regulations

Results 251 - 275 of 334Sort Results By: Published Date | Title | Company Name

The Move to Push Button Business Recovery, The New Corporate Requirement for Enterprise Business

Published By: InMage     Published Date: Feb 18, 2009
Companies of all sizes realize that near real-time business recovery is no longer a nice-to-have – it is becoming a new corporate must have. Competition, regulations and the 24x7 nature of businesses all push for continual application and data availability under almost any circumstances.
Tags : 
inmage, service level agreements, slas, enterprise business continuity, dcig, continuous data protection, cdp, host-based
    
InMage

Demystifying Compliance

Published By: Splunk Inc.     Published Date: Jun 02, 2009
Compliance is high on the IT agenda today, yet no one seems to have a clear picture of what it really involves. Inconsistent interpretation by different auditors, regulators and vendors means what worked in one year's audit could fail in the next. This whitepaper is designed to help Demystify Compliance as it relates to IT and give you some simple recipes for analyzing your own environment in the light of specific mandates.
Tags : 
compliance, splunk, it agenda, it security, regulations, proof-of-compliance, pci, hipaa
    
Splunk Inc.

VIVA Health MOVEit Case Study

Published By: Ipswitch     Published Date: Mar 14, 2014
Due to the massive volume and complexity of the information – compounded by the use of cumbersome DOS scripts – Viva Health needed to simplify and automate their file transfer processes while also remaining in compliance of various regulations. See how they accomplished both objectives with MOVEit Central.
Tags : 
ipswitch, moveit, information management, automation, file transfer, file transfer process, regulatory compliance, file transfer system
    
Ipswitch

Mobile Strategy & Best Practices for Hospitals

Published By: Phunware     Published Date: Aug 11, 2014
Many hospitals are losing revenue and receiving poor reviews due to process inefficiencies that can often result in missed or delayed appointments and patient dissatisfaction. Additionally, with the influx of newly insured health care patients resulting from the Affordable Care Act’s new regulations, it is more of a challenge than ever before to guide patients through the hospital system in an efficient manner. In this white paper, we’ll examine how hospitals can use mobile technology to enhance the patient and visitor experience and drive new revenue through increased efficiency.
Tags : 
phunware, hospital mobile strategy, hospital beacon strategy, hospital mobile technology, hospital wayfinding technology, hospital push notifications, hospital digital navigation
    
Phunware

Navigating the New Identity Ecosystem: 3 Hurdles Facing Modern IT Professionals

Published By: Gigya     Published Date: Jun 06, 2014
This guide takes an in-depth look at 3 of the main hurdles facing IT today and the solutions that can be used to better navigate this new identity ecosystem.
Tags : 
gigya, identity ecosystem, compliance, regulations, data storage, consumer data, saas, cloud computing
    
Gigya

Get Compliant and Stay Compliant with Department of Labor (DOL) “Final Rule” Fiduciary Regulations

Published By: DocuSign     Published Date: Apr 24, 2018
"In April 2016, the Department of Labor (DOL) released its final rule regarding financial and fiduciary disclosures. Many firms are in the early stages of assessing the rule’s impact, sorting through legal interpretations, and preparing for regulatory compliance. To understand who’s affected, what’s changed, and the impact to your business, read the white paper to learn how DocuSign can help you digitize your document agreements and: • Satisfy compliance requirements by enabling you to automate disclosures with a tamper-proof audit trail. • Delight your customers by providing a greatly improved user experience compared to paper-based document transactions. • Meet critical deadlines with rapid implementation using DocuSign’s SaaS-based solution."
Tags : 
    
DocuSign

Best Practices for Transactional Emails

Published By: BlueHornet     Published Date: Jun 06, 2008
Applying opt-in email marketing strategies and best practices to transactional emails can be a win-win for customers and marketers. But the two types of communications are not the same. This white paper is written to help email marketers and online retailers understand: What sets transactional emails apart from commercial messages; how they must comply with all federal regulations; and where to take advantage of opportunities to optimize their transactional email program.
Tags : 
email marketing, email messaging, blue hornet, bluehornet
    
BlueHornet

Brainshark for Financial Services: Customer Success Stories

Published By: Brainshark     Published Date: Oct 16, 2013
Banking, insurance, securities and investment firms are challenged to keep employees, broker dealers, investors and others current in a world of constant change. Enabling video and mobile communications is the most efficient way to clearly communicate and stay ahead of competitors and changing regulations. Discover how 8 out of the top 10 US financial institutions use Brainshark communications to increase compliance, decrease risks, and lower the costs of communications.
Tags : 
finance, financial services, banking, investment, insurance, broker, credit union, banks
    
Brainshark

Top 15 Accounting Software Vendors Revealed

Published By: Business Software     Published Date: Apr 04, 2013
As today’s global marketplace becomes more sophisticated, the number and complexity of mission-critical financial transactions that companies conduct on a day-to-day basis continues to grow exponentially. Even small and mid-sized businesses are plagued by a rapidly increasing volume of financial processes that are highly intricate and multi-faceted. These activities, while important, are administrative in nature and often distract staff from more strategic planning initiatives that directly impact company prosperity and growth. Additionally, as legislative pressures continue to grow, and the rules imposed by Sarbanes Oxley, BASEL II, and other regulations become more stringent, businesses need to find better ways to ensure compliance by effectively logging, tracking, auditing, and reporting their financial data.
Tags : 
various types of business transactions, cost effectiveness, business-software.com, revealed
    
Business Software

2013 Electronic Communications Compliance Survey for Financial Services

Published By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod
    
Smarsh

Ten Steps to Better Requirements Management

Published By: IBM     Published Date: Oct 10, 2014
Requirements definition and management is recognized as a necessary step for the successful delivery of systems and software projects; the discipline is also required by standards, regulations and quality improvement initiatives like Capability Maturity Model Integration (CMMI).
Tags : 
ibm, requirements management, cmmi, successful delivery, distinctively identified, specific solutions, defined requirement, managing requirements
    
IBM

Choosing a Cloud Provider with Confidence

Published By: GeoTrust     Published Date: Aug 09, 2013
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : 
web security, web threats, ssl, secure sockets layer, technology, solution, security, web service security
    
GeoTrust

Choosing a Cloud Provider with Confidence

Published By: GeoTrust     Published Date: Oct 06, 2014
Cloud computing is rapidly transforming the IT landscape and the conversation around adopting cloud technology has progressed from “if” to “when”. Although cloud services offer enormous economic benefits, they also pose significant potential risks for enterprises that must safeguard corporate information assets while also complying with industry and government regulations. Download this paper to better understand where and when to use cloud solutions and the ways in which SSL can help you conduct business in the cloud with confidence.
Tags : 
cloud provider, cloud computing, economic benefits, safeguard information assets, ssl, confidence
    
GeoTrust

Learn What Every Business Must Know About Tangible Property Regulations and How to Ensure Compliance

Published By: CBIZ     Published Date: Nov 22, 2013
What every business must know about the new tangible property regulations – the most dramatic changes in tax law since the overhaul of the Internal Revenue Code. Learn about the complex rules and the related tasks so that you can ensure compliance.
Tags : 
tangible property regulations, tax deduction opportunities, de minimis safe harbor, write-off opportunities, deductible repairs, capitalization write-off, depreciation, form 3115
    
CBIZ

How to Comply with New TCPA Proof of Consent Rules

Published By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : 
tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules
    
ActiveProspect, Inc.

How to Comply with New Telemarketing Proof of Consent Rules

Published By: ActiveProspect, Inc.     Published Date: Sep 19, 2013
In this whitepaper, provided by the law firm of Klein Moynihan Turco LLP (KMT) and ActiveProspect, a marketing SaaS provider, offers a comprehensive overview of the legal aspects of the new TCPA regulations and simple solution to verify and store proof of consent for Internet leads in order to comply with the new regulations.
Tags : 
tcpa, tcpa regulations, tcpa compliance, tcpa class action, telemarketing, telemarketing compliance, telemarketing regulations, telemarketing rules
    
ActiveProspect, Inc.

Speeding SOX Audits with Automated Data Protection Tools

Published By: Bocada     Published Date: Aug 21, 2009
This white paper focuses on Sarbanes-Oxley Act (SOX) regulations relevant to data protection, and describes both best practices and automated tools used by today's leading storage managers and backup/recovery teams to meet the mandates of SOX.
Tags : 
sarbanes oxley act, sarbanes oxley, sarbox, sox, sox compliance, compliance, financial, finance
    
Bocada

The Banking Data Warehouse and the Sarbanes-Oxley Act

Published By: IBM     Published Date: Dec 12, 2006
This white paper outlines the components of the Banking Data Warehouse (BDW) and how they assist financial institutions in addressing the data modeling and data consolidation issues relating to the SOX regulations.
Tags : 
data warehousing, database warehousing, data consolidation, sarbanes oxley compliance, sox, compliance, banking, bdw
    
IBM

The Value of Enterprise SSO to HIPAA Compliance

Published By: Imprivata     Published Date: Aug 21, 2009
When the U.S. Congress passed the Health Insurance Portability and Accountability Act (HIPAA) of 1996, among the law's many provisions was the establishment of formal regulations designed to protect the confidentiality and security of patient information. In addition to mandating new policies and procedures, the HIPAA security regulations require mechanisms for controlling access to patient data on healthcare providers' information technology (IT) systems.
Tags : 
password management, enterprise single sign on, enterprise single sign-on, single sign on, single sign-on, esso, sso, hipaa
    
Imprivata

Efficient and Effective Integrated SSO Solution

Published By: Imprivata     Published Date: Nov 27, 2007
Increased pressure for cost-efficient administration, productive work environments and an array of strict government regulations are driving increased demand for integrated user Provisioning/SSO solutions that are affordable, easy to maintain and secure.
Tags : 
sso, single sign on, user management, authentication, identity management, imprivata, ppi, security
    
Imprivata

Environmental Compliance in Electronics

Published By: PTC     Published Date: Aug 21, 2009
Download this report on how to implement a successful environmental compliance strategy for the long term. Learn about new strategies for complying with upcoming environmental regulations, as well as the compliance shortcomings common to many companies in a new research report by AberdeenGroup.
Tags : 
compliance, environmentalism, epa, manufacturing, responsibility, consumer electronics, ptc, green computing
    
PTC

Achieving Configuration Compliance in a Regulatory Framework

Published By: Secure Computing     Published Date: Nov 30, 1999
Regardless of whether your company is subject to HIPAA, Sarbanes-Oxley, Gramm-Leach-Bliley, any number of state regulations, or none at all, configuration compliance has a place in most if not all business and government organizations. Find out in this paper how you can achieve automated configuration compliance with the SafeWord SecureWire IAM appliance from Secure Computing.
Tags : 
network architecture, network management, sarbanes oxley compliance, compliance, sox compliance, hipaa compliance, configuration management, government agency
    
Secure Computing

Content security for the next decade

Published By: Quocirca     Published Date: Dec 02, 2008
The need to share information has never been greater as cross-organizational business processes become deeper and more complex. The movement of digital information, both within a business and across its increasingly porous boundaries to external individuals and organizations, carries more and more risk as regulations are tightened around data protection and personal privacy.
Tags : 
quocirca, content security, aep networks, clearswift, symantec, trend micro, websense, smtp
    
Quocirca

Change Control: Learn How to Address the Insider Threat

Published By: NetIQ Corporation     Published Date: Apr 05, 2007
Learn why organizations need to limit IT administrator power to ensure operational integrity and assure compliance and how to implement robust change control processes and tools with this white paper.
Tags : 
insider threat, network security, it administrator, comply with regulations, it infrastructure, compliance, change management, it management
    
NetIQ Corporation

Meeting Regulatory Log Requirements

Published By: NetIQ Corporation     Published Date: Sep 04, 2007
Discover how NetIQ Security Manager can help your organization comply with the log collection and analysis requirements within recent regulations and standards.
Tags : 
security management, monitoring, compliance, log management, logging, event management, hipaa, hipaa compliance
    
NetIQ Corporation
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.