RSS feed Get our RSS feed

News by Topic

fines

Results 76 - 100 of 227Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Jun 05, 2019
Innovation and technology are quite the buzzwords these days. Join IDC Chief Analyst, Philip Carter, and Oracle’s Vice President of Digital Innovation, Neil Sholay, as they discuss how technology is driving innovation in businesses. Watch Carter and Sholay discuss the role of Marketing in business innovation. Discover what it means to innovate, some examples of successful innovation, and what they are actually doing to scale that growth. It’s time to find out how Marketing is shaping business culture through innovative technology. Watch the talk now.
Tags : 
     Oracle
By: Selligent Marketing Cloud     Published Date: Mar 07, 2018
The General Data Protection Regulation – or GDPR – is a European Union (EU) law that protects the rights of individuals with respect to their data. Adopted as an EU law in April 2016, organizations that hold data about any resident of the EU must be compliant by May 2018. With attention-grabbing fines of €20 million or 4% of global annual turnover, GDPR commands attention at the highest levels. And despite the “legalese” that compliance suggests brands utilize, the brands that balance legal compliance with a human approach will turn GDPR to their advantage. This white paper provides a series of actions you can take to make the most of GDPR to both enhance your customer relationships and mitigate risk.
Tags : data driven marketing, gdpr, compliancy, data privacy, customer data, omnichannel, multichannel, automation
     Selligent Marketing Cloud
By: IBM     Published Date: Jul 08, 2015
This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive.
Tags : application integration, life cycle, software deployment, automation, itil, software integration, devops approach
     IBM
By: Mimecast     Published Date: Aug 22, 2017
Regulatory fines for violations of HIPAA in the US, DPA in the UK and GDPR can cost organizations millions of dollars. And providers can’t afford the costs of cyber security incidents which can range from prolonged downtime, not being able to care for patients, to paying a ransom to unencrypt important data. Learn the biggest threats to your organization and how to improve protection against: • Ransomware such as WannaCry and Petya • Malicious URLs that entice users to click • Bad Attachments that can infect your network • Business email compromise that siphons information or cash from your organization • Internal employees and the potential for malicious intent or careless mistakes
Tags : cyberthreat, healthcare, gdpr, ransomware
     Mimecast
By: Websense     Published Date: Apr 16, 2010
Web 2.0 technology has transformed the Web into a core business communication platform. Unfortunately, it's also become much easier to accidentally or intentionally disclose sensitive data. This white paper outlines the business need for Web data loss prevention (DLP), makes the case for DLP as an embedded capability within secure Web gateways, and defines what customers should look for in a solution.
Tags : websense, dlp, data loss prevention, securosis, security, data management, testing, secure gateways
     Websense
By: NAVEX Global     Published Date: Jul 31, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Use this document to identify when bribery and corruption activities are most likely to be occurring within your business. Next to each bribery and corruption ‘red flag’ we have provided some suggested responses and best practices an organisation can use to address these issues and minimize the risks for your business. You’ll learn: What procedures should I have in place for third party engagements? Are there particular red flags that indicate increased corruption risk? How should I respond to high-risk third-party red flags?
Tags : 
     NAVEX Global
By: SAP Inc.     Published Date: Jul 28, 2009
In this paper, Frank Dravis, Six Factors Consulting, discusses how even with the finest marketing organizations, the success of marketing ultimately comes down to the data.
Tags : single platform, data integration, data quality, quality management, soa, architecture, soa, sap businessobjects data services
     SAP Inc.
By: JobApp     Published Date: Jul 26, 2012
Experts say an automated I-9 management solution can greatly reduce the risk of fines and penalties resulting from audits. But many purchasers believe false myths about the systems, and not all systems are created equal.
Tags : jobapp, form i-9, paperless, onboarding, automated i-9 management
     JobApp
By: Websense     Published Date: Aug 23, 2012
Websense redefines the security gateway with advanced threat and data theft defenses.
Tags : security, malware analysis, websense, dlp, data loss prevention, threat defense
     Websense
By: Gameffective     Published Date: Feb 26, 2019
We all know that employee engagement is important. Employees that are aligned with their goals, aware of their performance gaps, and motivated to improve, perform better. It’s stating the obvious. The big question is how to get there, and whether technology can help us do this at scale. This is where most digital motivation initiatives hit a wall. A new breed of next generation performance and feedback systems are attempting to do just that: creating and maintaining a continuous personalized conversation between employees and managers with regards to performance, development and goals. In online marketing, personalizing messages and promotional activities has been possible for some time. It is called “Marketing Automation”. Hubspot, one of the pioneers in this field, defines it thus: “software that exists with the goal of automating marketing actions. Many marketing departments have to automate repetitive tasks such as emails, social media, and other website actions. The technology of
Tags : 
     Gameffective
By: Worldpay     Published Date: Apr 29, 2015
In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, there’s no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.
Tags : ecommerce, payments, online payments, small business, fraud, security, card payments, card data
     Worldpay
By: NaviSite     Published Date: Sep 02, 2014
This paper defines seven steps - sequentially - that have been tested and refined, to help you develop a cloud security plan.
Tags : cloud security, developing a cloud security plan, cloud security steps, managed cloud services
     NaviSite
By: Raritan Inc.     Published Date: Mar 05, 2009
This White Paper examines these considerations in greater detail and defines best practices when evaluating and deploying a Smart Card Authentication solution.
Tags : power distribution unit, raritan, pdu, power monitoring, environmental monitoring, data center power, data center monitoring, monitor power
     Raritan Inc.
By: Aldon     Published Date: Jan 13, 2009
Learn what this regulation expects of IT and how to avoid the risk of expensive fines.
Tags : aldon, sox, sarbanes-oxley act compliance, sox responsibilities, automated change management
     Aldon
By: LogMeIn     Published Date: Oct 08, 2015
This report defines the recommended technology stack for field services, as well as listing the top-installed vendors in each technology category.
Tags : field services, technology, automation for field services, crm solutions/software, customer experience/engagement
     LogMeIn
By: LogMeIn     Published Date: Oct 08, 2015
This report defines the recommended technology stack for field services, as well as listing the top-installed vendors in each technology category.
Tags : video collaboration, technology stack for field services, technology, field services, technology, on-demand, byod, real-time support
     LogMeIn
By: Skillsoft     Published Date: Oct 03, 2014
With the recent increase in enforcement of the Foreign Corrupt Practices Act (FCPA) and the tightening of anti-corruption legislation in Europe and other regions, knowledge of bribery rules and regulations has never been more critical. In the US alone, the total fines for FCPA violations levied by the Department of Justice (DOJ) and Securities and Exchange Commission (SEC) in 2013 exceeded $720 million1. Fortunately, effective training and internal communication have been identified as strategies to mitigate your compliance risk. Here are five things you need to know about anti-bribery enforcement trends.
Tags : skillsoft, foreign corrupt practices act, fcpa, department of justice, doj, securities and exchange, anti-bribery, enforcement trends
     Skillsoft
By: McAfee     Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets.
Tags : big data analytics, gartner, big data, big security data, advanced targeted attacks, advanced persistent threats, atas, context aware security intelligence
     McAfee
By: Tripp Lite     Published Date: May 17, 2016
While the use of power strips in healthcare and medical facilities is common, the misuse of these devices is also common. Such misuse can result in citations, fines, or even patient injury at your facility. This white paper covers: • Common mistakes in the use of power strips • Ways to avoid making the common mistakes • How to develop and implement a power strip policy to ensure that your facility complies with codes and standards while reducing risk to patients and staff
Tags : compliance, safety, power strip, codes, standards, citations, fines, patient injury
     Tripp Lite
By: Cisco     Published Date: May 14, 2015
Cisco's Virtualized Multi-tenant Data Center (VMDC) system defines an end-to-end architecture, which an organization may reference for the migration or build out of virtualized, multi-tenant data centers for new cloud-based service models such as Infrastructure as a Service (IaaS).
Tags : cloud computing, erp, productivity, applications, efficiency, virtualization, cisco, data center
     Cisco
By: Concur Technologies     Published Date: Oct 09, 2015
Millions in losses, millions more in fines. Yet research shows 82% of travel and entertainment fraud is committed by just 5% of employees. This eBook explains what’s at stake and how automating expense reports can uncover fraud or head it off before it happens, and help employees make the right choices.
Tags : t&e, concur, compliance, financial services, fraud
     Concur Technologies
By: MemSQL     Published Date: Nov 15, 2017
THE LAMBDA ARCHITECTURE SIMPLIFIED Your Guide to Building a Scalable Data Architecture for Real-Time Workloads YOU'LL LEARN: - What defines the Lambda Architecture, broken down by each layer - How to simplify the Lambda Architecture by consolidating the speed layer and batch layer into one system - How to implement a scalable Lambda Architecture that accommodates streaming and immutable data - How companies like Comcast and Tapjoy use Lambda Architectures in production
Tags : data, scalable, architecture, production
     MemSQL
By: Veeam '18     Published Date: Dec 04, 2018
"The new EU General Data Protection Regulation (GDPR) is the most important change in data privacy regulation in 22 years and it will have a profound impact on every organization that relies on the storage and processing of personal data of EU citizens. Starting May 25, 2018, the penalties begin for noncompliance, with GDPR fines of up to 4% of annual global revenue or 20 million euros - whichever is greater. As this new regulation also impacts Veeam®, we wanted to share our insights on our road to compliancy. In a new executive brief, GDPR: 5 Lessons Learned, Veeam Compliance Experience Shared, we walk through these lessons and share how our software played a critical role within data management and protection strategies to ensure we remain compliant while delivering Availability for the Always On Enterprise™."
Tags : 
     Veeam '18
By: Intouch Insight     Published Date: Sep 10, 2018
This whitepaper will show you what it takes to be part of the 19% that succeed at CX initiatives and teach you: • What defines a strong CX platform • The components of a successful CX program; and • What software features to look for to get a dynamic, customizable platform that meets your company’s unique needs. There is no shortage of platforms out there, but the right one has to provide critical support at every stage of a simple (but not simplistic!) process that will take your CX efforts to the next level. Once we define the requirements, it will be easy to understand how a strong CX platform can help your strategy transition from inception to analysis to action - maximizing the impact of every effort along the way. WHAT
Tags : 
     Intouch Insight
By: MuleSoft     Published Date: Jan 18, 2018
Today, government IT teams are expected to deliver more services with fewer resources. Consequently, many agencies have prioritized legacy modernization, interoperability, and shared service models as a means towards increasing IT delivery capacity. We propose that successful execution of these initiatives within the confines of a strictly managed budget requires a new approach to integration, one centered around APIs. Our recommended approach, API-led connectivity, builds on the principles of re-use first outlined by SOA, while avoiding many of the pitfalls that limited the success of heavyweight SOA implementations. In this whitepaper, you will learn: What forces drive digital transformation in federal government, and what role integration plays in supporting digital transformation How a civilian federal agency leveraged APIs to modernize legacy systems and accelerate the speed of integration How to build out an API-led architecture within a government agency to accelerate project
Tags : 
     MuleSoft
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics