Skip to main content
 

compliance requirements

Results 1 - 25 of 154Sort Results By: Published Date | Title | Company Name
Published By: XpertHR     Published Date: Jun 13, 2018
A renewed focus on pay equity at the state and federal levels, coupled with the power of movements like #MeToo and #TimesUp, have companies and their HR/compliance representatives dusting taking a deep dive into pay practices to ensure equity for all. Recent lawsuits settled in favor of plaintiffs, and activist call-outs for companies to be more equitable and transparent about pay practices, add fuel to the fire: ? Seven female law professors at the University of Denver won a $2.6 million settlement in May ? Activist investor Arjuna Capital is pushing major tech firms to publish data to support equitable pay practices ? Google is facing a class action battle over equitable pay practices That’s just the tip of the iceberg. If you’re not on top of this critical issue, you could be next on the list of companies facing legal and public scrutiny. XpertHR can help you wade through the regulatory requirements and practical considerations to audit and revise, as necessary, your pay practices.
Tags : 
pay equity, equal pay, gender equality, #metoo, #timesup, pay practices, compliance, fair pay
    
XpertHR
Published By: XpertHR     Published Date: Aug 02, 2018
When it comes to managing the risk of sexual harassment claims, today’s headlines and news stories make it abundantly clear that it’s not just what you’re doing today that may create risk—but what you’ve done, or haven’t done, in the past. XpertHR’s recent Sexual Harassment Survey revealed a wide range of responses from employers hoping to tackle the issue in 2018. New and vastly varying federal and state laws challenge HR professionals to remain on top of regulatory requirements related to policies, training and other compliance issues. XpertHR’s webinar, “Coming Soon: 50 States, 50 Sexual Harassment Training Laws,” will help you ensure you’re prepared, compliant and poised to act appropriately amid a growing number of regulations and continually emerging claims. Get tips from expert attorneys who will help you get up-to-date on: ? New training requirements for private sector employers in New York and varying requirements in other states ? Why high-quality harassment training i
Tags : 
sexual harassment, compliance training, #metoo, harassment training, harassment claim, compliance, harassment, employee management
    
XpertHR
Published By: 123Together     Published Date: Feb 05, 2009
Email is the primary communication system and file transport mechanism used in organizations of all sizes. Email systems generate enormous amounts of content that must be preserved for a variety of reasons, including: -Compliance with local, state, federal and international statutory requirements - Electronic discovery requirements and best practices - Knowledge management applications - Disaster recovery and business continuity
Tags : 
123together, it strategies, ediscovery, finra, regulation, security, finra, contact management, email, economy, stability, collaboration, green it, outsourcing, microsoft exchange, hosted exchange, mobile services
    
123Together
Published By: Sourcecast     Published Date: Jan 09, 2014
On March 24, 2014, the U.S. Department of Labor’s Office of Federal Contract Compliance Programs’ (OFCCP's) final rule requiring affirmative action requirements for individuals with disabilities under Section 503 of the Rehabilitation Act of 1973 and for protected veterans under the Vietnam Era Veterans’ Readjustment Assistance Act (VEVRAA) takes effect. The long anticipated final regulations will substantially impact federal contractors and their affirmative action plans for individuals with disabilities and protected veterans.
Tags : 
disability, ofccp's, vevraa
    
Sourcecast
Published By: Kronos Incorporated     Published Date: Dec 08, 2015
The multigenerational workforce, compliance requirements, and new technologies are the top trends affecting human capital management today. This white paper explores the need for HR leaders to develop new strategies for managing the increasingly diverse workforce, and the role workforce management technology and HCM tools will play in its success.
Tags : 
    
Kronos Incorporated
Published By: Dell EMC     Published Date: Sep 12, 2016
Your business has tiers of applications and data. The protection needs of those application and data across a spectrum—starting with basic low cost daily backup, and ranging up to zero data loss with zero downtime. Along the spectrum, compliance requirements must also be met.
Tags : 
    
Dell EMC
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: MobileIron     Published Date: May 12, 2015
This white paper is intended to help CISOs understand how Lollipop and Android for Work can meet critical security and compliance requirements, even in high-security organizations. It also provides recommendations for implementing Lollipop and Android for Work as part of a BYOD program.
Tags : 
android for work, mobileiron, fragmentation, malicious app store activity, security gaps, compliance, lollipop
    
MobileIron
Published By: Canon Business Process Services     Published Date: Aug 27, 2013
Gain control of your organization’s records, proactively maintain regulatory compliance and, most importantly, protect your firm from legal risk and exposure by reading an important whitepaper on best practices for administering a successful program.
Tags : 
records management, records management compliance, records retention, records retention schedule, electronic records, electronic records management, document imaging, document imaging services, document management, document management services, business management, business imaging, business performance, document workflows, business outsourcing
    
Canon Business Process Services
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
"While free Wi-Fi is ubiquitous in airports, coffee shops, hotels, and other highly trafficked areas, this service is no longer unique to these locales. Guest Wi-Fi is now expected in nearly every industry – but how do you deliver Wi-Fi while enforcing acceptable use policies and meeting compliance regulations? Dive into the requirements for Wi-Fi security by consulting this brief resource today. Inside, find five essential recommendations to help you make Wi-Fi security your business reality – read on to get started now."
Tags : 
free wi-fi, security, acceptable use
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : 
blue coat, ssl, ssl visibility
    
Blue Coat Systems
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
data assets, risk management, it security, session management, authentication management, security intelligence, information management, infrastructure management, database platforms, account management
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
cloud security, cloud management, it protection, api integration, credential verification, security efficiency
    
CA Technologies
Published By: NetIQ     Published Date: Jun 11, 2012
This white paper examines some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program that can solve today's needs and support new requirements in the future.
Tags : 
netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
    
NetIQ
Published By: Intacct Corporation     Published Date: Jan 26, 2016
Get the white paper "Mastering the Complexity of Revenue Management" to learn: • 5 specific steps you can take to ensure better compliance, improved visibility, and lower costs. • 9 key revenue management technology requirements that decision makers can't afford to miss. • Why Vendor Specific Objective Evidence (VSOE) is worrying more and more revenue managers and what you need to do about it. • 7 benefits that optimized revenue management brings to your organization, including accelerated closing, reduced revenue leakage, and forecasting visibility.
Tags : 
    
Intacct Corporation
Published By: IBM     Published Date: Jun 16, 2015
Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.
Tags : 
it risk management, compliance requirements, it risk management strategies, it solutions, security breach, hacker vulnerability, risk management tools
    
IBM
Published By: IBM     Published Date: Jan 09, 2017
Security managers should evaluate MSSPs for enterprise scale operations, multinational and local presence, and effective threat management and compliance capabilities. Use this Magic Quadrant to evaluate MSSPs to support global service requirements, regional presence and leading-edge services.
Tags : 
ibm, security, maturity, gartner, magic quadrant, managed security services
    
IBM
Published By: Qualys     Published Date: Jul 19, 2012
Updated for PCI DSS Version 2.0 where internal scanning is now required! With the recent updates to PCI DSS, get all the facts and learn how to comply with our updated version of the book. The book is a guide to understanding how to protect cardholder data and comply with the requirements of PCI DSS. It arms you with the facts, in plain English, and shows you how to achieve PCI Compliance. Discover: . What the Payment Card Industry Data Security Standard (PCI DSS) is all about . The 12 Requirements of the PCI Standard . How to comply with PCI . 10 Best-Practices for PCI Compliance . How QualysGuard PCI simplifies PCI compliance
Tags : 
pci, technology, security, firewall, email, virus protection
    
Qualys
Published By: CA Mainframe     Published Date: Sep 12, 2008
Compliance requires strong security controls for mainframe environments also. This white paper discusses some major challenges that mainframes bring to compliance, and some key issues that need to be addressed. It also presents some key technologies and approaches that you can use to help you achieve easier compliance for your mainframe systems.
Tags : 
ca mainframe, mainframe, compliance
    
CA Mainframe
Published By: CA Technologies     Published Date: Jun 26, 2017
Privileged Access Management is an imperative to addressing PCI compliance. Yet its importance extends beyond just meeting PCI compliance requirements as it allows an organization to improve its overall security posture against today’s external and internal threats. CA Privileged Access Manager provides an effective way to implement privileged access management in support of PCI compliance and other security needs.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 26, 2017
Organizations undergoing digital transformations are dealing with amplified concerns around risk and security, which isn’t surprising. Ensuring visibility and accountability for compliance, security and governance while enabling flexibility for digital transformation requires a fresh and more tightly aligned approach to who—and now what in the form of applications, services, machines and things—are given the keys to the kingdom: privileged access. Read this white paper to understand how the digital transformation journey requires thinking through a clear roadmap that spans multiple years, anticipating near- and long-term requirements from a privileged access management solution and ensuring scope and scale needs at a reasonable cost of ownership through the entire lifecycle.
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Jun 01, 2018
Managing and protecting privileged credentials is essential to reducing risk and addressing compliance requirements. Organizations need to evaluate privileged password management solutions for the depth of controls, scope of coverage and degree of cloud alignment they provide. CA Privileged Access Manager delivers against all three of these dimensions, providing a next-generation solution for privileged credential management that drives IT risk reduction, improves operational efficiency and protects an organization’s investment by supporting traditional, virtualized and hybrid-cloud infrastructure alike.
Tags : 
    
CA Technologies
Published By: Splunk     Published Date: Aug 21, 2018
How can you utilize machine data to support compliance with the General Data Protection Regulation of the European Union? This white paper, “How Machine Data Supports GDPR Compliance”, answers this question and identifies three use cases that can help support your GDPR compliance program, regardless of the nature of your industry or deployment – on-premises, in the cloud or hybrid Download the white paper to: *Master the risks necessary to be prepared for GDPR through real-world scenarios *Understand which articles of GDPR will impact your business *Learn how machine data can help you overcome those requirements
Tags : 
    
Splunk
Published By: Group M_IBM Q1'18     Published Date: Jan 17, 2018
IBM Security Guardium tools can be the cornerstone of an enterprise’s compliance initiative for GDPR personal data protection requirements.
Tags : 
gdpr, compliance, data protection, personal data
    
Group M_IBM Q1'18
Published By: RES Software     Published Date: Jul 11, 2012
In this web seminar you'll learn how RES Software will help to find the perfect balance between your needs and those of your clinicians, administrators and regulators. Healthcare professionals will be able to access applications and data in any system, via multiple devices and from wherever they need: operations rooms, wards, clinics or even at home, without putting compliance requirements at risk.
Tags : 
res software, healthcare, technology, healthcare it, workspace manager, scripts, clinician productivity, it clinicians, health analytics, business intelligence, enterprise content management
    
RES Software
Start   Previous   1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.