• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

employee rights

Results 1 - 9 of 9Sort Results By: Published Date | Title | Company Name
By: Infosys     Published Date: May 30, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
By: TriNet     Published Date: Jul 28, 2015
6 considerations from a serial entrepreneur and investor.
Tags : 
startup management, infrastructure, employee performance management, hr infrastructure, compliance, hr functions, safe harbors, tax benefits
    
TriNet
By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : 
network protection, it security, firewall, hacker detection, security management
    
McAfee
By: HotSchedules     Published Date: Sep 11, 2018
There’s no two-second rule when it comes to the law, and in today’s legal environment, maintaining compliance is crucial now more than ever. This ebook provides an overview of the labor laws that impact restaurants today and the high cost of non-compliance. It also presents the features of an automated system that gives restaurants the capabilities they need to meet today’s increasingly complex labor compliance regulations—so they can avoid the high price of non-compliance and create work environments that better serve their employees’ needs and rights.
Tags : 
    
HotSchedules
By: Epicor     Published Date: Feb 20, 2018
Cloud is no longer a tactical solution but rather a strategic enabler of connected economies. Technology leaders will orchestrate cloud ecosystems that connect employees, customers, partners, vendors, and devices to serve rising customer expectations. Firms will shift from being mere cloud adopters to becoming cloud companies themselves—stewards of their own ecosystems. This Forrester report—presented by Epicor—highlights the transformation taking place as we move to a world of connected cloud ecosystems, and it describes how: • The cloud economy disrupts business models • Rightsourcing is a key challenge to cloud success • You will orchestrate the cloud, and it will orchestrate you Download the report to learn more and discover why you should change the way you think about cloud.
Tags : 
cloud, erp
    
Epicor
By: Epicor     Published Date: Jul 10, 2018
Cloud is no longer a tactical solution but rather a strategic enabler of connected economies. Technology leaders will orchestrate cloud ecosystems that connect employees, customers, partners, vendors, and devices to serve rising customer expectations. Firms will shift from being mere cloud adopters to becoming cloud companies themselves—stewards of their own ecosystems. This Forrester report—presented by Epicor—highlights the transformation taking place as we move to a world of connected cloud ecosystems, and it describes how: • The cloud economy disrupts business models • Rightsourcing is a key challenge to cloud success • You will orchestrate the cloud, and it will orchestrate you Download the report to learn more and discover why you should change the way you think about cloud.
Tags : 
cloud, erp
    
Epicor
By: Epicor     Published Date: Aug 15, 2018
Cloud is no longer a tactical solution but rather a strategic enabler of connected economies. Technology leaders will orchestrate cloud ecosystems that connect employees, customers, partners, vendors, and devices to serve rising customer expectations. Firms will shift from being mere cloud adopters to becoming cloud companies themselves—stewards of their own ecosystems. This Forrester report—presented by Epicor—highlights the transformation taking place as we move to a world of connected cloud ecosystems, and it describes how: • The cloud economy disrupts business models • Rightsourcing is a key challenge to cloud success • You will orchestrate the cloud, and it will orchestrate you Download the report to learn more and discover why you should change the way you think about cloud.
Tags : 
erp software, enterprise resource planning software, saas, cloud erp, epicor erp
    
Epicor
By: Workforce Software     Published Date: Apr 03, 2012
Employers have seen employment laws change at a breakneck pace over the last few years - a trend sure to continue in 2012. We've asked our Director of Compliance and attorney-at-law Paul Kramer to help us navigate through a slew of recent (and coming) regulatory changes.
Tags : 
human resources, hr management, legal issues, labor laws, compliance laws, employee rights, workforce software
    
Workforce Software
By: Infosys     Published Date: Jun 12, 2018
In the wake of data hacks and privacy concerns, enterprises are working extra hard to make sure they secure customer data from external threats. But what about securing data internally? Organizations unknowingly leave a big security hole in their own systems when they fail to have structured internal processes to handle access requests for employees, which could have disastrous implications for data security. A leading US bank sought to move its internal applications to a secure system for a standard and consistent access rights experience. See how Infosys helped and the five key takeaways from the project.
Tags : 
internal, applications, data, hacks, privacy, enterprises
    
Infosys
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter