legal

Results 126 - 150 of 242Sort Results By: Published Date | Title | Company Name
Published By: Lumension     Published Date: Jan 18, 2013
HIPAA and the HITECH Act put pressure on your organization to maintain the privacy and security of patient data, with the potential legal liability for non-compliance. So how does your healthcare organization meet industry best practices?
Tags : 
hipaaa, hitech act, compliance, cyber liability, healthcare data, data compliance
    
Lumension
Published By: NAVEX Global     Published Date: Mar 04, 2014
NAVEX Global commissioned an independent third party study of over 300 Ethics and Compliance senior level decision makers in compliance, HR, legal and risk roles across multiple industries, to understand how they are allocating their budgets and which activities are contributing to their program success. Download this spending research report to benchmark your program and use these key lessons from your peers to boost your ethics and compliance programs' effectiveness.
Tags : 
navex global, ethics and compliance, compliance function, organizational imperative, corporate management, compliance implementation, effective compliance, budget driver, protection, reputation, human resources
    
NAVEX Global
Published By: Equity Administration Solutions Inc     Published Date: Jun 19, 2013
Learn the 10 key legal requirements, employer and employee tax considerations, and the most common challenges in offering a Code Section 423 plan.
Tags : 
tax, requirements, stock purchase plans, legal, employer tax, employee tax
    
Equity Administration Solutions Inc
Published By: CompareBusinessProducts.com     Published Date: Jul 11, 2013
The basis for Legal Hold and Data Preservation Best Practices was the exceptional work by the group of presenters at the 2012 Conference on Preservation Excellence, held in Portland, Oregon in late September. The conference focused solely on the area of data preservation best practices. Download this White Paper for more information.
Tags : 
legal, preservation, legal hold, data, technology, best practices
    
CompareBusinessProducts.com
Published By: CompareBusinessProducts.com     Published Date: Jul 11, 2013
Data drives everything in today's business world, and it would be hard to name a more important concern for today’s corporate arena than data preservation. The growing urgency of this matter, until last year a novelty to most attorneys, touched off a flurry of rulings in the area of legal holds in 2010, with several major court decisions redrawing the map in what had been virtual terra incognita.
Tags : 
legal, litigation, preservation, strategy, technology, e-discovery, cost effectiveness, legal hold
    
CompareBusinessProducts.com
Published By: E-SignLive by Silanis     Published Date: Oct 02, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile devices as productivity tools and developing enterprise apps for these devices. Electronic signature technology is pivotal to enabling mobile transactions beyond just informational apps. Not only in terms of straight-through processing (STP), but also for full compliance, legal enforceability and record retention. With most organizations’ mobile strategies still in the early stages, this article provides a starting point to help you better understand mobile e-signatures for business. It reviews the top 10 capabilities that businesses need in order to properly equip their customer-facing workforce with mobile e-signing.
Tags : 
ipad, mobility, apple, e-signatures, esign, marketing, enterprise, cio, networking, security, it management, wireless, enterprise applications
    
E-SignLive by Silanis
Published By: The Vitality Group     Published Date: Jan 28, 2014
This technical brief streamlines and simplifies the key issues in the new regulatory landscape and provides information to help inform important business decisions regarding Wellness programs. "The Legal Environment of Wellness" offers in depth information abuot wellness program requirements under the ACA, and reviews how corporate wellness programs are impacted by the rulings of the Affordable Care Act (ACA) and HIPAA. In addition to the ACA, it covers information companies need to be aware of regarding how other legislation may impact their health promotion efforts. Choosing a new wellness program or bringing current programs into compliance will require a thorough understanding of new and existing laws and sometimes complex decisions and structural redesign.
Tags : 
employee wellness, employee wellness program, employee health, employee benefits, corporate health program, corporate wellness program, corporate wellness incentive program, employee health and wellness program, employee health incentive pgoram, employee wellness incentive program, workpace wellness program, workplace health program, workplace health promotion, health and wellness program, workpace health program, workplace health promotion, health and wellness program, corporate health program cost, affordable care act compliance, afordable care act provisions
    
The Vitality Group
Published By: BitSight Technologies     Published Date: Jan 11, 2016
Is Illegal File Sharing Occurring Within Your or Your Vendors’ Cyber Ecosystem? Learn about the risks posed by peer-to-peer file sharing and why you should be monitoring this activity.
Tags : 
networking, security, it management, data management, human resource technology, it career advancement, business technology
    
BitSight Technologies
Published By: Mimecast     Published Date: Dec 20, 2018
According to Gartner, E-discovery readiness is an initiative that spans legal, IT and business stakeholder concerns and can also unify and align with archiving and data management strategies. To reduce risk and exposure, an E-discovery plan should be proactive and holistic instead of reactive and time pressured. This newsletter, “Strengthen E-Discovery Readiness to Reduce Cost and Risk” features Gartner research and offers guidance on the considerations for and E-discovery action plan, such as retention schedules, access rights, privacy concerns and security controls.
Tags : 
    
Mimecast
Published By: Mimecast     Published Date: Dec 20, 2018
Your corporate email is a vital repository of critical business information. In the age of the cloud and mobility, empowering users accessing that information quickly and efficiently can’t be an afterthought. You may think you can get by with your old email archive, but your organization and your employees will suffer without the latest technology. Learn more in this TechTarget whitepaper Email Archiving: It’s Time for an Update. Download now to get the facts about: How archaic email archives slow down productivity and increase IT help desk burdens Why return-on-investment for old archiving solutions hurt your bottom line Ways poor e-discovery capabilities leave you vulnerable in legal challenges
Tags : 
    
Mimecast
Published By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : 
backdoor trojans, trojan protection, malware, malware protection
    
McAfee
Published By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, encryption, policy based, filtering
    
Trend Micro SaaS
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : 
saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering
    
Trend Micro SaaS
Published By: Skillsoft     Published Date: Mar 03, 2015
The face of corporate learning has changed. It is no longer possible to develop your human capital with a single approach. Today’s corporate environment calls for out-of-the-box thinking, incorporating the advantages of many types of learning to benefit your company’s single biggest investment: your people. This handy guide will help you navigate the growing number of learning solutions and equip you with eight must-ask questions as you develop your learning program.
Tags : 
skillsoft, development, programs, processes, business management, elearning, corporate education, courses, courseware, technology, resources, access, devices, support, mobile, video, content, on-demand, build, buy
    
Skillsoft
Published By: G/O Digital     Published Date: Nov 13, 2014
It doesn't matter the legal field you specialize in – personal injury, bankruptcy, real estate, family law – you probably don’t have the time to focus on clients, the daily operations of your practice, and grow your business at the same time. To maintain a local business, you continually need to search for new business leads while still providing the best service to your clients and still find some time to sleep at night. This guide is here to help you boost your online lead generation with simple-to-execute solutions and best practices. Download this guide to help boost your online lead generation with simple-to-execute solutions and best practices.
Tags : 
digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media, email marketing, web development, web design, enterprise applications
    
G/O Digital
Published By: Cymfony     Published Date: Sep 13, 2007
The pharmaceutical industry is very interested in using social media to promote products, services and issues important to it. However, many drug firm executives are uncertain about how to tackle the legal and regulatory issues associated with social media communications.
Tags : 
health, healthcare, pharmaceuticals, pharmaceutical, social media, fda, compliance, cymfony
    
Cymfony
Published By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : 
mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
    
Mimecast
Published By: Arkadin     Published Date: Sep 11, 2013
The legal industry, like almost all others, is faced with doing more with fewer resources. This whitepaper provides valuable information on how remote collaboration solutions such as audio, video, and web conferencing can help lower costs, increase productivity, and drive incremental revenue.
Tags : 
legal, legal solutions, legal communications, legal collaboration, legal conferencing, legal issues, compliance laws, law, legal services, remote collaboration, remote conferencing, remote communications, arkadin, remote depositions, litigation, cost effectiveness, legal market place, web and audio conferencing, web conference, audio conference
    
Arkadin
Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance, security, knowledge management, enterprise applications, data management, data center
    
Intralinks
Published By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : 
data privacy, technology, data, security, safeguards, cloud computing, enterprise applications, data management, business technology, data center
    
Intralinks
Published By: Adobe     Published Date: Apr 13, 2015
In this white paper learn how e-signatures are making workflows easier and more productive than ever before. Learn how e-signatures remove the last barrier between a hybrid paper-to-digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract—sales, employment and hiring, purchase orders, legal agreements, and more. Download this white paper to learn more.
Tags : 
adobe, electronic signatures, digital transactions, paper-to-digital
    
Adobe
Published By: Adobe     Published Date: Aug 20, 2015
IT leaders need tools to protect a company's most important documents. That means sales agreements, offer letters, procurement contracts, legal documents - and everything between.
Tags : 
adobe, document, crm, mobile, sales, automation, cloud, it management, storage, data management, business technology, data center
    
Adobe
Published By: Adobe     Published Date: Mar 16, 2016
In this white paper learn how e-signatures are making workflows easier and more productive than ever before. Learn how e-signatures remove the last barrier between a hybrid paper-to-digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract—sales, employment and hiring, purchase orders, legal agreements, and more.
Tags : 
digital, digital systems, mobile, broadband, wireless, web applications, networking, knowledge management, enterprise applications
    
Adobe
Published By: Special Counsel     Published Date: Mar 25, 2015
Law firms and corporate legal departments seek experienced legal professionals with business acumen and knowledge of technology. The supply of these professionals is struggling to meet the demand, but that could change. The latest white paper from Special Counsel explores which legal – and non-legal – skills are critical in today’s evolving legal industry.
Tags : 
talent shortage, skills gap, legal talent shortage, legal soft skills, legal professional development, legal employment, legal recruiting
    
Special Counsel
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.