regulations

Results 326 - 350 of 352Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Oct 24, 2013
This IBM whitepaper prepares companies to face the impending complexities of the new FASB and IASB lease accounting standards. Learn how smart companies will move beyond the regulations alone and use the regulations as a springboard to transform the way they manage all their assets.
Tags : 
lease accounting, accounting, real estate, asset manager, ibm tririga, new accounting standard, fasb, iasb
    
IBM
Published By: Symantec Corporation     Published Date: Jun 18, 2014
Cloud computing is rapidly transforming the IT landscape, and the conversation around adopting cloud technology has progressed from “if” to “when.” Enterprises are showing strong interest in outsourced (“public”) cloud offerings that can help them reduce costs and increase business agility. These cloud services offer enormous economic benefits but they also pose significant potential risks for enterprises that must safeguard corporate information assets while complying with a myriad of industry and government regulations. Read this white paper to find out what Symantec is doing help to bridge the gap to cloud computing!
Tags : 
symantec, ssl certificates, tco, third party vendors, hidden costs, ssl benefits, management platform, it professionals
    
Symantec Corporation
Published By: IBM     Published Date: Aug 06, 2014
Despite a return to profitability for many banks, the industry still needs to identify new sources of revenue to compensate for declining investment banking activities. For a number of universal banks strapped by regulations, transaction banking has emerged as a key to revenue and profits.
Tags : 
ibm, banking, competition, transaction, profitability, revenue
    
IBM
Published By: NAVEX Global     Published Date: Mar 21, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Before examining some of the common red flags and the appropriate courses of action to take, reviewing the various guidelines and frameworks available for organisations to build adequate procedures to protect themselves against third party risks is advisable. These frameworks have assisted organisations in establishing a strong legal defence in the event that a bribe does occur. These measures are having ramifications across the globe and they inform many of the components of the best ABC programmes in place today.
Tags : 
    
NAVEX Global
Published By: Adobe     Published Date: Mar 03, 2017
Today, customer identity is the only constant in digital marketing. But as consumers switch from desktop to mobile, they are more and more difficult to recognize. But it’s not impossible. The Adobe white paper, Managing Anonymous and Authenticated Experiences Across the Customer Lifecycle, explains best practices to identify your anonymous and authenticated customers while complying with regulations, contracts, and industry standards. Read the paper to learn: • The benefits of well executed personalization • How to navigate the landscape between anonymous and authenticated data • Safe and effective uses of consumer information • The technological building blocks to put these new methods to work
Tags : 
personalization, authenticated data, anonymous data, consumer information, customer life cycle, customer experience
    
Adobe
Published By: IBM     Published Date: Mar 04, 2015
Medical Device companies have typically shied away from design reuse because of the fear of a single point of failure. However due to market pressures, more and more medical device companies must embrace reuse to increase time to market. Unlike common perception, strategic and effective reuse can actually benefit regulated industries like medical devices by expediting compliance. This webcast will discuss the benefits of reuse as well as concepts of continuous engineering that can improve quality for medical devices.
Tags : 
design reuse, reuse, continuous engineering, medical device quality, compliance regulations
    
IBM
Published By: Workforce Software     Published Date: Nov 23, 2015
Access this white paper to learn how WorkForce Software’s EmpCenter suite meets the needs of global employers by automating organizational policies in alignment with national and local labor laws, as well as internal policies and union rules. You’ll learn: The challenges associated with overlapping and ambiguous labor regulations WorkForce Software’s approach to meeting the needs of global companies How WorkForce Software applies regulatory updates to the EmpCenter suite Which compliance regulations are covered in EmpCenter’s preconfigured solutions
Tags : 
labor compliance, multinational organizations, global employers, automation, labor laws, union rules, compliance, labor regulations
    
Workforce Software
Published By: Care360 by Quest Diagnostics     Published Date: Sep 01, 2015
This white paper discusses key strategies for Revenue Cycle Management (RCM) success in your medical practice.
Tags : 
revenue cycle management, rcm, care360, regulations, reimbursement, medical practice
    
Care360 by Quest Diagnostics
Published By: NetApp     Published Date: Mar 05, 2018
Read this comprehensive guide to the General Data Protection Regulation and learn how to comply with new regulations and address business implications, establish a holistic data compliance strategy and better manage your data through the lens of data privacy by design.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: FICO     Published Date: Nov 03, 2015
Meet banking model regulations without killing your analytic's team's productivity.
Tags : 
    
FICO
Published By: FICO     Published Date: Jun 07, 2016
As any line of business (LOB) leader knows, making customer level decisions that balance risk and profit just keeps getting harder. And even when you think you have the right decisions, turning them into actions can be even trickier. You also need to consider the factors that make smart decisions difficult. Big data. Regulations. Customers who want an offer, fast, or else you’re going to lose them.
Tags : 
    
FICO
Published By: VMware AirWatch     Published Date: May 19, 2016
The economy isn’t standing still. For your business to succeed, your employees shouldn’t either. That’s why companies of all types are moving to empower their mobile workforce and engage with customers in innovative ways. To realize their potential, enterprises need to find ways to make a mobile workforce as productive when they’re away from the office and on their mobile devices as they are in the office. This means mobility systems must give users a seamless experience across the ever-expanding types of mobile devices employees use, for easy access to business-critical applications. At the same time, it must deliver a secure workspace that complies with security regulations, protects devices, plus guards business and customer data, from expanding security threats.
Tags : 
innovation, best practices, mobile device, security, mobile workforce
    
VMware AirWatch
Published By: DocuSign     Published Date: Apr 24, 2018
Life science companies are experiencing a significant transformation in how they bring new products to market. Organizations must adapt to changes in the marketplace, such as global product commercialization, specialized medicine, new regulations, new payment models, and new technology that are driving more product variety, smaller drug volumes, and shorter product life cycles. To meet the needs of this new commercial model, life science companies must re-envision the global supply chain and evolve the tools they use to run their business. The supply chain that was designed for launching blockbuster products will not work in the future. Today, the global supply chain relies on a manual, paper-based process centered on printing documents and sending them via overnight mail, fax, or e-mail with scanned attachments. This time-consuming and costly process is errorprone, tedious for customers and team members, and vulnerable to security and compliance risks.
Tags : 
    
DocuSign
Published By: DocuSign     Published Date: Apr 24, 2018
We live in a mobile, digital era where health information is at our fingertips. With the touch of a button, patients can see test results, track prescriptions, and sign up for clinical research. And yet it still takes over a decade to bring breakthrough treatments to market. Scientific productivity must improve: clinical trials are costly and time-consuming, and regulations mandate increased scrutiny and compliance. The patients who rely on your scientific leadership are expecting more. How are you meeting their needs? While intensive research and study are still a prerequisite for success, there is a better way to develop new products and therapies. Download the eBook for best practices to drive digital adoption in life sciences.
Tags : 
    
DocuSign
Published By: IBM     Published Date: Jul 22, 2016
You’ll learn: - About the mandates that will significantly increase transaction complexity and transaction volumes for payers and providers - How to reduce costs and improve processing efficiencies while also decreasing the risk associated with data movement - Ways to improve customer service and ensure compliance with evolving regulations while reducing IT operating expenses
Tags : 
ibm, healthcare, affordable care act, b2b, hipaa, edi regulations, knowledge management, enterprise applications
    
IBM
Published By: AWS     Published Date: Oct 07, 2019
While digital transformation helps create many business opportunities, it can also expose your organization to new vulnerabilities and regulations which require new security solutions. Qualys Cloud Platform is intentionally built to give businesses comprehensive visibility and security of Amazon Web Services (AWS) workloads and hybrid environments while avoiding the cost and complexities that come with managing multiple security vendors. Qualys' offerings simplify security on AWS by integrating into workflows for streamlined deployment and use, while providing a complete view of the security and compliance posture of all your AWS assets across multiple accounts and regions from a centralized UI. Attend this upcoming webinar to learn more about the Qualys consolidated stack of security and compliance applications. Also learn how Ancestry.com, the largest for-profit genealogy company in the world, uses Qualys Cloud Platform on AWS to continuously assess their development and production
Tags : 
    
AWS
Published By: IBM     Published Date: Apr 20, 2017
Do Android’s dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the world’s most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM
Published By: FICO     Published Date: Mar 22, 2018
Cybercrime and data breaches are daily news. Escalating cost, new regulations and increased focus on managing third-party relationships means cybercrime is a boardroom issue. This executive briefng explains why cybercrime is a relevant and pressing problem, and will show you how to evaluate and invest in layered controls to help you understand the security posture for your organisation.
Tags : 
    
FICO
Published By: Oracle     Published Date: Sep 30, 2019
Email deliverability and privacy matters now more than ever. New and existing laws up the stakes for companies that don’t comply with standards and regulations. And today’s email marketers find it increasingly difficult to be heard. You need to master deliverability and privacy to tackle the noise generated by social media, other email marketers, and even word-of-mouth marketing. Your reputation as an email sender impacts your potential reach as a marketer. Here are some factors that can earn you a poor deliverability score and prevent emails from reaching your desired target: f Lack of adherence to an email privacy policy f Poor list management f Frequency and relevancy of sends f Complaints from recipients f Number of blocks f Spam trap hits f How people are engaging Getting your message delivered is vital to revenue performance. A slight increase at the top of the funnel can make a huge difference to your bottom line.
Tags : 
    
Oracle
Published By: CA Technologies EMEA     Published Date: Aug 03, 2017
GDPR compliance can be achieved through a combination of people, processes and technology. This document has described solutions that can help organizations with their GDPR journey. But you can extend that protection and strengthen security controls even further via strong and risk authentication or workload automation for the processing automation of personal data helping you comply with GDPR as well as similar mandates. Regulations tend to set the minimum standards to be required, but in the application economy, open enterprises must ensure due diligence to protect one of the most important and critical assets: private customer information.
Tags : 
identity management, privileged user access, secure privileged credentials, secure hybrid it
    
CA Technologies EMEA
Published By: ForUsAll     Published Date: Jun 18, 2018
The 401(k) market has rapidly changed.Is your plan up to date? Since 2012, there have been significant changes in 401(k)s which have created new risks and opportunities for small and midsized business 401(k) plans. With this rapid pace of change, many business owners, and even some small advisors and recordkeepers have not been able to keep up. We’ll summarize both changes to the 401(k) industry and the opportunities that exist for you to improve your plan, specifically in the following 5 areas: 1. Staying compliant with increasingly complicated regulations – New government regulations have increased burdens on companies offering both health plans and 401(k)s. What used to be compliant may no longer work. Furthermore, software has improved, allowing many error prone, manual retirement plan administration tasks to be automated. 2. Increasing plan effectiveness by lowering fees – Since 2009, average 401(k) plan costs have dropped by almost 30%*. While average costs have come down, not al
Tags : 
    
ForUsAll
Published By: DigiCert     Published Date: Jun 19, 2018
Just as automation has become mandatory for scaling cloud workflows and critical workloads up or down in today’s dynamic business environment, the same is true in today’s dynamic threat environment. The ability to automate certificate renewals with our Complete Website Security solution helps you to strengthen certificate security, while helping you save resources, time and money on certificate administration and ensuring you remain compliant with industry rules and regulations. Download this whitepaper today to find out more.
Tags : 
    
DigiCert
Published By: Box     Published Date: Jun 22, 2018
With GDPR looming large on the horizon in May 2018 and beyond, there are a number of myths and misunderstandings circulating around the upcoming changes to compliance and data protection. In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system, and delve into topics, like: • GDPR strategies for cloud ECM • Cultural changes for upcoming compliance regulations • Projected fines associated with GDPR • And more
Tags : 
    
Box
Published By: CheckMarx     Published Date: Mar 04, 2020
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: CheckMarx     Published Date: Mar 04, 2020
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.