regulations

Results 201 - 225 of 358Sort Results By: Published Date | Title | Company Name
Published By: Justworks     Published Date: Sep 27, 2017
Staying compliant with payroll regulations and tax codes is a constant challenge for employers. A third of small businesses are fined for incorrect payroll procedures, turning minor errors into a major problem for the company’s bottom line. Don’t let routine payroll and human resources (HR) tasks trip up your small company. When you can’t afford the staffing it would take to keep up with over 15,000 tax codes, the easiest answer is to work with a professional employer organization (PEO). PEOs manage HR, payroll, and employee benefits, ensuring that you’re compliant and current on all regulations.
Tags : 
    
Justworks
Published By: Kaspersky Lab     Published Date: Oct 30, 2014
Businesses today are faced with the almost insurmountable task of complying with a confusing array of laws and regulations relating to data privacy and security. These can come from a variety of sources: local, state, national, and, even, international law makers. This is not just a problem for big businesses. Even a small business with a localised geographic presence may be subject to laws from other states and, possibly, other nations by virtue of having a presence on the internet. In many instances, these laws and regulations are vague and ambiguous, with little specific guidance as to compliance. Worse yet, the laws of different jurisdictions may be, and frequently are, conflicting. One state or country may require security measures that are entirely different from those of another state or country. Reconciling all of these legal obligations can be, at best, a full time job and, at worst, the subject of fines, penalties, and lawsuits.
Tags : 
byod, device discovery, data privacy, data security, it security, security, it management, data management
    
Kaspersky Lab
Published By: KeyBank Commercial Banking     Published Date: Nov 08, 2017
See what’s on the minds of middle market leaders by reading our latest quarterly report now.
Tags : 
middle market, us economy, economic outlook, business acquisitions, business expansion, treasury regulations, corporate tax reform
    
KeyBank Commercial Banking
Published By: KPMG     Published Date: Jun 06, 2019
As rising consumer expectations ramp up reputational risk, retailers need to keep up to date with regulatory developments. This report provides a comprehensive overview. Read the report to find out: • what customers care about that could affect your reputation • which regulations you must comply with to manage reputational and financial risk • why brand and reputation is a top concern for UK CEOs.
Tags : 
    
KPMG
Published By: Kronos     Published Date: May 30, 2018
How do you know for sure that you're managing compliance with labor laws and regulations correctly and accurately? Start by completing this checklist. Responses to a recent Kronos® survey of 812 HR and payroll managers identified five key compliance readiness issues that organizations need to address to reduce risk of noncompliance. These issues were determined from questions such as: •Can I easily respond to and communicate to my organization about new regulations within 60 to 90 days? •Do I spend more time on duplicate data entry among various systems than I do on strategic initiatives? •Does my workforce management vendor provide education and tools that help my organization stay compliant? Download this piece and complete the entire checklist to see where your organization stands on compliance preparedness. You can also and find out more about the Kronos single unified platform for HR and payroll that can help you adapt to regulatory changes and reduce the data-entry complexity, co
Tags : 
    
Kronos
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Feb 18, 2019
The largest national multiline insurance had built a repository of Insurance policies (P&C and Life Insurance) on Microfilm and Microfiche in early 90’s, as a preservation strategy. They were grappling with issues as this technology became outdated over time: • Risk of losing their only source of data for Insurance policies and corresponding communication, need to improve data availability and speed of claims evaluation • Compliance issues, need of a WORM (write once read many) storage compliant with FINRA regulations, where data should be encrypted when at rest • Total cost for digitization compared to 10-12 years of support left to maintain insurance policies was not very encouraging • Required a low cost, cloud-based, FINRA-compliant document management solution which could provide quick access to stored data Download complete case study to know how LTI’s e-Office sDownload full case study to know how LTI’s e-Office solution enabled 50% TCO for Largest national Multiline Insurance.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Mar 03, 2020
Global automotive insurer was at serious risk of losing business to competitors, especially with a growing number of digital customers, and was struggling with challenges like: Rigid and disconnected legacy systems, Expansion of the sales portfolio, Poor lead generation, Lack of synergy between marketing and customer service operations etc. LTI's insurance industry specialists and Pega experts leveraged Pega's unified customer engagement solution to transform siloed sales, service and marketing operations into a cohesive engagement platform.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Lenovo     Published Date: Jul 07, 2020
In today’s perilous cyber world, it’s crucial for companies to assess and monitor the security of their vendors, suppliers and business partners. Failing to do so can be risky, because hackers frequently steal sensitive enterprise data by targeting third parties to which enterprises are connected. In addition, regulations like GDPR and NYDFS are holding businesses accountable for their third parties’ cybersecurity and enforce stiff penalties for those that don’t comply. For these reasons, companies must carefully check their vendors’ cyber posture, and the initial vetting of any third party typically begins with a comprehensive security questionnaire. What are some of the matters that should be addressed to determine if vendors have a strong posture? Download this whitepaper to find out what are the 10 important questions you should never forget to ask.
Tags : 
    
Lenovo
Published By: Lenovo and Intel     Published Date: Jul 10, 2018
The risk of cyber attacks and the cost of failure are increasing. Penalties associated with failure are only going to increase. And these challenges are compounded by increasing collaboration, use of cloud-based solutions, and an increasingly mobile workforce. Join experts from Forrester, Lenovo and Microsoft as they explore Forrester’s newly updated Zero Trust Extended framework. Then Lenovo covers how the four core components of its Data, Identity, Online and Device (DIODe) approach can minimize risk to data and critical IT. By taking these important steps toward a full Zero Trust Extended framework, you can: Protect the business from advanced threats Reduce the impact of breaches Easily support new business and operating models Rise to the challenge of evolving regulations like FISMA, HIPPA, PCI and GDPR
Tags : 
    
Lenovo and Intel
Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employee’s USB stick, one hacker, one virus, or one careless error to compromise your company’s reputation and revenue. The threat of data breach is real and it’s critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection
    
LifeLock
Published By: Litmus Software     Published Date: Feb 10, 2020
Get a comprehensive look at the data, trends, and innovations that shape the email industry in 2020, and learn how they affect your email program. The email landscape shifts a little every day. Litmus’ 2020 State of Email Report analyzes the significant email client news, trends, and key industry updates from the past year and breaks down how they will impact your email program in the new email decade. Get your copy and learn: How to react to the most crucial email client updates Apple’s new iPhones, a facelift for Gmail, the rise of Dark Mode, and AMP for Email. 2019 was full of inbox updates marketers can’t ignore, and we break down how they impact your email program. How new privacy laws shape the email industry. Learn what impact GDPR had on the email marketing industry—and how California’s new set of laws is the next step towards tighter privacy regulations worldwide. How email marketing will evolve in the decade to come. Read how leading industry experts see email’s role in the
Tags : 
    
Litmus Software
Published By: LogRhythm     Published Date: Sep 26, 2008
Find out more about how LogRhythm can help organizations fulfill The Federal Information Security Management Act (FISMA) requirements in documentation and implementation of controls for IT systems that support operations and assets.
Tags : 
fisma, nist compliance, comply, security, information technology, information security management, log management, log analysis
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-priority:99; mso-style-qformat:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:11.0pt; font-family:"Calibri","sans-serif"; mso-ascii-font-family:Calibri; mso-ascii-theme-font:minor-latin; mso-fareast-font-family:"Times New Roman"; mso-fareast-theme-font:minor-fareast; mso-hansi-font-family:Calibri; mso-hansi-theme-font:minor-latin; mso-bidi-font-family:"Times New Roman"; mso-bidi-theme-font:minor-bidi;} The Gramm-Leach-Biley Act (GLBA) was enacted to ensure protection over customer’s records and information. LogRhythm can help financial institutions implement and perform procedures to indentify risks, eliminate or reduce these risks, and to monitor and maintain the implemented processes and procedures to ensure that the identified risks are effectively managed. Please read this whitepaper for more details…
Tags : 
glba, glba compliance, gramm-leach-biley act, compliance, financial technology, finance, comply, security
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Is your organization adequately meeting the rules and regulations set forth in the Accountability Act of 1996 (HIPAA)? Learn how LogRhythm’s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements.
Tags : 
hipaa, hipaa compliance, health it, health regulations, compliance, comply, security, information technology
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
This whitepaper highlights some of the key areas in which LogRhythm, the leader in Log and Security Event Management Solutions, can help companies adequately meet the PCI Data Security Standards. The whitepaper also details the compliance requirements along with ways in which LogRhythm meets and exceeds those regulations.
Tags : 
pci, pci compliance, pci-dss compliance, payment card industry, payment card, comply, security, information technology
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Do you need to simplify your financial reporting process to ensure that you are meeting the Sarbanes Oxley requirements? Read this whitepaper to learn more…
Tags : 
sox, sarbanes oxley, sox compliance, sarbanes oxley compliance, compliance, comply, information technology, security
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
LogRhythm, the leader in Log and Security Event Management Solutions, has prepared a "Quick Read" whitepaper to help you understand what's required to ensure compliance with: CIP- 003-1 – Cyber Security – Security Management controls; CIP- 005-1 – Cyber Security – Electronic Security Perimeter(s); CIP- 006-1 – Cyber Security – Physical Security of Critical Cyber Assets; CIP -007-1 – Cyber Security – Systems Security Management; CIP -008-1 – Cyber Security – Incident Reporting and Response PlanningThe whitepaper also contains a compliance reference chart with the specific CIP requirements matched with recommended steps to ensure compliance.
Tags : 
nerc, nerc cip, nerc cip requirements, critical cyber assets, electronic security perimeter, critical cyber assets, compliance, comply
    
LogRhythm
Published By: LogRhythm     Published Date: Sep 26, 2008
Get the facts you need to know about how the collection, management and analysis of log data are integral to meeting many GCSx requirements. Read this whitepaper to learn more…
Tags : 
uk gcsx, uk compliance, gcsx, government connect secure extranet, compliance, comply, security, information technology
    
LogRhythm
Published By: M-Files     Published Date: Feb 24, 2020
Content management and collaboration is not sexy or flashy, but it is essential to the success of any business. Last year content management and collaborative services focused on security, due to the implementation of general data protection regulations (GDPR) and frequency of reported data breaches. Users also said that storage and scalability, embedded offerings, and reporting were their primary concerns. This year user feedback has been radically different thus far; leading with AI/ML, automation, integration, capture, and collaboration. Users stated that although security is still on their radar, they expect vendors to deliver secure products and are more concerned with innovation as a differentiator.
Tags : 
    
M-Files
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
In this webcast, you will hear from an attorney specializing in Information Technology Law and a technology specialist who can help you sort through different solutions in the marketplace. You will learn how to adapt to the number of compliance regulations, data privacy laws, and court orders relating to electronic records.
Tags : 
it compliance, mainline information systems, information technology law, data privacy laws, government regulations, industry best practices
    
Mainline Information Systems
Published By: MarkLogic     Published Date: Aug 31, 2017
With MiFID II regulations demanding increased pre and post-trade transparency for consumers, investment banks are in a race against the clock to demonstrate compliance across a dizzying array of data sources, systems and schemas before January 2018.
Tags : 
    
MarkLogic
Published By: MarkLogic     Published Date: Jun 19, 2017
There is opportunity in the ongoing turbulence throughout the financial industry; however, regulatory and compliance challenges absorb resources and distract focus away from growth. Download white paper to learn about a smart approach to data and innovative tools that build resilience into a business looking to not just weather the storm, but seize the advantage. Overview: - Executive Summary - Challenges of Financial Markets Today - The Need for a 360-View of Data - How to Deliver: Increased Transparency Adapt to Evolving Regulations Improve Compliance and Lower Cost - Solution Architecture for Regulatory Reporting - Case Study: Adapting to Regulatory Complexity "Disparate systems led to frequent cycles spent correcting errors within the data”.
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation
    
MarkLogic
Published By: MarkLogic     Published Date: Jun 21, 2017
Remember Y2K – the IT “problem” that should have brought businesses to a screeching half? Despite the hype, the preparation led to widely documented business benefits and uncovered new opportunities that transformed organizations worldwide. Similarly in today’s highly regulated Financial Services industry, enabling GRC by integrating data from silos can be the driver for future business use cases like machine learning and anti-fraud detection services. GRC can be your catalyst for new opportunities. Listen in as our panel of financial services experts discuss the keys to reinventing your data strategy. We’ll cover: How to align your GRC strategy with a business transformation agenda How to ensure your organization’s approach to data management isn’t just a one-off solution, but a comprehensive one adaptable to changing regulations How to navigate the increasing regulatory demands for granular data security How to turn your compliance spend into new opportunities to earn revenue
Tags : 
banking, financial services, data management, silos, data strategy, transparency, data governance, regulation
    
MarkLogic
Published By: MarkLogic     Published Date: Sep 29, 2017
The clock is ticking: It’s time to future proof your data for MiFID II (and future regulations). Learn how to accelerate your MiFID II Compliance--within 30 days. Download our Quick Start Guide, designed to get you up and running with the major components and related processes for MiFID II, including an approach for building a fully integrated regulatory reporting solution. In the Quick Start Guide, we’ll cover: - What our consulting service can help you accomplish in 30 days - Key factors for your success - How we work - Why financial institutions trust MarkLogic for successful MiFID II implementations • CTA Button: o Get the Quick Start Guide
Tags : 
    
MarkLogic
Published By: McAfee     Published Date: Mar 07, 2013
Recent surveys of IT managers revealed two commonly held beliefs: database regulations are the most challenging to comply with, and of all regulatory standards, the Payment Card Industry Data Security Standard (PCI DSS) the toughest.
Tags : 
pci dss compliance, best database security, pci security standards council, pci dss requirements, database activity monitoring, vulnerability manager for databases
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.