rules

Results 126 - 150 of 285Sort Results By: Published Date | Title | Company Name
By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint provides practical advice for developing such a code that will go beyond “window dressing” and inspire leaders and employees alike to build and sustain a compliant and ethical culture. While acting ethically is important for its own sake, the authors also provide pragmatic reasoning for fostering such a culture: ethical organizations earn the trust — and loyalty — of employees, customers, and investors. Accordingly, the code should be simple to understand, widely circulated, and aggressively enforced. But most importantly: adherence starts at the top.
Tags : skillsoft, ethical workplace, compliance, code of conduct, industry standards, rules, employee behavior, corporate behavior
     Skillsoft
By: Skillsoft     Published Date: Oct 03, 2014
With the recent increase in enforcement of the Foreign Corrupt Practices Act (FCPA) and the tightening of anti-corruption legislation in Europe and other regions, knowledge of bribery rules and regulations has never been more critical. In the US alone, the total fines for FCPA violations levied by the Department of Justice (DOJ) and Securities and Exchange Commission (SEC) in 2013 exceeded $720 million1. Fortunately, effective training and internal communication have been identified as strategies to mitigate your compliance risk. Here are five things you need to know about anti-bribery enforcement trends.
Tags : skillsoft, foreign corrupt practices act, fcpa, department of justice, doj, securities and exchange, anti-bribery, enforcement trends
     Skillsoft
By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : forescout, counteract, compliance, independent, assesment, network, access, control
     ForeScout
By: McAfee     Published Date: Jan 28, 2013
Re-think your DLP — This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes.
Tags : dlp, business-centric dlp, dlp business rules, discovery, classification, policy management, security controls
     McAfee
By: FICO     Published Date: Aug 14, 2015
Learn how FICO helped to transorm Norwegian pension management with rules management technology.
Tags : fico, analytics, solutions, decision management, rules management.
     FICO
By: FICO     Published Date: Aug 14, 2015
Learn how FICO's Blaze Advisor system enables Aviva's vision of doubling business volume and improving customer service.
Tags : fico, analytics, solutions, decision management, rules management.
     FICO
By: FICO     Published Date: Aug 14, 2015
To create a centralized and standardized, user-friendly system that enables internal and independent insurance agents to make precise and consistent policy quotes and uniform underwriting decisions, ACG adopted FICO's Blaze Advisor decision rules management system.
Tags : fico, analytics, solutions, decision management, rules management.
     FICO
By: FICO     Published Date: Aug 14, 2015
Using predictive analytics and decision management to put customers at center stage.
Tags : fico, analytics, solutions, decision management, rules management.
     FICO
By: FICO     Published Date: Nov 10, 2015
"ACG Michigan, a large auto insurance underwriter in the US state of Michigan, needed a user-friendly system that would enable its agents (internal and independent) to churn out precise and consistent policy quotes and underwriting decisions. They turned to FICO Blaze Advisor decision rules management system to create an enterprise decision management framework to execute decisions. Learn more on how FICO Blaze Advisor helped ACG Michigan automate its underwriting About FICO FICO (NYSE: FICO), formerly known as Fair Isaac, is a leading analytics software company, helping businesses in 90+ countries make better decisions that drive higher levels of growth, profitability and customer satisfaction. The company's groundbreaking use of Big Data and mathematical algorithms to predict consumer behavior has transformed entire industries. FICO provides analytics software and tools used across multiple industries to manage risk, fight fraud, build more profitable customer relationships, optimiz
Tags : decision analytics, optimization, profitability
     FICO
By: FICO     Published Date: Nov 10, 2015
ACG Michigan, a large auto insurance underwriter in the US state of Michigan, needed a user-friendly system that would enable its agents (internal and independent) to churn out precise and consistent policy quotes and underwriting decisions. They turned to FICO Blaze Advisor decision rules management system to create an enterprise decision management framework to execute decisions.
Tags : auto, insurance, underwriting
     FICO
By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations
     Dell Software
By: SRC,LLC     Published Date: Jun 01, 2009
Today, organizations are collecting data at every level of their business and in volumes that in the past were unimaginable. Data sets are stored in different database systems or in files with distinctive formats, all reflecting business process, application, program software, or information type dependencies. Adding to this complexity is the distribution of these data sets across the enterprise in silos requiring a varied set of tools and/or specialized business rules for data transformation, classification, matching, and integration. Because of the massive amounts of data stored in a variety of representation formats, decision makers strain to derive insights and create business solutions that adequately span and integrate information from these disparate technology islands. Learn more today!
Tags : src, data transformation, classification, business value, geographic business intelligence, geo-bi, etl, extract
     SRC,LLC
By: NetIQ     Published Date: Dec 23, 2010
The paper also provides an overview of the HITECH Act, which addresses the privacy and security concerns associated with the electronic transmission of health information, in part, through several provisions that strengthen the civil and criminal enforcement of the HIPAA rules.
Tags : netiq, security, hipaa compliance, protected data
     NetIQ
By: Oracle Corporation     Published Date: May 11, 2012
Read this white paper to learn how BI can combine your explicitly-defined business rules and automatically-identified statistical information to deliver the best possible content to your customers for every single interaction.
Tags : oracle, busines intelligence, business intelligence applications, bi applications, bi apps, 11g, cross-value, decision
     Oracle Corporation
By: Hubspot     Published Date: Apr 23, 2013
It's a big job, for sure, but one your agency can handle with the right skill set. This 70+ page ebook covers all the crucial aspects of online branding, and will help your agency build out new or refine existing branding services.
Tags : inbound marketing, brand management, value proposition, buyer personas, social presence
     Hubspot
By: Canon Solutions America     Published Date: Jul 15, 2019
Student portals, mobile printing, Chromebooks…Technology has changed the way students learn and interact with your school. But it’s also made you more vulnerable to cyberthreats. This brief will bring you up to date on the new rules of data security.
Tags : 
     Canon Solutions America
By: Mimecast     Published Date: Oct 25, 2010
Download this whitepaper for 12 steps that ensure good evidential quality of email.
Tags : mimecast, email quality, civil procedures rules, email system, e-discovery
     Mimecast
By: EdgeWave     Published Date: Oct 15, 2011
This newly updated handbook is an invaluable tool for IT and HR professionals who need to establish rules for e-communications at their organizations.
Tags : e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave
     EdgeWave
By: IBM     Published Date: Dec 07, 2010
To support increasing demands, healthcare organizations need to improve their agility between processes and people through improved information sharing
Tags : ibm, advanced case management, healthcare, content management, social networking, collaboration, analytics, policies
     IBM
By: IBM     Published Date: Dec 07, 2010
Case Management and the Implications in these Energy and Utilities Industries.
Tags : ibm, advanced case management podcast, energy and utilities industries, content and process management, analytics, business rules, collaboration
     IBM
By: IBM     Published Date: Dec 07, 2010
Case Management And the Implications in the Financial Services Industry.
Tags : ibm, advanced case management podcast, financial services industry, customer service, content and process management, analytics, business rules, collaboration
     IBM
By: IBM     Published Date: Dec 07, 2010
Energy and utility companies need to manage incidents such as customer complaints or disputes to improve customer service while protecting the business should escalations occur. Advanced case management (ACM) provides enhanced service and risk management throughout the lifecycle of a case.
Tags : ibm, advanced case management podcast, acm, energy and utilities industries, customer service, risk management, business intelligence, content and process management
     IBM
By: Aveksa     Published Date: Nov 26, 2007
Although roles-based access control (RBAC) has been the subject of much interest in the past, experience with it has been mostly disappointing. The challenge of discovering established roles, defining new roles according to business need, connecting roles properly to the IT infrastructure, ensuring that they meet all compliance requirements, and managing roles through their natural lifecycles has, until now, proved to be too complicated and cumbersome to be practical.
Tags : access control, rules, compliance, governance, risk management, rbac, iam, identity management
     Aveksa
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com