Skip to main content
 

law

Results 101 - 125 of 354Sort Results By: Published Date | Title | Company Name
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation, is a piece of legislation that was approved and put in to place by the European Parliament in April 2016. As European Law, it will fully take effect after a 2-year transition ending May 25th 2018. GDPR, replaces the previous Data Protection Directive (DPD), adopted in 1995, and will in the UK, replace and strengthen the Data Protection Act 1998 (DPA). One of the initial differences between GDPR and DPD, is that GDPR is a regulation not a directive; as a regulation, no additional enabling legislation will have to be passed by governments of member states. Redstor have the ability to give insight into the data organisations have on their networks, advise on best practice to protect data and then implement strategies around backup, archiving and disaster recovery. Data is searchable through an intuitive console making compliance simple and achievable for all organisations protecting data through the Backup Pro Platform.
Tags : 
    
Redstor UK
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation is set to shake up modern data protection laws. With large-scale data breaches making news headlines on a weekly basis throughout 2017, data regulation authorities across Europe will be hoping this can help resolve the challenges of data protection. However, with so many questions around how to comply it is still unclear how far this regulation spreads. Technologists are now looking for answers, wanting to know how the GDPR will affect backup and nonprimary data sets and what needs to be done to be compliant. This white paper will explore and understand aspects of the regulation to help answer questions and give clarity over what data is covered by the GDPR and what organisations need to do to be compliant. Redstor have specialised in assisting organisations with data protection and management for almost two decades. Providing compliant services around the areas of Data Backup, Disaster Recovery and Archiving.
Tags : 
    
Redstor UK
Published By: Thomson Reuters     Published Date: Mar 08, 2018
In recent years, the legal marketplace has seen an influx of new start-ups and new entrants looking to challenge the long-standing service model offered by law firms to their clients. Traditionally, clients looked to their law firms to provide a full range of legal and legal-related services, i.e., to handle every aspect of a matter, even including those activities that did not involve the direct provision of legal services. Today, by contrast, consumers of legal services find themselves the beneficiaries of a new and growing number of nontraditional service providers that are changing the way legal work is getting done. These alternative providers comprise a new sector of the legal market, one that is emerging and evolving rapidly, but is still very much in its infancy.
Tags : 
legal, services, lpo, accounting, audit, revenue, thomson, reuters
    
Thomson Reuters
Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
The General Data Protection Regulation – or GDPR – is a European Union (EU) law that protects the rights of individuals with respect to their data. Adopted as an EU law in April 2016, organizations that hold data about any resident of the EU must be compliant by May 2018. With attention-grabbing fines of €20 million or 4% of global annual turnover, GDPR commands attention at the highest levels. And despite the “legalese” that compliance suggests brands utilize, the brands that balance legal compliance with a human approach will turn GDPR to their advantage. This white paper provides a series of actions you can take to make the most of GDPR to both enhance your customer relationships and mitigate risk.
Tags : 
data driven marketing, gdpr, compliancy, data privacy, customer data, omnichannel, multichannel, automation, loyalty, crm, marketing, personlisation, campaign management, customer marketing, retention marketing, marketing cloud, marketing solution, marketing platform, artificial intelligence, prediction learning
    
Selligent Marketing Cloud
Published By: Limelight Networks     Published Date: Mar 02, 2018
Your online audience expects fast, flawless, secure experiences on any device in any location, every time. But whether you are delivering videos, your website, music, software or games, ensuring engaging online experiences from an increasing variety of devices around the world is a huge challenge. Content delivery networks (CDNs) can significantly improve the user experience of your online audiences. But not all CDNs deliver the same level of service. Dos and Don’ts of Evaluating and Deploying a CDN provides tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs. Download this guide to learn: The four major performance factors that can affect user experience Why speed alone isn't an accurate measure of performance How a content audit can identify performance bottlenecks The role content storage can play in reducing costs and latency How to decide what features are most important to your business
Tags : 
content delivery network, cdn, web performance, web acceleration, digital content delivery, ddos protection, ddos, web application security, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
    
Limelight Networks
Published By: Limelight Networks     Published Date: Mar 02, 2018
Your online audience expects fast, flawless, secure experiences on any device in any location, every time. But whether you are delivering videos, your website, music, software or games, ensuring engaging online experiences from an increasing variety of devices around the world is a huge challenge. Content delivery networks (CDNs) can significantly improve the user experience of your online audiences. But not all CDNs deliver the same level of service. Dos and Don’ts of Evaluating and Deploying a CDN provides tips on how to determine what is most important to your organization and how to choose a CDN that meets your needs. Download this guide to learn: The four major performance factors that can affect user experience Why speed alone isn't an accurate measure of performance How a content audit can identify performance bottlenecks The role content storage can play in reducing costs and latency How to decide what features are most important to your business
Tags : 
content delivery network, cdn, web performance, web acceleration, digital content delivery, ddos protection, ddos, web application security, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott content delivery
    
Limelight Networks
Published By: Cornerstone OnDemand     Published Date: Feb 05, 2018
58% of executives believe their current performance management approach neither drives engagement nor leads to high performance. It’s high time to make some changes and adapt performance management strategies to better reflect the changing dynamics of the modern workforce and ensure employees reach their potential. Check out “10 Counterproductive Performance Management Assumptions You're Still Making” and see how you can improve your talent development initiatives to increase the productivity and impact of your employees. In this ebook, we'll touch on: • how goals are set and achieved • flaws and biases in manager's assessments • what truly motivates employees • and more Download your copy and get started!
Tags : 
performance management, performance, performance appraisal, employee engagement, goals, reviews, learning management system, performance management software, 360 degree feedback, workforce development, talent management, performance management software
    
Cornerstone OnDemand
Published By: Cornerstone OnDemand     Published Date: Feb 05, 2018
58% of executives believe their current performance management approach neither drives engagement nor leads to high performance. It’s high time to make some changes and adapt performance management strategies to better reflect the changing dynamics of the modern workforce and ensure employees reach their potential. Check out “10 Counterproductive Performance Management Assumptions You're Still Making” and see how you can improve your talent development initiatives to increase the productivity and impact of your employees. In this ebook, we'll touch on: • how goals are set and achieved • flaws and biases in manager's assessments • what truly motivates employees • and more Download your copy and get started!
Tags : 
performance management, performance, performance appraisal, employee engagement, goals, reviews, learning management system, performance management software, 360 degree feedback, workforce development, talent management, performance management software
    
Cornerstone OnDemand
Published By: Schneider Electric     Published Date: Jan 26, 2018
Part 2 in our Partnering with Certainty Webinar Series, "Customer Demands at the Edge." In our last webinar, we discussed how trends & technologies like IoT and its many applications have helped drive an Always On, Always Connected mentality that has completely evolved customer experience standards. These demands are driving a need for resiliency in local edge environments, meaning compute & storage capacity is now coming back on premise for many applications – especially in industries like Healthcare, Retail, Finance, and Education. In other words, this highly distributed access layer is now becoming a compute layer – one that is mission-critical to delivering a flawless (or at least acceptable) customer experience. These environments are often make-shift wiring closets (janitor’s closets, back rooms, etc.) with no dedicated IT staff per each location. More than ever before, Healthcare, Retail, Finance, and Education customers are turning to solution providers to be that “dedicated IT staff” to find and fix problems before they start, so that the customer (or patient, or student) experience they’re working to provide remains a good one. APC by Schneider Electric has: Connected Products making it easy to remotely monitor your customers’ environments Including our NEW Smart-UPS with APC SmartConnect – the industry’s first cloud-connected UPS! A Managed Service Program to help you develop & monetize power as a managed service Fill out your information and click "Register" to watch part 2 of our Partnering with Certainty Webinar Series, “Customer Demands at the Edge: Fix My Problem Before it Starts.” This webinar originally aired on October 19th, 2017.
Tags : 
    
Schneider Electric
Published By: NAVEX Global     Published Date: Dec 07, 2017
A strong ethics and compliance programme improves organisational culture, protects corporate reputation and enhances employee engagement. When an ethics and compliance programme is lacking, an organisation could be exposed to significant risk. To ensure compliance programmes meet ongoing best practices, assessments and regular reviews are necessary, valuable and expected by numerous internal and external parties, including government agencies. New laws and regulations, new lines of business, new geographies and mergers and acquisitions become part of a growing enterprise your compliance ecosystem must support. This requires those in charge of the system to regularly revisit and assess their risk and priorities to make necessary adjustments that ensure an effective compliance programme. The Definitive Guide to Compliance Programme Assessment is a comprehensive resource full of advice and best practices. It is designed to help organisations evaluate and improve their ethics and complia
Tags : 
ethics and compliance programmes, risk management, compliance ecosystem, industry standards, hotline and incident management system
    
NAVEX Global
Published By: Rosetta Stone     Published Date: Dec 07, 2017
The new federal law, Every Student Succeeds Act (ESSA), creates new opportunities to secure funding for language programming. Funding is available, but the strategies to secure the money must be carefully measured. Taking a strategic approach to this opportunity is critical. Download the whitepaper to read more about the funding sources that should play into your strategies.
Tags : 
language programs, k-12, rosetta stone, every student succeeds act (essa), federal funding strategies
    
Rosetta Stone
Published By: SecureAuth     Published Date: Nov 13, 2017
A penetration test, or pen-test, is an attempt to evaluate the security of an IT infrastructure by safely trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, services and application flaws, improper configurations or risky end-user behavior. Such assessments are also useful in validating the efficacy of defensive mechanisms, as well as, end-user adherence to security policies. This eBook provides a simple guide to explain both penetration testing's purpose and a basic guide to getting you there. Download now and start testing your network today.
Tags : 
    
SecureAuth
Published By: Fiserv     Published Date: Nov 09, 2017
Financial institutions seeking to attract new customers and revenue channels are expanding into digital services, real-time payments and global transactions. However, with every new service, criminals are developing innovative ways to infiltrate financial systems, and older technologies that mitigate fraud no longer work as effectively. So how can financial institutions respond to this growing threat? Fortunately, more advanced technologies hold great potential for real-time financial crime mitigation. Learn about five current and emerging technologies that could impact money laundering and fraud mitigation, including artificial intelligence/machine learning, blockchain, biometrics, predictive analytics (hybrid model) and APIs. Read the latest Fiserv white paper: Five Tech Trends That Can Transform How Financial Institutions Detect and Prevent Financial Crime.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
    
Fiserv
Published By: TriNet     Published Date: Nov 08, 2017
Classifying independent contractors vs. employees and exempt vs. non-exempt employees can be tricky. This white paper outlines what small business owners should know and examines general standards under state and federal law for correct classification.
Tags : 
    
TriNet
Published By: Fiserv     Published Date: Nov 08, 2017
Featuring Andy Schmidt, Principal Executive Advisor Knowing your customer is key to driving a successful strategy for client security and retention. Watch this video to get a picture of how KYC can be deployed for risk minimization, work with compliance, and make security measures more frictionless using cutting edge technology.
Tags : 
kyc, know your customer, beneficial ownership, financial crime, financial crimes, compliance, enhanced due diligence, suspicious activity report, currency transaction report, aml directive, anti-money laundering laws
    
Fiserv
Published By: IBM     Published Date: Oct 26, 2017
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so starting May 25, 2018.
Tags : 
gdpr, data protection, right to access, data breach, personal data
    
IBM
Published By: Wasabi     Published Date: Oct 26, 2017
At Wasabi, we believe that storage should be simple, inexpensive, interchangeable, reliable, fast and readily available to anyone who needs it. Just like bandwidth or electricity. Not only that it is mission critical. As data storage needs grow, both in terms of volume and leverage-ability, next generation cloud storage will become more and more of a necessity. In this White Paper Wasabi discusses that and more through their ‘5 Immutable Laws for Storing ALL Your Data in the Cloud.’ Free Trial Available: 1 TB. 30 Days. No Credit Card Required.
Tags : 
cloud storage, big data, hot storage, data protection, amazon s3
    
Wasabi
Published By: XpertHR     Published Date: Oct 23, 2017
XpertHR is a practical online service to help you comply with federal, state, and municipal law. It is designed and organized around the dayto- day tasks of HR professionals so that you can quickly unravel the complexities of HR law across multiple jurisdictions. This infographic by XpertHR explores the break down of minimum wage in the US. Download now to learn more.
Tags : 
    
XpertHR
Published By: XpertHR     Published Date: Oct 23, 2017
At the end of each calendar year employers are responsible for closing out the year’s payroll in compliance with all federal, state and local income and employment tax laws and regulations. But like a football team attempting a fourth-quarter comeback, stress levels are high at this time because of the challenges involved — a great deal of interdepartmental coordination and the completion of many detailed tasks within extremely tight deadlines.
Tags : 
    
XpertHR
Published By: Oracle     Published Date: Oct 20, 2017
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems. Many existing data protection solutions fail to meet the demands of critical databases because they treat them as generic files to copy as opposed to specialized resources. Taking a generic approach to database backup and recovery not only exposes you to the risk of data loss, it also negatively impacts performance and makes it difficult to recover within acceptable timeframes.
Tags : 
    
Oracle
Published By: CA Technologies     Published Date: Sep 13, 2017
"Companies have complied with data protection directives and regulations for more than two decades. But the General Data Protection Regulation (GDPR), an overhaul of existing European Commission data protection legislation, aims to strengthen and unify those laws for EU citizens. Primary GDPR objectives are to give citizens back control over their personal data and simplify the regulatory environment for international business. For organizations already compliant with Directive 95/46/EC, what do they need to do from a technology perspective to comply with GDPR? Read this solution brief to see how CA can help you with GDPR compliance."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
"GDPR, the General Data Protection Regulation has just been signed into law and enacts new rules and stiff penalties for any company who misuses or loses European Union (EU) citizens’ personal data. This sweeping legislation has expanded the definition of personal data and puts IT and testing departments on high alert to safeguard personal data, across development and testing environments. Test data management, the process of obtaining and distributing test data for development teams, takes on greater urgency as the GDPR deadline looms. Solid test data management practices will be key to overcoming compliance roadblocks and avoiding huge fines associated with GDPR. Utilizing new ways in which test data can be generated, distributed and managed will be pivotal role to meeting this regulation. In this webcast, Vanson Bourne and CA will present the results of their highly anticipated GDPR readiness survey of 200 corporations in North American and the UK. Join us to learn more about: •Th
Tags : 
    
CA Technologies
Published By: Symantec     Published Date: Aug 15, 2017
Stay ahead of the evolving threats. Organized crime is driving the rapid growth and sophisticated evolution of advanced threats that put entire website ecosystems at risk, and no organization is safe. The stealthy nature of these threats gives cybercriminals the time to go deeper into website environments, very often with severe consequences. The longer the time before detection and resolution, the more damage is inflicted. The risk and size of fines, lawsuits, reparation costs, damaged reputation, loss of operations, loss of sales, and loss of customers pile up higher and higher. The complexity of website security management and lack of visibility across website ecosystems is further impacted by the fact that it is nearly impossible to know how and where to allocate resources. Website security must be evolved in line with these growing threats and challenges.
Tags : 
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.