Labor Law Reports

Computer Weekly - 1 June 2021: The technology that enabled Covid-19 genome sequencing success
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the scientists behind the UK's gene sequencing work during the coronavirus pandemic to find out how cloud and data analytics enabled their success. It's three years since GDPR entered into law – we assess its progress. And we examine low-code software development for a small business. Read the issue now.
Posted: 27 May 2021 | Published: 01 Jun 2021

TechTarget ComputerWeekly.com

2021 UKI Salary Survey Results
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: We take a look at our 2021 Salary Survey results from over 300 respondents who work in the UKI IT sector. We will be breaking down which job functions get paid what, what areas of IT companies will be investing in in 2021 and the current diversity landscape residing in the UK tech sector.
Posted: 15 Mar 2021 | Published: 22 Feb 2021

TechTarget ComputerWeekly.com

Symantec IM Manager
sponsored by Symantec Corporation
TRIAL SOFTWARE: Symantec IM Manager 8.2 seamlessly manages, secures, logs, and archives corporate instant-messaging traffic with certified support for public and enterprise IM networks.
Posted: 15 Jun 2006 | Premiered: 01 Mar 2007

Symantec Corporation

E-Guide: Uniting SIM and IAM to Boost Security
sponsored by TechTarget Security
EGUIDE: When logs are tied to user identities, security professionals can be more proactive and meet regulations more effectively. This cover story introduces the tools and technologies available to make this possible today and explains how to develop techniques for tracking down the inadvertent or malicious offender.
Posted: 07 Apr 2011 | Published: 07 Apr 2011

TechTarget Security

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc

Web Monitoring for Employee Productivity Enhancement
sponsored by GFI Software
WHITE PAPER: Employees both want and don't want to have their Internet use restricted. The key to success in gaining productivity and employee acceptance of the problem is the perception of fairness, clear goals and self enforcement. Web monitoring is good for business.
Posted: 03 Jun 2009 | Published: 01 Jun 2009

GFI Software

Ten Key Steps to Effective Succession Planning
sponsored by Halogen Software
WHITE PAPER: Read this whitepaper to learn 10 Key Steps to Effective Succession Planning. It also discusses best practices, replacement planning, talent pools, and the aging workforce.
Posted: 21 Aug 2008 | Published: 20 Aug 2008

Halogen Software

How can HR protect employee data privacy during COVID-19?
sponsored by Kronos
EGUIDE: Collecting COVID-19 workforce health information is riddled with potential missteps. That's why HR needs to revisit compliance and data collection basics. Get expert tips on protecting employee data during COVID-19 in this expert guide.
Posted: 03 Aug 2020 | Published: 03 Aug 2020

Kronos

Eliminate Performance Anxiety Manage Employee Performance Better
sponsored by Epicor Software Corporation
WHITE PAPER: How do you manage the performance of your workforce today? Access this guide to learn how to implement effective goal setting around 5 key traits, construct an efficient feedback loop, and harness the right tools to manage performance across your entire organization.
Posted: 30 Jun 2014 | Published: 31 Oct 2012

Epicor Software Corporation

The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies
sponsored by IronKey
PRESENTATION TRANSCRIPT: Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.
Posted: 26 May 2009 | Published: 26 May 2009

IronKey