• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

law

Results 276 - 300 of 323Sort Results By: Published Date | Title | Company Name
By: ProofSpace     Published Date: Aug 08, 2007
Digital signatures aren't enough. This paper posits that data integrity needs to be redefined within the context of a time-sensitive mechanism.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, time stamp, timestamp, time and data stamping, file authentication, x9.95, timestamping, ediscovery, discovery, admissibility, email archiving, surety, authentidate, timecertain
    
ProofSpace
By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
By: Interactive Intelligence     Published Date: Feb 28, 2013
In an effort to help receivables management companies achieve compliance with federal and state laws and regulations, Interactive Intelligence queried a group of ten ARM industry professionals about the future trajectory of compliance issues in 2012.
Tags : 
debt collection, compliance, 2012, interactive intelligence, debt collection compliance, arm, interactive intelligence, knowledge management, enterprise applications
    
Interactive Intelligence
By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : 
att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd, quantum key distribution, security, network architecture, network security
    
AT&T
By: Deep Software     Published Date: Nov 14, 2007
With so much of today's commerce being conducted electronically, providing staff with internet access has become a business necessity. The improper use of e-mail and instant messengers can lead to extremely expensive lawsuits, and the proliferation of mobile devices has made it considerably easier for errant employees to steal sensitive information. This white paper will detail the risks to which organizations that do not monitor their employees are exposed and explain the right way for organizations to go about monitoring.
Tags : 
security, security management, access control, identity management, data protection, email security, iam, authentication, instant messaging, tracking, workforce, workforce management, employee management, deep software, network security, risk management, messaging, employee performance, productivity
    
Deep Software
By: VMware Dell     Published Date: Sep 29, 2008
As a growing law firm, Sills Cummis found itself presented with several classic IT challenges. It had to contend with server proliferation within its data center, implement a cost-effective disaster recovery system, and ensure high availability of key applications and services for its attorneys. Through its purchase of the VMware Infrastructure 3 suite, Sills Cummis was able to tackle all of these problems.
Tags : 
vmware, dell, sills cummis epstein, gross p.c., servers, sql server, disaster recovery, high availability
    
VMware Dell
By: Oce Business Services     Published Date: Jun 24, 2009
In an economic climate that daily seems to underscore nature's law that only the fittest survive, what are some of the actions companies are taking to stay competitive? The majority of survey respondents indicate that the top two moves they are making include reducing operating expenses (51%) and improving cash flow (20%). More effectively controlling and managing document processes, can help meet these objectives.  This survey report investigates how respondents and their organizations are leveraging five document management activities - internal and outsourced - to reduce costs and reach financial goals.
Tags : 
dpm, oce, document process management, lifecycle, document risks, cash flow, survey, internal, outsourced, erp, crm, tco, total cost of ownership, enterprise applications, customer relationship management, enterprise resource planning
    
Oce Business Services
By: Lawson     Published Date: Jun 23, 2008
Lawson Enterprise Asset Management is a software solution specifically designed to help improve the reliability and availability of your critical assets. It can help you to maximize your profitability and return on your asset investment during every stage of the asset lifecycle. It can also be easily integrated with your other business operations and systems.
Tags : 
erp, eam, lawson, manufacturing, enterprise asset management, asset management
    
Lawson
By: Lawson     Published Date: Jun 23, 2008
This insight paper will detail a new breed of enterprise solutions with integrated enterprise asset management (EAM) at their core. It will illustrate how such solutions can help asset-intensive companies to maximize capacity, increase asset utilization, minimize downtime, and provide transparency across all areas of the business.
Tags : 
erp, eam, lawson, manufacturing, enterprise asset management, asset management
    
Lawson
By: Lawson     Published Date: Jun 23, 2008
Get your free copy of the Thought Leadership Report “Strategic Asset Management Across the Organization Delivers a Compelling Return." Based on the findings of the 2006/7 Worldwide Benchmark Study, by industry analysts IDL, it identifies the changing attitudes and needs in the asset intensive industry.
Tags : 
asset management, lawson, erp, eam, lawson, manufacturing, enterprise asset management
    
Lawson
By: Lawson     Published Date: Jun 23, 2008
Managing and maintaining your key assets throughout their entire lifecycle is critical to your organizations success. Rather than looking at each part of the asset's lifecycle in isolation or only focusing on the operational phase, your asset management solution should enable a more holistic view. It should help you manage the entire cycle.
Tags : 
erp, eam, lawson, manufacturing, enterprise asset management, asset management
    
Lawson
By: Lawson     Published Date: Jun 23, 2008
QuickStep for EAM is a solution specially designed and preconfigured to provide the features and functions that companies need for asset management. It can reduce and streamline the steps required for a customized implementation.
Tags : 
erp, eam, lawson, manufacturing, enterprise asset management, asset management
    
Lawson
By: Compinsense     Published Date: Aug 30, 2010
Now more than ever, companies need to establish a solid foundation for their compensation and people programs. Learn how to mitigate your risk to employee lawsuits, keep your employees engaged and make the right decisions about your reward programs during these tough economic times.
Tags : 
lawsuits, employee lawsuit, wage, hour litigation
    
Compinsense
By: HP Software Services     Published Date: Sep 24, 2010
Despite progress in delivering IT as a service, providing up-to-date enterprise software flawlessly and rapidly to the business remains massively challenging for in-house teams.
Tags : 
it infrastructure, the cloud, cloud computing, whitepaper, global survey, it managers, it professionals, application integration, analytical applications, business intelligence, configuration management, database development, data integration, data mining, data protection, data quality, data replication, database security, edi, soap
    
HP Software Services
By: Virgin Pulse     Published Date: Jun 26, 2013
This paper illustrates five current regulatory, social and technological trends that are changing the world of workplace wellness programs — and how you can benefit from those trends.
Tags : 
corporate wellness, heathcare, healthcare reform, benefits, healthcare laws, employee health programs
    
Virgin Pulse
By: Virgin Pulse     Published Date: Jun 26, 2013
Most U.S. businesses are still sorting out the implications of federal healthcare reform — even though the legislation became law in 2010, was upheld by the U.S. Supreme Court last June, and has already seen several of its mandates implemented. Nonetheless, if you’re responsible for the success of your company’s wellness programs, the best part of the complex healthcare reform law is yet to come.
Tags : 
corporate wellness, heathcare, healthcare reform, benefits
    
Virgin Pulse
By: Messaging Architects UK     Published Date: Nov 19, 2010
A paper by Stewart Room, one of EMEA's leading legal experts on data protection and security.
Tags : 
uk email legislation, email, archiving, email archiving, email policy, uk law, enterprise software
    
Messaging Architects UK
By: VitbergLLC     Published Date: Feb 13, 2011
This whitepaper provides an overview of how professional serices firms can generate more leads and get more ROI from their investment in marketing and business development
Tags : 
niche marketing, cpa firm marketing, law firm marketing, consulting firm marketing, professional services marketing, growth strategies, roi from marketing
    
VitbergLLC
By: Liaison Technologies     Published Date: Jun 03, 2011
Download this eBook to learn how to protect sensitive data with tokenization, reduce PCI compliance scope cost, and complexity, and implement best practices for data protection.
Tags : 
liaison, nubridges, lawrence c. miller, tokenization, cissp, data protection, pci compliance, scope cost, pii, ehr, data breach, data security, audits, encryption, key management, network security, auditing, identity management, network security appliance, password management
    
Liaison Technologies
By: Workforce Software     Published Date: Nov 17, 2011
During the past several years, challenges such as increased regulatory pressures, employee fatigue and the ever-present need to reduce costs have all weighed heavily on most human resource organizations. As a result, HR and payroll professionals are playing an increasingly strategic role in the day-to-day operation of the business.
Tags : 
workforce management software, labor laws, california labor laws, change management, labor law compliance, time and attendance, time and attendance software, labor scheduling, labor scheduling software, employee scheduling, absense management, absense management software, fatigue management, employee fatigue management, mobile workforce management, mobile time and attendance, mobile scheduling software, flsa, flsa compliance, fmla
    
Workforce Software
By: IBM     Published Date: Mar 12, 2013
Follow-on white paper on the state of the Itanium market segment after the Oracle lawsuit and subsequent release of the new Integrity systems based on the Intel Itanium 9500 processor.
Tags : 
hp itanium, servers, point of no return, joe clabby, it management, data management
    
IBM
By: Sage     Published Date: Jul 30, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : 
sage, compliance, workforce, fines, reporting, mandates
    
Sage
By: Sage     Published Date: Aug 19, 2014
The Patient Protection and Affordable Care Act (PPACA), signed into law by President Obama on March 23, 2010, and the amendments made by the Healthcare and Reconciliation Act of 2010 (together, known as the Affordable Care Act), have significant employment tax and information reporting implications. This survival guide will address the changes facing employers. You’ll find explanations of compliance issues, checklists of what your company should be doing, and a calendar of important effective dates.
Tags : 
sage, healthcare reform, ppaca, affordable care act, compliance, employment tax
    
Sage
By: Sage     Published Date: Aug 19, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, human resources, recruit, risk, intellectual property
    
Sage
By: HireRight     Published Date: May 01, 2013
There are a number of reasons why shrewd staffing agencies run background checks on potential employees before inviting them in to their business and, in turn, into their customers’ businesses. Background screening may be required by law for certain placements and industries, or, the customer may require screening. In all instances, failure to properly screen employees can have serious business and financial consequences. This industry brief outlines the risks that can arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
staffing, hireright, human resources, hr department, clients, potential employees, human resource technology
    
HireRight
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter