legal

Results 151 - 175 of 247Sort Results By: Published Date | Title | Company Name
Published By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : 
data privacy, technology, data, security, safeguards, cloud computing, enterprise applications, data management, business technology, data center
    
Intralinks
Published By: Adobe     Published Date: Apr 13, 2015
In this white paper learn how e-signatures are making workflows easier and more productive than ever before. Learn how e-signatures remove the last barrier between a hybrid paper-to-digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract—sales, employment and hiring, purchase orders, legal agreements, and more. Download this white paper to learn more.
Tags : 
adobe, electronic signatures, digital transactions, paper-to-digital
    
Adobe
Published By: Adobe     Published Date: Aug 20, 2015
IT leaders need tools to protect a company's most important documents. That means sales agreements, offer letters, procurement contracts, legal documents - and everything between.
Tags : 
adobe, document, crm, mobile, sales, automation, cloud, it management, storage, data management, business technology, data center
    
Adobe
Published By: Adobe     Published Date: Mar 16, 2016
In this white paper learn how e-signatures are making workflows easier and more productive than ever before. Learn how e-signatures remove the last barrier between a hybrid paper-to-digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract—sales, employment and hiring, purchase orders, legal agreements, and more.
Tags : 
digital, digital systems, mobile, broadband, wireless, web applications, networking, knowledge management, enterprise applications
    
Adobe
Published By: Special Counsel     Published Date: Mar 25, 2015
Law firms and corporate legal departments seek experienced legal professionals with business acumen and knowledge of technology. The supply of these professionals is struggling to meet the demand, but that could change. The latest white paper from Special Counsel explores which legal – and non-legal – skills are critical in today’s evolving legal industry.
Tags : 
talent shortage, skills gap, legal talent shortage, legal soft skills, legal professional development, legal employment, legal recruiting
    
Special Counsel
Published By: Code42     Published Date: Jan 13, 2016
Read this white paper to learn how the common approaches to e-Discovery miss the mark and how endpoint backup can streamline the collection and preservation of electronically stored information.
Tags : 
code42, e-discovery, endpoint backup, e-discovery methods, data collection, compliance requirements, security, it management, knowledge management, enterprise applications
    
Code42
Published By: RSA     Published Date: Sep 19, 2017
This must-read report featuring insights from respected legal and security experts outlines specific GDPR compliance challenges you probably haven’t considered.
Tags : 
rsa, rsa security, gdpr, data protection, compliance, business technology
    
RSA
Published By: SAP     Published Date: Jan 28, 2008
Many CFOs and the finance organizations they lead have started to take on new strategic roles within the enterprise. Their goal is to enforce stricter control processes to ensure legal and regulatory compliance, offer strategic insights into the internal and external business environment, and connect the business strategy with daily operations through performance tracking.
Tags : 
apqc, spend management, cost control, cost, financial, financials, workforce, workforce management, erp, enterprise resource planning, osbc, sap, strategic finance, sap, finance function, finance organizations, performance tracking, external business environment, internal business environment, regulatory compliance
    
SAP
Published By: Druva     Published Date: Aug 05, 2016
As employees use more devices and cloud apps like Box.com, Google and O365, responding to legal hold or eDiscovery requests becomes costlier and time consuming. Read how to take a proactive approach to eDiscovery data collection for data within and outside the firewall, thereby reducing the risks and costs of litigation.
Tags : 
cloud backup, enterprise, cloud computing, best practices, storage
    
Druva
Published By: Lane Telecommunications     Published Date: Apr 14, 2009
There is little doubt that Multi Function Peripherals (MFP) offer businesses of all sizes significant benefits: they combine printing, scanning, copying and fax functions in one machine and deliver considerable cost and space savings. They also address some very important business process, management and legal issues faced by virtually every business. Within this discussion document we concentrate on the fax element and look specifically at the integration of MFPs with network fax run through a fax server such as Lane’s Passport Fax Server.
Tags : 
fax over internet protocol, mfp, multi function peripherals, network fax, erp applications, off-the-shelf, compliance, fragmented audit trail, optimum mfp, smtp, secure messaging, latency, lane, kudos, enterprise applications
    
Lane Telecommunications
Published By: GFI     Published Date: Sep 04, 2008
Today, more than ever before, legal and compliance issues are driving the case for email archiving. Email archiving legislation is complex and varies greatly from country to country. Unless companies are well versed in compliance law, the various regulations affecting email can be a minefield.
Tags : 
gfi, sox, sox compliance, sarbox, sarbanes oxley, sarbanes-oxley, compliance, email, email archive, email archiving, archiving, archive, storage
    
GFI
Published By: Sunbelt Software     Published Date: Mar 13, 2008
Messaging archiving can help organizations solve all of these problems and can satisfy a wide range of legal compliance, regulatory, storage management, knowledge management and other problems. This Osterman Research white paper discusses the several reasons to implement a messaging archiving system and provide an overview of Sunbelt Software’s offering focused squarely on the archiving space.
Tags : 
email archiving, pst, archive, archiving, compliance, records storage, sunbelt, knowledge management
    
Sunbelt Software
Published By: NewField IT     Published Date: Aug 19, 2008
For the human body to work at its full potential, it needs to be in good shape. Carrying excess fat, as we all know, leads to poor physical and mental performance, and the same could be said to be true of our workplaces. A healthy – and happy – office is one that is lean and fit, where the job in hand can be carried out with energy and efficiency, and where each part of the overall system functions effectively.
Tags : 
knowledge management
    
NewField IT
Published By: BlackBerry     Published Date: Apr 13, 2010
In recent years, law firms have enjoyed remarkable financial returns due to a strong global economy, free flowing capital and a high level of demand for legal services. Law firm revenues and profits continued to be strong, even during the dotcom bust, the post 9/11 slowdown and the increasing cost of associate recruitment and retention. This success could be partly explained by the growth imperative in law firms: they must continue to grow, either by acquisition, or by recruiting laterals or associates, because law firm economics correlates size with profits. And many firms grew rapidly in the past several years.
Tags : 
blackberry, law, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: BlackBerry     Published Date: Aug 10, 2009
In recent years, law firms have enjoyed remarkable financial returns due to a strong global economy, free flowing capital and a high level of demand for legal services. Law firm revenues and profits continued to be strong, even during the dotcom bust, the post 9/11 slowdown and the increasing cost of associate recruitment and retention. This success could be partly explained by the growth imperative in law firms: they must continue to grow, either by acquisition, or by recruiting laterals or associates, because law firm economics correlates size with profits. And many firms grew rapidly in the past several years.
Tags : 
blackberry, altman weil, law, legal, research in motion, voip, smartphones, it communication, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing
    
BlackBerry
Published By: Information Shield     Published Date: Jan 13, 2009
Information security policy development should not be a one-time event. In order to effectively reduce risk and maintain a proper governance structure, organizations must periodically update written security policies as part of an ongoing management process.
Tags : 
information shield, legal exposure, iso/iec, security policies, security framework, hipaa, sarbanes-oxley act, iso 17799, iso 27002, security policy, sample security policy, policies and procedures, pci-dss, regulatory compliance, security, it management
    
Information Shield
Published By: WinMagic Inc.     Published Date: Aug 12, 2013
Many law firms have begun to look to data encryption to safeguard their communications and corporate assets from unauthorized access. Learn the benefits of Encryption technology through this eBook.
Tags : 
data encryption, legal service
    
WinMagic Inc.
Published By: Asset Exchange Strategies, LLC     Published Date: Sep 03, 2010
Properly Structuring your Current IRA or 401k will allow you to invest into a Small Business or Franchise. Asset Exchange Strategies will help you setup and invest your IRA or 401k Into Your Small Business or Franchise, all without Taxes or Penalties.
Tags : 
asset exchange strategies, retirement investment, self directed ira, property, 401k
    
Asset Exchange Strategies, LLC
Published By: IBM     Published Date: Feb 24, 2015
This paper asks the key questions that IT, legal, records, compliance officers and corporate managers should consider when contemplating an information lifecycle governance solution, and why these elements are critical in addressing e-discovery challenges.
Tags : 
ibm, lifecycle governance, e-discovery, e-discovery challenges, ilg solutions, it management, knowledge management, data management
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity, security, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Jun 05, 2018
Keeping up with ever changing contract management work is challenging. Governing legal and procurement content is written by thousands of people and applied to hundreds of situations. To stay compliant, organizations employ knowledgeable professionals to analyze every sentence to determine the changes that need to be made to company contracts. The manual process of sifting through these dense, complicated documents is inefficient and prone to error. Watson Compare and Comply is trained on contract specific knowledge and classifications and can streamline contract workflows through semantic understanding. Join Director of Watson Offering Management, Adam Orentrichler, and Chief Data Scientist of SAP Ariba, David Herman, as they discuss how Watson can transform the way your company manages contract governance.
Tags : 
    
IBM
Published By: Background Direct     Published Date: Oct 01, 2014
Suggested preparation, implementation and legal considerations from Background Direct™ to fortify your background check and drug test programs.
Tags : 
employment screening, background check, drug tests, background screening, aberdeen group1, background direct
    
Background Direct
Published By: InMage     Published Date: Feb 24, 2009
Leveraging DR-Scout: Howard Rice Lowers TCO and Streamlines Backups with a Disas­ter Recovery Solution Howard Rice Nemerovski Canady Falk & Rabkin P.C. is a San Francisco-based law firm with leading national and international practices, representing entities and individuals across a comprehensive range of practice areas.
Tags : 
inmage, backup windows, rising tco, dr-scout, disaster recovery, data backup, data recovery, network-attached storage, nas, continuous data protection, cdp, data management
    
InMage
Published By: InMage     Published Date: Feb 24, 2009
The AODA currently provides IT support and management for 32 remote offices serving approximately 1,000 end users. In a field dependent upon the highest standards of data integrity, protection and retention, it was critical for the AODA to implement the disaster recovery (DR) and business continuity solutions necessary for fulfillment of its objectives.
Tags : 
inmage, data recovery, disaster recovery, business continuity, new mexico state aoda, dr scout, continuous data protection, cdp, disaster recover software, data management
    
InMage
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee