compliant

Results 151 - 172 of 172Sort Results By: Published Date | Title | Company Name
Published By: ServiceNow     Published Date: Aug 20, 2018
Find out how leading healthcare providers are using a proactive approach to keep their EHR and supporting infrastructure continually running and compliant with strict regulations for health data security and privacy. Learn more about keeping critical systems operational and sensitive data secure. Download this white paper to see how eliminating outages and combatting cyberattacks can help improve patient care.
Tags : 
    
ServiceNow
Published By: Trend Micro     Published Date: May 03, 2018
With the deadline to become GDPR-compliant fast approaching, privacy and security professionals must act now. However, the task feels overwhelming. Where should I start? What should I include as part of my strategy? Is there anything that I am forgetting? This report helps privacy and security professionals answer these questions and lays out the key milestones they must achieve to hit the May 2018 GDPR deadline.
Tags : 
    
Trend Micro
Published By: DocuSign UK     Published Date: Aug 08, 2018
"The General Data Protection Regulation (GDPR) is one example of the evolving regulatory landscape in the digital age. Since the European Union (EU) adopted the regulation in 2016, DocuSign has been investing to be compliant across its entire business, building upon our foundation and history of commitment to privacy. The conception of the GDPR undoubtedly introduced a number of compliance challenges for businesses to address around data privacy and protection. It also presented an opportunity for businesses to build trust with their stakeholders by reconnecting with the people they serve. This eBook details DocuSign’s approach to meeting GDPR’s obligations that went into effect on 25th May 2018, for companies conducting business in the EU, and the features and benefits that can be gained from using the DocuSign solution to fulfil certain areas of the GDPR."
Tags : 
    
DocuSign UK
Published By: HotSchedules     Published Date: Apr 25, 2018
It’s no secret the restaurant industry is highly populated by teenagers. So what are the best tactics to engage your Gen Z employees while keeping your restaurant compliant with today’s labor laws? Research has found Gen Z to be very different than their older millennial brothers and sisters, meaning operators need to find a whole new approach to engage them. In this guide we’ll highlight the engagement and compliance challenges restaurants face with this group of workers. And then we’ll walk you through best practices we’ve seen work using mobile scheduling apps and digital communication tools.
Tags : 
    
HotSchedules
Published By: ProofSpace     Published Date: Sep 10, 2007
Read this paper and learn the principles that are prerequisites to enforceable electronic agreements as required by existing legal standards and electronic signature legislation.  This paper will also specify sixteen measurement criteria that can be used as metrics to assess whether the architecture of an electronic transaction will meet the requirements of admissibility.
Tags : 
proofspace, proofmark, signing key vulnerability, trustworthy time, authenticated time stamps, time existence of data, electronic postmark, asymmetric key cryptography, public key cryptography, time stamp, timestamp, time and data stamping, file authentication, x9.95, accredited standards committee x9, x9.95-compliant, transient key technology, electronic signatures, fda 21 cfr part 11, u.s. e-sign act
    
ProofSpace
Published By: HotSchedules     Published Date: Jan 17, 2019
It’s no secret the restaurant industry is highly populated by teenagers. So what are the best tactics to engage your generation z employees while keeping your restaurant compliant with today’s labor laws? Research has found generation z to be very different than their older millennial brothers and sisters, meaning operators need to find a whole new approach to engage them. In this guide we’ll highlight the engagement and compliance challenges restaurants face with this group of workers. And then we’ll walk you through best practices we’ve seen work using mobile scheduling apps and digital communication tools.
Tags : 
    
HotSchedules
Published By: Verint     Published Date: Oct 07, 2013
Avoiding Fines While Improving Customer Experience
Tags : 
verint, customer experience, banking, early complaint detection, complaint management, finance
    
Verint
Published By: NeoSpire Managed Hosting     Published Date: Oct 22, 2009
With the massive amount of information on an ever-evolving subject, understanding and becoming PCI compliant can be a daunting task. The process of becoming PCI compliant following the PCI SSC recommended process involves over 160 steps to a merchant's security system and can easily be misinterpreted. NeoSpire presents the Top 10 Misconceptions about PCI.
Tags : 
pci, neospire, security, compliance, paypal, data security standards, security management, pci compliance
    
NeoSpire Managed Hosting
Published By: Cisco     Published Date: Jul 08, 2016
Employees who can work securely anywhere help Cisco gain revenues, improve productivity, and deliver better customer service. Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Employees are mobile because we support everyone with technology and policies that allow them to work flexibly in terms of time, place, and device. We deliver this capability through Cisco products for secure wireless LAN (WLAN) and home and remote access (Cisco Virtual Office and VPN), as well as softphones, Cisco® WebEx®, Cisco Spark™, and extension mobility features. Our bring your own device (BYOD) policies and program allow employees to use their personal mobile devices to access the Cisco network, after the device is registered and confirmed as compliant with our security requirements for making it a secure or trusted device.
Tags : 
    
Cisco
Published By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
The General Data Protection Regulation – or GDPR – is a European Union (EU) law that protects the rights of individuals with respect to their data. Adopted as an EU law in April 2016, organizations that hold data about any resident of the EU must be compliant by May 2018. With attention-grabbing fines of €20 million or 4% of global annual turnover, GDPR commands attention at the highest levels. And despite the “legalese” that compliance suggests brands utilize, the brands that balance legal compliance with a human approach will turn GDPR to their advantage. This white paper provides a series of actions you can take to make the most of GDPR to both enhance your customer relationships and mitigate risk.
Tags : 
data driven marketing, gdpr, compliancy, data privacy, customer data, omnichannel, multichannel, automation, loyalty, crm, marketing, personlisation, campaign management, customer marketing, retention marketing, marketing cloud, marketing solution, marketing platform, artificial intelligence, prediction learning
    
Selligent Marketing Cloud
Published By: Cornerstone OnDemand     Published Date: Jun 29, 2018
As employers, government agencies face a unique set of challenges. Fierce competition to find, keep, and develop the best talent, along with an increasingly intense level of scrutiny is placing human capital front and center. Not having enough staff, not having them properly trained, or having a noncompliant workplace can trigger a public crisis.
Tags : 
management, talent, organizations, communication
    
Cornerstone OnDemand
Published By: OpenText     Published Date: Aug 19, 2014
While perhaps not the most exciting way to exchange information, faxing is one of the most widely used, secure and compliant ways. This paper explains a solution that allows your organization to take full advantage of all of the benefits of faxing, while eliminating the associated costs such as lost productivity, overhead and lost business.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, knowledge management, enterprise applications
    
OpenText
Published By: OpenText     Published Date: Aug 19, 2014
While perhaps not the most exciting way to exchange information, faxing is one of the most widely used, secure and compliant ways. This paper explains a solution that allows your organization to take full advantage of all of the benefits of faxing, while eliminating the associated costs such as lost productivity, overhead and lost business.
Tags : 
opentext, fax, document delivery, workflow improvements, automation systems, transactional paper documents, security, knowledge management, enterprise applications
    
OpenText
Published By: VMware     Published Date: Dec 15, 2016
One of the most common questions being asked by many customers recently is “How does VMware AirWatch® support Office 365?” Many ask if AirWatch can control access to Office 365 (O365) not only on their corporate desktop systems, but most importantly on their mobile devices. Fortunately, VMware AirWatch provides tremendous support to help organizations leverage O365 on their mobile devices and our recent integration with VMware® Identity Manager provides an industry-first adaptive access control framework to ensure that all work applications, including O365, can only be accessed on managed and compliant devices.
Tags : 
    
VMware
Published By: Wasabi     Published Date: Oct 26, 2017
The recent Amazon S3 outage highlights the need for high-quality secondary storage and raises questions around dependence on a single-service provider. Wasabi offers a highly compelling alternative to Amazon S3 Cross Region Replication (CRR) allowing you to keep a live copy of your S3 data on Wasabi for a 1/5th the price of CRR. Fully compliant with S3, Wasabi also provides extreme data durability, integrity and security. In this tech brief we take you through Wasabi’s proposition of extreme savings with zero degradation in quality for secondary storage.
Tags : 
amazon s3, secondary storage, business-critical data, cloud storage, hot storage
    
Wasabi
Published By: Lookout     Published Date: Dec 13, 2018
The world has changed. Yesterday everyone had a managed PC for work and all enterprise data was behind a firewall. Today, mobile devices are the control panel for our personal and professional lives. This change has contributed to the single largest technology-driven lifestyle change of the last 10 years. As productivity tools, mobile devices now access significantly more data than in years past. This has made mobile the new frontier for a wide spectrum of risk that includes cyber attacks, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. A secure digital business ecosystem demands technologies that enable organizations to continuously monitor for threats and provide enterprise-wide visibility into threat intelligence. Watch the webinar to learn more about: What makes up the full spectrum of mobile risks Lookout's Mobile Risk Matrix covering the key components of risk How to evolve beyond mobile device management
Tags : 
    
Lookout
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation is set to shake up modern data protection laws. With large-scale data breaches making news headlines on a weekly basis throughout 2017, data regulation authorities across Europe will be hoping this can help resolve the challenges of data protection. However, with so many questions around how to comply it is still unclear how far this regulation spreads. Technologists are now looking for answers, wanting to know how the GDPR will affect backup and nonprimary data sets and what needs to be done to be compliant. This white paper will explore and understand aspects of the regulation to help answer questions and give clarity over what data is covered by the GDPR and what organisations need to do to be compliant. Redstor have specialised in assisting organisations with data protection and management for almost two decades. Providing compliant services around the areas of Data Backup, Disaster Recovery and Archiving.
Tags : 
    
Redstor UK
Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017
Published By: TalentWise     Published Date: Feb 28, 2011
Learn about best practices in employment screening from the experts, TalentWise. This best practices report outlines simple steps that can go miles in improving your organization's bottom line, while lowering organizational risk and staying compliant.
Tags : 
talentwise, employee screening, hiring, background check, staffing, employment, human resource management, shrm, business issues and trends, human resources management, training and development
    
TalentWise
Published By: Justworks     Published Date: Sep 26, 2017
Staying compliant with payroll regulations and tax codes is a constant challenge for employers. A third of small businesses are fined for incorrect payroll procedures, turning minor errors into a major problem for the company’s bottom line. Don’t let routine payroll and human resources (HR) tasks trip up your small company. When you can’t afford the staffing it would take to keep up with over 15,000 tax codes, the easiest answer is to work with a professional employer organization (PEO). PEOs manage HR, payroll, and employee benefits, ensuring that you’re compliant and current on all regulations.
Tags : 
    
Justworks
Published By: Justworks     Published Date: Sep 27, 2017
Staying compliant with payroll regulations and tax codes is a constant challenge for employers. A third of small businesses are fined for incorrect payroll procedures, turning minor errors into a major problem for the company’s bottom line. Don’t let routine payroll and human resources (HR) tasks trip up your small company. When you can’t afford the staffing it would take to keep up with over 15,000 tax codes, the easiest answer is to work with a professional employer organization (PEO). PEOs manage HR, payroll, and employee benefits, ensuring that you’re compliant and current on all regulations.
Tags : 
    
Justworks
Start   Previous    1 2 3 4 5 6 7     Next   End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.