legal

Results 226 - 250 of 263Sort Results By: Published Date | Title | Company Name

Log Law: Is Your Log Data Guilty?

Published By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : 
log file, data protection, log management, legal log, log data, log law, authenticated log, netiq
    
NetIQ Corporation

Privacy, Compliance, and International Data Flows

Published By: NetIQ Corporation     Published Date: Nov 18, 2006
Mandatory compliance requirements often vary or conflict. Discover the major issues and appropriate actions organizations must take today to protect the privacy of information and meet legal and contractual requirements.
Tags : 
compliance, privacy, pci, hipaa compliance, consumer privacy, customer privacy, data protection, database security
    
NetIQ Corporation

Email Archiving in the US: The Key Laws That Affect Your Business

Published By: GFI     Published Date: Sep 16, 2008
Email is a primary source of documentation for many organizations and it has taken on an increasingly critical role in corporate litigation and court cases. The need to archive all email correspondence is growing in importance because companies are realizing that being in a position to retrieve an old email could save them thousands of dollars (euros) in legal fees and fines as well as their credibility.
Tags : 
email, archive, archiving, sox, sarbox, sarbanes oxley, sarbanes-oxley, gfi
    
GFI

The Principles of Electronic Agreement Legal Admissibility

Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography
    
ProofSpace

4 Human Resources Documents Every Manager Can't Live Without

Published By: Atlas Business Solutions     Published Date: Feb 27, 2008
Whether you are a seasoned Human Resource professional, or the owner or manager of a small business, understanding the intricacies involved in organizing the Human Resource functions is absolutely essential to running an efficient and legally compliant company. In this whitepaper, you’ll learn about the four main types of HR documents every manager can’t live without.
Tags : 
personnel, workforce, human resources, workforce management, document management, atlas business solutions, atlas, abs
    
Atlas Business Solutions

A One-Stop-Shop for Marketing Operations at BearingPoint, Inc.

Published By: Aprimo, Inc.     Published Date: Dec 23, 2008
BearingPoint wanted a “one-stop-shop” for its growing marketing organization that was easy to setup and didn’t require a lot of resources. A tool was needed to help with the wide-range of marketing activities that satisfied the needs of the entire marketing team. This system needed to easily handle financial and legal requests, capture campaign and event data, support creative development and reduce manual processes that contributed to the lagging of concrete knowledge of their marketing budgets and spending at any given point in time.
Tags : 
aprimo, marketing operations, financial visibility, marketing resource management, it management, knowledge management, network management, contact management
    
Aprimo, Inc.

Mimosa NearPoint for Microsoft Exchange Server

Published By: Mimosa Systems     Published Date: Jan 14, 2009
Email archiving is emerging as a critical new IT application for managing email. For legal discovery, storage management, and regulatory compliance, email archiving provides important benefits that cannot be achieved with native email applications. The purpose of this “Email Archiving 101” paper is to provide a basic introduction to email archiving and explain how it benefits management of the email application server. The leading enterprise email application is Microsoft® Exchange Server, and this paper is geared toward this application; however, the principles discussed apply to all messaging applications.
Tags : 
mimosa systems, email archiving, mimosa nearpoint, microsoft exchange server, email applications, enterprise email application, it management, enterprise applications
    
Mimosa Systems

New Strategies for Discovery of Email

Published By: Mimosa Systems     Published Date: Jan 14, 2009
This white paper will present an improved approach to legal discovery for Microsoft® Exchange systems provided by Mimosa Systems. Unlike existing methods for legal discovery of Exchange Server data, Mimosa’s approach delivers major advances in performance and granularity of information. To begin this paper, we will review the industry forces that are driving the need to manage email for legal discovery, followed by a discussion of the market-leading enterprise messaging application—Microsoft Exchange Server and the challenges it presents for legal discovery.
Tags : 
mimosa systems, microsoft exchange systems, legal discovery, email for legal discovery, platforms, storage, microsoft exchange, windows server
    
Mimosa Systems

Email Archiving Made Simple - Quick Start Guide

Published By: MessageLabs     Published Date: Jun 03, 2009
Planning to implement an email archiving system? There are many issues to consider – legal risks, storage concerns and data security – it can seem a complex topic!Download this guide to help you make informed decisions about your archiving requirements
Tags : 
email archiving, it manager, symantec, messagelabs, search, retrieval, communications, retention
    
MessageLabs

eDiscovery Compliance and Its New Requirements:The IT Manager's Guide to 100% Compliance

Published By: Symantec.cloud     Published Date: Feb 03, 2010
Email may be used as evidence for or against US and Canadian organizations in litigation. Learn how to preserve, protect, and produce legally compliant email.
Tags : 
messagelabs, symantec hosted services, ediscovery compliance, email security, esi, electronically stored information, compliance, internet security
    
Symantec.cloud

Death to PST Files

Published By: Symantec.cloud     Published Date: Feb 03, 2010
Here are five common problems that occur when corporate employees use PST files and the advantages of email archiving.
Tags : 
messagelabs, symantec hosted services, pst file, personal storage table, email archiving, storage and backup, disaster recovery, compliance
    
Symantec.cloud

Legal Risks: Employee use of Internet & Email

Published By: Symantec.cloud     Published Date: Nov 29, 2010
Read the latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality, remote worker, risk management, human resources services
    
Symantec.cloud

Email Retention and Archiving

Published By: Symantec.cloud     Published Date: Jan 26, 2011
Manage Electronic Records, Minimize Workplace Risks and Maximize Compliance. Learn about the legal and compliance regulations associated with maintaining your business critical emails. Understand how your business could face legal issues if a proper archiving solution is not in place.
Tags : 
symantec cloud, email retention, archiving, legal and compliance, epolicy institute, compliance, policy based management, email archiving
    
Symantec.cloud

Why Google Apps Must Have Compliance Management

Published By: RecMan for Google Apps     Published Date: Sep 30, 2010
Millions of Google Apps users may be in violation of legal and organizational compliance standards. Learn how to avoid it.
Tags : 
compliance, records management, google apps, document compliance, compliance management, saas, records management software, governance
    
RecMan for Google Apps

UK Email Retention Policies

Published By: Messaging Architects UK     Published Date: Nov 19, 2010
A paper by Stewart Room, one of EMEA's leading legal experts on data protection and security.
Tags : 
uk email legislation, email, archiving, email archiving, email policy, uk law, enterprise software
    
Messaging Architects UK

Email Disclaimers: The Legal and Practical Issues

Published By: Red Earth Software     Published Date: Mar 18, 2011
Discusses why email disclaimers are needed, the different types of email disclaimers that can be used, and how to add them.
Tags : 
email disclaimer, legal disclaimer, email signature, disclaimer, disclaimers, signature, signatures, footer
    
Red Earth Software

Impact of Legal Issues on Workplace Productivity Revealed in New Study

Published By: Hyatt Legal Plans     Published Date: Jun 10, 2011
This whitepaper explores the effect employee personal legal matters have on workplace productivity. It also supports the idea that group legal plans help minimize these effects.
Tags : 
employee legal study, employee personal legal matters, group legal plans, legal plans for large businesses, group legal services
    
Hyatt Legal Plans

Top 5 HR Compliance Concerns for Small Business

Published By: TriNet     Published Date: Jun 13, 2011
Top 5 HR Compliance Concerns for Small Business
Tags : 
trinet, compliance, smb, small business, human resources, infrastructure, retirement, health
    
TriNet

Social Recruiting Guide: How to Effectively Use Social Networks and Avoid Legal Risks

Published By: Oracle     Published Date: Sep 24, 2012
This paper will outline why social recruiting is becoming an imperative for companies today and how you can get started in reaching highly qualified candidates and passive job seekers while building brand recognition and reducing sourcing costs.
Tags : 
social recruiting, social network, recruiting, human resources, legal risks, oracle, business technology
    
Oracle

Social Recruiting Guide: How to Effectively Use Social Networks and Avoid Legal Risk

Published By: Oracle     Published Date: Jan 28, 2013
Your company may see the potential for social recruiting or may be using tools today, but a social recruiting strategy needs to be part of overall company goals and objectives to deliver true return on investment (ROI).
Tags : 
social recruiting, social network, recruiting, human resources, legal risks
    
Oracle

The Legal and Commercial Risks and Issues to Consider When Managing Emails

Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security, access control, anti spam
    
Mimecast

What In-Home Service Providers Need to Know About Screening Their Field Employees

Published By: HireRight     Published Date: May 01, 2013
A person’s home is their castle, and no one would willingly welcome in a dangerous criminal. If you offer in-home services, your customers trust you to send someone that is not a threat to their family or personal property. If you fail to do so, there can be serious business , financial and even legal consequences. This industry brief outlines the risks that arise from bad hires and how careful background screening can help mitigate those risks.
Tags : 
field employees, screening, hireright, human resources, in home services screening, human resource technology
    
HireRight

Bribery and Corruption Red Flags “How to Respond to Corruption Indicators”

Published By: NAVEX Global     Published Date: Mar 21, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Before examining some of the common red flags and the appropriate courses of action to take, reviewing the various guidelines and frameworks available for organisations to build adequate procedures to protect themselves against third party risks is advisable. These frameworks have assisted organisations in establishing a strong legal defence in the event that a bribe does occur. These measures are having ramifications across the globe and they inform many of the components of the best ABC programmes in place today.
Tags : 
    
NAVEX Global

Staying Ahead of the Curve

Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
    
Druva

Staying Ahead of the Curve

Published By: Druva     Published Date: Aug 04, 2016
The rise of the mobile workforce, combined with an increasing risk of litigation, has created a crisis for businesses. When faced with a request for eDiscovery—the production of electronically-stored information (ESI) in the course of a lawsuit or investigation—legal and IT teams must identify and place costly, time-consuming holds on responsive files. These holds apply across devices and repositories, both inside and outside the organization, including SaaS-based cloud applications such as Office 365, Google for Work, and Box. And lest these teams become complacent, saying “It won’t happen here,” it should be noted that in 2014, 34 percent of companies faced at least one lawsuit with more than $20 million at issue.
Tags : 
best practices, storage, mobile workforce, technology, data, office 365, mobile device, backup and recovery
    
Druva
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.