compliance

Results 276 - 300 of 1993Sort Results By: Published Date | Title | Company Name

Network Faxing and the Health Insurance Portability and Accountability Act (HIPAA)

Published By: Castelle     Published Date: Nov 01, 2006
Easily implemented and integrated with electronic medical record systems, network fax servers can play a valuable role in supporting HIPAA objectives, offering a standardized, enterprise-wide faxing solution, and helping to maintain a high standard of security, efficiency and organization.
Tags : 
hipaa compliance, ip faxing, ip networks, records management, information management, data protection, privacy, security policies, fax server, server hardware, castelle, networking, it management, enterprise applications, ip telephony, servers, compliance, best practices, business management, call center management
    
Castelle

2013 Health Care Reform Checklist

Published By: CBIZ     Published Date: Aug 27, 2013
Are you prepared for health care reform? This 3-page checklist guides you through the general compliance requirements of the Affordable Care Act (ACA) to help you prepare now for 2014 and beyond. The checklist is broken down into five categories: 1. Health Plan Action Items; 2. Employer Tax Changes; 3. Fees and Filings; 4. Shared Responsibility Employer Preparation; and 5. ACA Provisions beyond 2014.
Tags : 
health care reform, health reform checklist, affordable care act, aca, shared responsibility, grandfathered, waiting period, summary of benefits and coverage, filing for erisa, preexisting conditions, annual limits, advance notice, mlr rebate, exchange, medicare witholding, pcori, transitional reinsurance fee, fsa plan documents, benefit plan review, public marketplace
    
CBIZ

Learn What Every Business Must Know About Tangible Property Regulations and How to Ensure Compliance

Published By: CBIZ     Published Date: Nov 22, 2013
What every business must know about the new tangible property regulations – the most dramatic changes in tax law since the overhaul of the Internal Revenue Code. Learn about the complex rules and the related tasks so that you can ensure compliance.
Tags : 
tangible property regulations, tax deduction opportunities, de minimis safe harbor, write-off opportunities, deductible repairs, capitalization write-off, depreciation, form 3115, tpr
    
CBIZ

How EMM Helps with GDPR Compliance

Published By: CBRE     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
    
CBRE

Essential Guide to ERP for Process Manufacturers

Published By: CDC Software     Published Date: Mar 02, 2011
A Practical Guide to Successfully Addressing Your Industry-Specific Requirements.
Tags : 
cdc software, erp application, process manufacturers, process manufacturing, compliance, enterprise resource planning, enterprise software, manufacturing execution systems
    
CDC Software

Essential Guide to ERP for Process Manufacturers

Published By: CDC Software     Published Date: Mar 03, 2011
A Practical Guide to Successfully Addressing Your Industry-Specific Requirements.
Tags : 
cdc software, erp application, process manufacturers, process manufacturing, compliance
    
CDC Software

Partner Review Guide - Data Center Infrastructure Management

Published By: CDW     Published Date: Nov 12, 2012
Data center priorities have been consistent for some time: Improve efficiency, increase uptime and meet compliance regulations are IT mantras.
Tags : 
data centers, infrastructure, it infrastructure, data center convergence, business technology, power and cooling
    
CDW

PCI DSS Compliance: A Baseline for Security Best Practices

Published By: CDW     Published Date: Nov 13, 2012
The standard can help organizations improve handling of personally identifiable information.
Tags : 
cdw, pci, dss, compliance, cybersecurity attack, hacker attacks, verizon, pos, point of sales, business technology
    
CDW

CDW- Enterprise Encryption

Published By: CDW     Published Date: Jun 10, 2013
It’s critical to understand how a defense-in-depth strategy can protect the most precious information asset: data.
Tags : 
cdw, enterprise encryption, defense-in-depth, sensitive data, security posture, encryption of information, compliance, security posture, security
    
CDW

CDW Partner Review: Software License Management

Published By: CDW     Published Date: Jul 18, 2013
Understanding The Complications of Software License Management
Tags : 
cdw. software, software management, software audits, it organizations, license compliance, security, software development
    
CDW

Best Practices for Migrating to a New Server Operating System

Published By: CDW     Published Date: Dec 29, 2014
Learn the best practices for migrating to a new server operating system and see how the switch may be challenging, but will allow your organization to vastly improve IT operations to support new technologies such as cloud computing.
Tags : 
server, data center, transformation, scalability, performance, operating system, microsoft, cloud computing, software, security risks, compliance issues, security, it management
    
CDW

How to Reap the Benefits of an Operating System Migration

Published By: CDW     Published Date: Dec 29, 2014
Learn how to reap the benefits of an operating system migration and see how you can transition to a modern data center to accommodate the latest technologies in order to increase the efficiency and productivity of your IT team.
Tags : 
server, data center, transformation, scalability, performance, operating system, microsoft, cloud computing, software, security risks, compliance issues, security, it management
    
CDW

Why the Time is Now For Data Center Transformation

Published By: CDW     Published Date: Dec 29, 2014
Learn why the time is now for data center transformation due to the end of Microsoft support to Windows Server 2003 and see what your organization must do to upgrade performance, scalability, availability, manageability, and security.
Tags : 
server, data center, transformation, scalability, performance, operating system, microsoft, cloud computing, software, security risks, compliance issues, security, it management
    
CDW

Surviving a Software Audit: A How To Guide

Published By: CDW     Published Date: Feb 24, 2015
Software piracy, whether accidental or malicious, is a problem for software vendors as these activities can directly affect the bottom line. Organizations that use software are affected as well. Along with rising software prices, they can face stiff fines and other costs for noncompliance with software licenses. This can come as a result of an audit that software vendors are more inclined to initiate in a lackluster economy. This white paper will discuss actions to take before, during and after an audit. As well as outline the best ways for the enterprise to remain compliant with software licenses.
Tags : 
software piracy, software vendors, audit, software licenses, software compliance, piracy misconceptions, auditing, compliance, security policies, best practices, business management, business process management, business technology
    
CDW

Software Compliance Myths

Published By: CDW     Published Date: Feb 24, 2015
Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.
Tags : 
software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization, network security, business intelligence, data protection, database security, cloud computing
    
CDW

Snow Secures Man-Sized Cost Savings For FTSE 250 Investment Specialist

Published By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, man investments, asset, softcat, it management
    
CDW

SAM in an Imperfect World: How to Address The Real-World Challenges of Managing Software Assets

Published By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management, remote access
    
CDW

Protect Your Digital Enterprise

Published By: CDW     Published Date: Apr 04, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications, application performance management, business management, information management, secure content management
    
CDW

Protect Your Digital Enterprise

Published By: CDW-HPE Servers     Published Date: Apr 07, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications, it management, knowledge management, data management
    
CDW-HPE Servers

Cloud and Data Center Security: Secure Virtual, Cloud, Physical, and Hybrid Environments Easily

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
As you take advantage of the operational and economic benefits of virtualization and the cloud, it’s critical to secure your virtualized data centers, cloud deployments, and hybrid environments effectively. Because if you neglect any aspect of security, you leave gaps that open the door to web threats and serious data breaches. And, to meet data privacy and compliance regulations, you will need to demonstrate that you have the appropriate security, regardless of your computing environment. Trend Micro Cloud and Data Center Security solutions protect applications and data and prevent business disruptions, while helping to ensure regulatory compliance. Whether you are focused on securing physical or virtual environments, cloud instances, or web applications, Trend Micro provides the advanced server security you need for virtual, cloud, and physical servers via the Trend Micro Deep Security platform. Download this white paper to learn more about the Trend Micro Deep Security platform.
Tags : 
cloud, date security, cloud security, virtualization, security, networking, it management
    
CDW-Trend Micro

PCI DSS 3.0 Compliance: How Trend Micro Cloud and Data Center Security Solutions Can Help

Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Merchants and service providers that process credit card payments must comply with the Payment Card Industry Data Security Standard (PCI DSS), now at Version 3.0. Whether the transaction occurs in a store or online, and regardless of the environment, from physical Point of Sale devices, to virtualized servers, or web servers in a public cloud, PCI DSS 3.0 mandates that these organizations are responsible for the security of their customers’ cardholder data. Read this white paper to learn more about the Payment Card Industry Data Security Standard 3.0.
Tags : 
security, software development, it management
    
CDW-Trend Micro

Cloud Security through Trend Micro Deep Security

Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : 
networking, security, it management
    
CDW-Trend Micro

CEB Risk Intelligence Quarterly: Q4 2013

Published By: CEB     Published Date: Nov 08, 2013
How is your company managing risk? Download the whitepaper to learn how cross-functional groups can work together to uncover broader enterprise-wide risks that might go unforeseen.
Tags : 
risk, compliance, audit, risk management, cyber security, fraud
    
CEB

5 Steps to Managing Third Party Corruption Risk

Published By: CEB     Published Date: Dec 09, 2013
This guide is designed to break down the complex challenge of mitigating third-party corruption risk into manageable components. Based on hundreds of member conversations and extensive research, we believe that successful companies conduct third party due diligence in five key phases.
Tags : 
corruption risk, managing risk, compliance, risk, anticorruption, third-party corruption
    
CEB

Building a Risk-Based Compliance Training Curriculum: A Step-by-Step Guide

Published By: CEB     Published Date: May 19, 2014
Establishing compliance training requirements has always been difficult, but given recent changes to the regulatory and corporate work environments, the costs of failure are now more significant. To help companies get their training curricula right, CEB created a step-by-step guide to building a truly effective compliance training curriculum: one that reduces risk.
Tags : 
ceb, risk based compliance, training, reduce risk, regulatory changes, corporate work environments
    
CEB
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.