketing, location, listings, maps, directories, yext, business, local, smb, seo, google, yahoo, mapquest, bing, yelp, facebook, foursquare
    
Yext
Published By: DocuSign     Published Date: Aug 09, 2016
This white paper highlights how DocuSign is making an impact in the legal world.
Tags : 
docusign, digital, digital transaction management, papeless, paper cost
    
DocuSign
Published By: Cornerstone OnDemand     Published Date: Feb 05, 2018
58% of executives believe their current performance management approach neither drives engagement nor leads to high performance. It’s high time to make some changes and adapt performance management strategies to better reflect the changing dynamics of the modern workforce and ensure employees reach their potential. Check out “10 Counterproductive Performance Management Assumptions You're Still Making” and see how you can improve your talent development initiatives to increase the productivity and impact of your employees. In this ebook, we'll touch on: • how goals are set and achieved • flaws and biases in manager's assessments • what truly motivates employees • and more Download your copy and get started!
Tags : 
performance management, performance, performance appraisal, employee engagement, goals, reviews, learning management system, performance management software, 360 degree feedback, workforce development, talent management, performance management software
    
Cornerstone OnDemand
Published By: OutSystems     Published Date: Mar 24, 2014
Mobile has become standard in the enterprise with smartphones and tablets common in the workplace. Anywhere, anytime access to company systems is expected and systems must work flawlessly on these devices! This eBook looks at how to kick start your mobile application strategy.
Tags : 
outsystems, mobile, app, mobile applications, mobile strategy, corporate it departments, smartphones, tablets, networking, business technology
    
OutSystems
Published By: xMatters     Published Date: Feb 04, 2015
Staying on top of cutting-edge communication trends can be the difference in saving lives during a disaster or even preserving customer loyalty by notifying people during a major business interruption. Get the complimentary report written by industry expert Dr. Steven B. Goldman and learn the important trends you need to be aware of in 2015, including: • The increase in security budgets, as well as fines and lawsuits • The continuing rise in data breaches and malicious cyber attacks • The impact of social media on crisis preparations and response • Why natural disasters may be the least of your worries • And most importantly, how to survive the robot uprising!
Tags : 
security, budgets, disaster, business interruption, social media, data breaches, customer loyalty, communication trends, knowledge management
    
xMatters
Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments, vulnerability management, web application security
    
McAfee
Published By: McAfee     Published Date: Dec 09, 2009
Despite the six-year-old CAN-SPAM Act, spammers routinely abuse the law and continue to deliver their obnoxious email. One year ago, a major spam-hosting ISP was shut down, causing an impressive drop in botnet activity. Today, however, spam authors are more active and smarter than ever. Spammers love to tailor their messages to the news and the season. Read this report to gain a greater understanding of current spam threats.
Tags : 
mcafee, spam, risk management, vulnerability, can-spam, anti-spam, virus, botnet, twitter, job spam
    
McAfee
Published By: Tippit ERP     Published Date: May 18, 2009
Download this side-by-side comparison guide that breaks down the industry's top 11 ERP players (including Epicor, Infor, Microsoft, and NetSuite) so you can quickly and easily compare the features and costs of each. Learn more today!
Tags : 
erp, midmarket, inside erp, epicor, infor, microsoft, netsuite, lawson, microsoft, netsuite, crm, enterprise, dynamics, premise, sox, macola, oracle, sap, sage, qad
    
Tippit ERP
Published By: Astaro     Published Date: Aug 10, 2009
The Cisco PIX firewall appliance at Devine Millimet, Attorneys at Law, needed replacement.
Tags : 
astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine millimet, failover, ssl, vpn, intrusion, web filtering, anti-malware, security
    
Astaro
Published By: Astaro     Published Date: Aug 10, 2009
Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.
Tags : 
astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls, network, spyware, malware, astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine lake wales, failover
    
Astaro
Published By: Nevada Corporate Headquarters     Published Date: Sep 13, 2011
Incorporating in Nevada provides asset protection and reduced tax exposure. You can live anywhere and still incorporate in the Silver State.
Tags : 
nevada edge, asset protection, tax saving strategies, save money, business lawsuits
    
Nevada Corporate Headquarters
Published By: Asure Software     Published Date: Nov 06, 2013
The white paper will discuss in greater detail what the cost associated with audits, corporate hackers, tax issues, payroll disputes, and employee lawsuits can be. We will then explore how time management software can resolve the problem, and what the next steps to implementing this technology are.
Tags : 
data security, data storage, payroll security, payroll data, workforce management solutions, workforce management software, time and labor management
    
Asure Software
Published By: Cisco     Published Date: Jan 15, 2015
Traditional 100 Gbps pluggable optics (CFP and CFP2) haven't been keeping pace with the ASIC/CMOS technology scale, which drives network bandwidth. CMOS photonics is closing the gap. By taking advantage of CMOS technology, Moore's Law can be applied to optical network applications for the rst time, and Cisco has delivered on Cisco CPAK™—a CMOS photonics-enabled technology.
Tags : 
cloud, growth, traffic, projection, account, network, it management, enterprise applications
    
Cisco
Published By: DocuSign     Published Date: Aug 16, 2016
Introduction Electronic signatures have become common practice in the United States, but confusion still persists regarding the law at a state and federal level. This document provides an overview covering: 1) the legislation enabling electronic signature usage, and 2) the key legal factors arising in electronic transactions.
Tags : 
docusign, client satisfaction, technology, electronic contract, paperless, reduce costs
    
DocuSign
Published By: DocuSign     Published Date: Apr 12, 2017
Electronic signatures have become common practice in the United States, but confusion still persists regarding the law at a state and federal level. This whitepaper provides an overview covering: 1) the legislation enabling electronic signature usage, and 2) the key legal factors arising in electronic transactions.
Tags : 
    
DocuSign
Published By: Adobe     Published Date: Mar 17, 2016
An electronic signature - also known as an “e-signature” - is a simple, legally-binding way to indicate consent or approval digitally. While legally valid and enforceable in nearly every industrialized country around the world, some countries may have different laws when it comes to e-signatures.
Tags : 
adobe, electronic signature, digital signature, business technology
    
Adobe
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee