RSS feed Get our RSS feed

News by Topic

legal

Results 126 - 150 of 238Sort Results By: Published Date | Title | Company Name
By: CompareBusinessProducts.com     Published Date: Jul 11, 2013
Data drives everything in today's business world, and it would be hard to name a more important concern for today’s corporate arena than data preservation. The growing urgency of this matter, until last year a novelty to most attorneys, touched off a flurry of rulings in the area of legal holds in 2010, with several major court decisions redrawing the map in what had been virtual terra incognita.
Tags : legal, litigation, preservation, strategy, technology, e-discovery, cost effectiveness, legal hold
     CompareBusinessProducts.com
By: E-SignLive by Silanis     Published Date: Oct 02, 2013
While we tend to think about mobility largely as a consumer phenomenon, it is also changing how the workforce carries out business. With so much being done beyond traditional office walls, many insurance companies, financial service organizations and even government agencies are adopting mobile devices as productivity tools and developing enterprise apps for these devices. Electronic signature technology is pivotal to enabling mobile transactions beyond just informational apps. Not only in terms of straight-through processing (STP), but also for full compliance, legal enforceability and record retention. With most organizations’ mobile strategies still in the early stages, this article provides a starting point to help you better understand mobile e-signatures for business. It reviews the top 10 capabilities that businesses need in order to properly equip their customer-facing workforce with mobile e-signing.
Tags : ipad, mobility, apple, e-signatures, esign, marketing, enterprise, cio
     E-SignLive by Silanis
By: The Vitality Group     Published Date: Jan 28, 2014
This technical brief streamlines and simplifies the key issues in the new regulatory landscape and provides information to help inform important business decisions regarding Wellness programs. "The Legal Environment of Wellness" offers in depth information abuot wellness program requirements under the ACA, and reviews how corporate wellness programs are impacted by the rulings of the Affordable Care Act (ACA) and HIPAA. In addition to the ACA, it covers information companies need to be aware of regarding how other legislation may impact their health promotion efforts. Choosing a new wellness program or bringing current programs into compliance will require a thorough understanding of new and existing laws and sometimes complex decisions and structural redesign.
Tags : employee wellness, employee wellness program, employee health, employee benefits, corporate health program, corporate wellness program, corporate wellness incentive program, employee health and wellness program
     The Vitality Group
By: BitSight Technologies     Published Date: Jan 11, 2016
Is Illegal File Sharing Occurring Within Your or Your Vendors’ Cyber Ecosystem? Learn about the risks posed by peer-to-peer file sharing and why you should be monitoring this activity.
Tags : security
     BitSight Technologies
By: Mimecast     Published Date: Dec 20, 2018
According to Gartner, E-discovery readiness is an initiative that spans legal, IT and business stakeholder concerns and can also unify and align with archiving and data management strategies. To reduce risk and exposure, an E-discovery plan should be proactive and holistic instead of reactive and time pressured. This newsletter, “Strengthen E-Discovery Readiness to Reduce Cost and Risk” features Gartner research and offers guidance on the considerations for and E-discovery action plan, such as retention schedules, access rights, privacy concerns and security controls.
Tags : 
     Mimecast
By: Mimecast     Published Date: Dec 20, 2018
Your corporate email is a vital repository of critical business information. In the age of the cloud and mobility, empowering users accessing that information quickly and efficiently can’t be an afterthought. You may think you can get by with your old email archive, but your organization and your employees will suffer without the latest technology. Learn more in this TechTarget whitepaper Email Archiving: It’s Time for an Update. Download now to get the facts about: How archaic email archives slow down productivity and increase IT help desk burdens Why return-on-investment for old archiving solutions hurt your bottom line Ways poor e-discovery capabilities leave you vulnerable in legal challenges
Tags : 
     Mimecast
By: McAfee     Published Date: Mar 31, 2017
The Adwind Remote Administration Tool is a backdoor Trojan written in Java language that targets various platforms that support Java files. Adwind does not exploit any vulnerabilities. In most cases, for an infection to succeed, the user must run the malware by double-clicking the .jar file that is usually distributed as an attachment, or opening an infected Microsoft Word document. The infection spreads if the Java Runtime Environment is installed on the user's computer. After the malicious .jar file is executed on the target system, the malware installs silently and connects to a remote server via a preconfigured port to receive commands from a remote attacker and perform other illegal operations.
Tags : backdoor trojans, trojan protection, malware, malware protection
     McAfee
By: Trend Micro SaaS     Published Date: Feb 09, 2009
Today's confidentiality and privacy requirements drive organizations of all sizes and industries to secure sensitive data in email. Often particular types of data need to be encrypted, such as credit card numbers, intellectual property, or client information. Organizations also need to protect confidential emails for particular groups, such as executive management, human resources or legal departments. Many organizations are turning to policy-based encryption to meet their encryption needs because it automatically encrypts data using content filtering rules that identify types of content or email for particular groups. Encryption is applied when the rules are triggered. With policy-based encryption, organizations avoid relying on individual users to secure important content.
Tags : saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
     Trend Micro SaaS
By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth
     Trend Micro SaaS
By: Skillsoft     Published Date: Mar 03, 2015
The face of corporate learning has changed. It is no longer possible to develop your human capital with a single approach. Today’s corporate environment calls for out-of-the-box thinking, incorporating the advantages of many types of learning to benefit your company’s single biggest investment: your people. This handy guide will help you navigate the growing number of learning solutions and equip you with eight must-ask questions as you develop your learning program.
Tags : skillsoft, development, programs, processes, business management, elearning, corporate education, courses
     Skillsoft
By: G/O Digital     Published Date: Nov 13, 2014
It doesn't matter the legal field you specialize in – personal injury, bankruptcy, real estate, family law – you probably don’t have the time to focus on clients, the daily operations of your practice, and grow your business at the same time. To maintain a local business, you continually need to search for new business leads while still providing the best service to your clients and still find some time to sleep at night. This guide is here to help you boost your online lead generation with simple-to-execute solutions and best practices. Download this guide to help boost your online lead generation with simple-to-execute solutions and best practices.
Tags : digital marketing, online marketing, internet marketing, search marketing, seo, ppc, search engine optimization, social media
     G/O Digital
By: Cymfony     Published Date: Sep 13, 2007
The pharmaceutical industry is very interested in using social media to promote products, services and issues important to it. However, many drug firm executives are uncertain about how to tackle the legal and regulatory issues associated with social media communications.
Tags : health, healthcare, pharmaceuticals, pharmaceutical, social media, fda, compliance, cymfony
     Cymfony
By: Mimecast     Published Date: Apr 16, 2009
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. if not more. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection. In addition to these challenges, IT departments want to know how to control costs of the email environment, while keeping important data accessible for business, legal and regulatory users.
Tags : mimecast, saas, email solutions, email managemeng, archiving, ediscovery, mailbox, compliance
     Mimecast
By: Arkadin     Published Date: Sep 11, 2013
The legal industry, like almost all others, is faced with doing more with fewer resources. This whitepaper provides valuable information on how remote collaboration solutions such as audio, video, and web conferencing can help lower costs, increase productivity, and drive incremental revenue.
Tags : legal, legal solutions, legal communications, legal collaboration, legal conferencing, legal issues, compliance laws, law
     Arkadin
By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : data security, compliance, technology, network security, regulatory compliance, security
     Intralinks
By: Intralinks     Published Date: Mar 12, 2014
In the age of Edward Snowden and the NSA, there are increasing concerns about data privacy and especially where best to keep data secure. The prevalence of cloud computing and cloud-based storage and collaboration services is only exacerbating these concerns. Many organizations are confused about regulations that protect data in different countries and jurisdictions, and don’t know what steps to take to ensure their cloud collaboration vendor can provide adequate safeguards. While pushback and reform efforts are evolving, the reality is that companies must operate within the law. Deciding where to house your data and how to move it is an exercise in understanding the relevant legal regimes and the application of risk analysis in the decision making process. This white paper will examine those elements with regard to cloud-based storage and processing.
Tags : data privacy, technology, data, security, safeguards, cloud computing
     Intralinks
By: Adobe     Published Date: Apr 13, 2015
In this white paper learn how e-signatures are making workflows easier and more productive than ever before. Learn how e-signatures remove the last barrier between a hybrid paper-to-digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract—sales, employment and hiring, purchase orders, legal agreements, and more. Download this white paper to learn more.
Tags : adobe, electronic signatures, digital transactions, paper-to-digital
     Adobe
By: Adobe     Published Date: Aug 20, 2015
IT leaders need tools to protect a company's most important documents. That means sales agreements, offer letters, procurement contracts, legal documents - and everything between.
Tags : adobe, document, crm, mobile, sales, automation, cloud, storage
     Adobe
By: Adobe     Published Date: Mar 16, 2016
In this white paper learn how e-signatures are making workflows easier and more productive than ever before. Learn how e-signatures remove the last barrier between a hybrid paper-to-digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract—sales, employment and hiring, purchase orders, legal agreements, and more.
Tags : digital, digital systems, mobile, broadband, wireless, web applications
     Adobe
By: Special Counsel     Published Date: Mar 25, 2015
Law firms and corporate legal departments seek experienced legal professionals with business acumen and knowledge of technology. The supply of these professionals is struggling to meet the demand, but that could change. The latest white paper from Special Counsel explores which legal – and non-legal – skills are critical in today’s evolving legal industry.
Tags : talent shortage, skills gap, legal talent shortage, legal soft skills, legal professional development, legal employment, legal recruiting
     Special Counsel
By: Code42     Published Date: Jan 13, 2016
Read this white paper to learn how the common approaches to e-Discovery miss the mark and how endpoint backup can streamline the collection and preservation of electronically stored information.
Tags : code42, e-discovery, endpoint backup, e-discovery methods, data collection, compliance requirements, security
     Code42
By: RSA     Published Date: Sep 19, 2017
This must-read report featuring insights from respected legal and security experts outlines specific GDPR compliance challenges you probably haven’t considered.
Tags : rsa, rsa security, gdpr, data protection, compliance
     RSA
By: SAP     Published Date: Jan 28, 2008
Many CFOs and the finance organizations they lead have started to take on new strategic roles within the enterprise. Their goal is to enforce stricter control processes to ensure legal and regulatory compliance, offer strategic insights into the internal and external business environment, and connect the business strategy with daily operations through performance tracking.
Tags : apqc, spend management, cost control, cost, financial, financials, workforce, workforce management
     SAP
By: Druva     Published Date: Aug 05, 2016
As employees use more devices and cloud apps like Box.com, Google and O365, responding to legal hold or eDiscovery requests becomes costlier and time consuming. Read how to take a proactive approach to eDiscovery data collection for data within and outside the firewall, thereby reducing the risks and costs of litigation.
Tags : cloud backup, enterprise, cloud computing, best practices, storage
     Druva
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics