• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

law

Results 251 - 275 of 323Sort Results By: Published Date | Title | Company Name
By: Tippit ERP     Published Date: May 18, 2009
Download this side-by-side comparison guide that breaks down the industry's top 11 ERP players (including Epicor, Infor, Microsoft, and NetSuite) so you can quickly and easily compare the features and costs of each. Learn more today!
Tags : 
erp, midmarket, inside erp, epicor, infor, microsoft, netsuite, lawson, microsoft, netsuite, crm, enterprise, dynamics, premise, sox, macola, oracle, sap, sage, qad
    
Tippit ERP
By: Astaro     Published Date: Aug 10, 2009
Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.
Tags : 
astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls, network, spyware, malware, astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine lake wales, failover
    
Astaro
By: Nevada Corporate Headquarters     Published Date: Sep 13, 2011
Incorporating in Nevada provides asset protection and reduced tax exposure. You can live anywhere and still incorporate in the Silver State.
Tags : 
nevada edge, asset protection, tax saving strategies, save money, business lawsuits
    
Nevada Corporate Headquarters
By: Asure Software     Published Date: Nov 06, 2013
The white paper will discuss in greater detail what the cost associated with audits, corporate hackers, tax issues, payroll disputes, and employee lawsuits can be. We will then explore how time management software can resolve the problem, and what the next steps to implementing this technology are.
Tags : 
data security, data storage, payroll security, payroll data, workforce management solutions, workforce management software, time and labor management
    
Asure Software
By: Cisco     Published Date: Jan 15, 2015
Traditional 100 Gbps pluggable optics (CFP and CFP2) haven't been keeping pace with the ASIC/CMOS technology scale, which drives network bandwidth. CMOS photonics is closing the gap. By taking advantage of CMOS technology, Moore's Law can be applied to optical network applications for the rst time, and Cisco has delivered on Cisco CPAK™—a CMOS photonics-enabled technology.
Tags : 
cloud, growth, traffic, projection, account, network, it management, enterprise applications
    
Cisco
By: DocuSign     Published Date: Aug 16, 2016
Introduction Electronic signatures have become common practice in the United States, but confusion still persists regarding the law at a state and federal level. This document provides an overview covering: 1) the legislation enabling electronic signature usage, and 2) the key legal factors arising in electronic transactions.
Tags : 
docusign, client satisfaction, technology, electronic contract, paperless, reduce costs
    
DocuSign
By: DocuSign     Published Date: Apr 12, 2017
Electronic signatures have become common practice in the United States, but confusion still persists regarding the law at a state and federal level. This whitepaper provides an overview covering: 1) the legislation enabling electronic signature usage, and 2) the key legal factors arising in electronic transactions.
Tags : 
    
DocuSign
By: Adobe     Published Date: Mar 17, 2016
An electronic signature - also known as an “e-signature” - is a simple, legally-binding way to indicate consent or approval digitally. While legally valid and enforceable in nearly every industrialized country around the world, some countries may have different laws when it comes to e-signatures.
Tags : 
adobe, electronic signature, digital signature, collaboration, collaborative commerce, customer experience management, document management
    
Adobe
By: CBIZ     Published Date: Nov 22, 2013
What every business must know about the new tangible property regulations – the most dramatic changes in tax law since the overhaul of the Internal Revenue Code. Learn about the complex rules and the related tasks so that you can ensure compliance.
Tags : 
tangible property regulations, tax deduction opportunities, de minimis safe harbor, write-off opportunities, deductible repairs, capitalization write-off, depreciation, form 3115, tpr
    
CBIZ
By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : 
tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules, call center compliance, do not call, prior express written consent, prior express consent, proof of opt-in, consent to call, outbound marketing, autodialed calls, prerecorded call, robocalls, autodialer, leadid
    
ActiveProspect, Inc.
By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : 
tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules, call center compliance, do not call, prior express written consent, prior express consent, proof of opt-in, consent to call, outbound marketing, autodialed calls, prerecorded call, robocalls, autodialer, leadid
    
ActiveProspect, Inc.
By: Symantec     Published Date: Dec 04, 2014
SSL/TLS has been & will be a core enabling technology critical for securing communications. The most significant challenge facing the SSL ecosystem is its implementation. Researchers have recently published reports indicating widespread errors & shortcomings in the implementation of SSL/TLS in mobile applications. These issues often result from flawed use of SDKs or APIs used by developers. This paper lists necessary steps to take to create a stronger, more trustworthy SSL implementation. All SSL client non-browser applications should follow all these practices to ensure strong authentication, confidentiality & integrity.
Tags : 
ssl/tls, sdks, apis, quick guide, apps, ssl ecosystem, security
    
Symantec
By: Seamless     Published Date: Jun 18, 2013
Michael Farino is the Hospitality Manager for the New York office of DLA Piper (DLA), one of the world’s largest business law firms.Michael and his team oversee the firm’s meal program and all caterin gand special events. With 500 employees in the office and dozens of client meetings and special events each month, this is no small task. DLA worked with Seamless to create a set of rules that would govern when and how employees could order food. Each and every one of DLA’s 500 NYC-based employees was given a username and password. Everyone was free to log-in and order their own meals. Everyone was also assigned to a specific budget group. These budget groups are based each person’s role at the Firm and can accommodate different spending limits and permission levels. As Michael notes, “right away, Seamless gave us the power to enforce our rules,but still be flexible so people get what they need. It’s a win-win.”
Tags : 
    
Seamless
By: IBM     Published Date: Sep 18, 2008
When bound to regulation and compliance, process manufacturers find opportunities to grow through enterprise resource planning (ERP). However, 50% of process manufacturers execute non-integrated ERP strategies. This Aberdeen Group research study reveals best practices to help you adapt or select an ERP vendor that improves your business performance.
Tags : 
erp, enterprise resource planning, cindy jutras, process, process industry, chemical, food and beverage, food, beverage, pharmaceutical, pharma, best-in-class, material requirements planning, mrp, global competition, manufacturing process, microsoft dynamics, acsis, fullscope, traceability
    
IBM
By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa, hipaa compliance, regulatory compliance, authentication, imprivata, network security, access control, application security
    
Imprivata
By: PassGo     Published Date: Aug 21, 2009
The law in the United Kingdom has various influences on organizational information security policy. As well as protecting the rights of individuals and organizations, it also imposes many duties and responsibilities. For organizations to meet their legal obligations a number of technical controls can be put in place.
Tags : 
information security, europe, security policies, policy based management, compliance, united kingdom, european, database security, data security, passgo, pass go, security, application security, internet security
    
PassGo
By: Quocirca     Published Date: Apr 09, 2008
Today, many organizations are increasingly reliant on software application development to deliver them competitive edge. Simultaneously, they are progressively opening up their computer networks to business partners, customers and suppliers and making use of next-generation programming languages and computing techniques to provide a richer experience for these users. However, hackers are refocusing their attention on the vulnerabilities and flaws contained in those applications.
Tags : 
quocirca, application security, security
    
Quocirca
By: Quocirca     Published Date: Aug 05, 2008
As the EU continues to expand, European businesses must look to how they can trade across increasing numbers of regional boundaries, languages, cultures and laws, both within the EU and across the greater Europe. The opportunities are huge – but the problems will daunt many who wish to enter into a pan-European trading environment.
Tags : 
quocirca
    
Quocirca
By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : 
log file, data protection, log management, legal log, log data, log law, authenticated log, netiq, net iq, networking, governance, local area networking, monitoring, network management, network performance management, network security, remote network management, servers, tcp/ip protocol, test and measurement
    
NetIQ Corporation
By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps companies comply with AB 1950, allowing companies to use automated processes to manage their security. Hailstorm is a key tool for preventing breaches.
Tags : 
identity theft, application security, password management, security management, compliance, california sb 1386, senate bill 1386, ab 1950, cenzic, security, network management, network security, hacker detection, intrusion detection, intrusion prevention, policy based management, security policies, data protection, software compliance, sarbanes oxley compliance
    
Cenzic
By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance, vulnerability management, software compliance, regulatory compliance, cenzic, security, it management, firewalls, high availability, identity management, intrusion detection, intrusion prevention, policy based management, security management
    
Cenzic
By: GFI     Published Date: Sep 16, 2008
Email is a primary source of documentation for many organizations and it has taken on an increasingly critical role in corporate litigation and court cases. The need to archive all email correspondence is growing in importance because companies are realizing that being in a position to retrieve an old email could save them thousands of dollars (euros) in legal fees and fines as well as their credibility.
Tags : 
email, archive, archiving, sox, sarbox, sarbanes oxley, sarbanes-oxley, gfi, compliance, sarbanes oxley compliance, email archiving
    
GFI
By: GFI     Published Date: Jun 03, 2009
More than ever, SMBs need to focus on security as part of their IT infrastructure, building around it rather than considering it as an afterthought. This has become even more critical over the past few years as many businesses have unwittingly lost their customers’ personal data due to security breaches, and as states and countries have responded by enacting laws to force the businesses to implement additional levels of protection.
Tags : 
gfi, smbs, small, medium, business, it infrastructure, security, windows nt, exchange server, aup, acceptable use policy, remote access policy, secure, internet policy, it management, infrastructure, access control, internet security
    
GFI
By: ProofSpace     Published Date: Aug 07, 2007
This white paper presents a solution framework for Life Science Organizations that want to implement enterprise digital trust management to protect their electronic value chain.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter