work rules

Results 1 - 25 of 26Sort Results By: Published Date | Title | Company Name
By: Sage People     Published Date: Jan 04, 2019
The General Data Protection Regulation (GDPR) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union. EU regulations have direct effect in all EU member states, meaning the GDPR replaces the current Data Protection Directive and applies to all EU member states. The GDPR’s focus is the protection of personal data. In fact, GDPR is one of the biggest shakeups ever seen affecting how data relating to an individual should be handled—and it affects not just companies but any individual, corporation, public authority, agency or other body that processes the personal data of individuals based in the EU. As gatekeepers and processors of personal data, HR and People teams have a crucial role to play in preparing for this step change. The rules on how data is kept and used will become much more stringent, and it’s vital that HR and People teams become more transparent, communicating to employees exactly how their data is processed. In a world wh
Tags : 
     Sage People
By: Sage EMEA     Published Date: Dec 19, 2018
The General Data Protection Regulation (GDPR) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union. EU regulations have direct effect in all EU member states, meaning the GDPR replaces the current Data Protection Directive and applies to all EU member states. The GDPR’s focus is the protection of personal data. In fact, GDPR is one of the biggest shakeups ever seen affecting how data relating to an individual should be handled—and it affects not just companies but any individual, corporation, public authority, agency or other body that processes the personal data of individuals based in the EU. As gatekeepers and processors of personal data, HR and People teams have a crucial role to play in preparing for this step change. The rules on how data is kept and used will become much more stringent, and it’s vital that HR and People teams become more transparent, communicating to employees exactly how their data is processed. In a world where 2,
Tags : 
     Sage EMEA
By: Oracle     Published Date: Aug 08, 2013
The era of social networking clearly has arrived, creating significant implications for enterprises. Today, there are compelling rewards for embracing social networks—and potentially severe penalties for putting it off any longer. This white paper outlines four key ground rules for engaging with social networks in order to maximize their potential for improving customer service.
Tags : social, customer experience, oralce, social networking, customer service, data management
     Oracle
By: Oracle     Published Date: Aug 15, 2013
The era of social networking clearly has arrived, creating significant implications for enterprises. Today, there are compelling rewards for embracing social networks—and potentially severe penalties for putting it off any longer. This white paper outlines four key ground rules for engaging with social networks in order to maximize their potential for improving customer service.
Tags : social, customer experience, oralce, social networking, customer service, enterprise applications
     Oracle
By: Workforce Software     Published Date: Feb 02, 2015
Leave administration is one of the most challenging aspects of workforce management and an area that continues to become more complicated as leave regulations—and lawsuits—increase. For employers, having to understand and comply with complex federal regulations, such as the Family and Medical Leave Act (FMLA), in addition to myriad local laws, union rules and company policies can be overwhelming. The task of complying with these many regulations often consumes a great deal of time for HR teams, especially those operating across multiple geographies.
Tags : workforce software, software, automate, outsource, fmla, act, cloud, management, employee leave, strategy
     Workforce Software
By: Lookout     Published Date: Dec 09, 2016
Many federal agencies claim they don't have a BYOD program. This survey of federal employees, however, says something different. Get data on personal device usage at work, who's breaking the rules, and more.
Tags : 
     Lookout
By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : security, advance threat detection, nav
     Trend Micro
By: KPMG     Published Date: Jul 11, 2018
The business is increasingly side-stepping the IT function to procure new technologies. Do you have the right governance in place to encourage innovation and ensure investment is directed for maximum impact? Read this report to find out: • how to balance the opportunities and risks from emerging technology • how to ensure funding for innovation is available and prioritised • where to direct funds for innovation • why ‘guardrails’ work better than rules in the current environment. Download the report now
Tags : 
     KPMG
By: STARLIMS     Published Date: Jun 09, 2014
The laboratory is a strategic asset for your organization. Laboratory data comprises the majority of medical records and is critical for accurate diagnoses. Physicians depend on reliable laboratory result data to deliver optimal care. Efficiency is critical for laboratory success; it enables your lab to ensure patient safety, reduce operating costs and increase revenue. STARLIMS offers clinical laboratories a powerful solution suite, which includes configurable tools to manage complex testing workflows, enforce rules-based actions, promptly format and deliver laboratory results to clinicians by their preferred method, track and route bar-coded specimens within the lab and across the network for more efficiency, as well as distribute and manage bio specimen inventories.
Tags : nfusion, starlims, laboratory, laboratory system, data, strategic, physicians, healthcare
     STARLIMS
By: XpertHR     Published Date: Nov 13, 2018
As 2018 comes to a close, it is critical to ensure that your organization—and more specifically, your employee handbook—is compliant with the latest legal developments on the federal, state and local levels. Whether it’s a new state law or an amendment to an existing local law, as an employer, you must determine whether a new or amended law affects your handbook and workplace policies and what revisions are necessary. For example, does a new statewide lactation accommodation law prompt the addition of a new policy to the employee handbook? Here are some of the top issues you should be aware of for 2019 when updating your handbook: 1. Equal Employment Opportunity (EEO) 2. Leaves of Absence and Time Off 3. Equal Pay and Wage Discrimination And more… {Get the guide}
Tags : handbooks, employee handbooks, compliance, policies, work rules, 2019 trends, eeo, leave management, paid sick, reasonable accommodations, equal pay, wage discrimination, time-off, pto, e-cigarettes, safe driving laws, workplace violence
     XpertHR
By: XpertHR     Published Date: Nov 13, 2018
One of the most common workplace documents is an employee handbook. If you choose to have one, it is critical to follow through in implementing and enforcing it. The National Labor Relations Board (NLRB) has increasingly taken more of an activist role in the scrutiny of employee handbook. It’s important that employers take note of the NLRB’s position on certain work rules that may affect an employee’s right to engage in protected activity, as well as an employer’s role in managing its workforce. When updating your handbook it's important to keep in mind that what is not included is almost as important as what is included. Use this whitepaper to refresh yourself on seven essential dos and don'ts of employee handbooks such as: • Topics to include in your handbook • Common risks to avoid • Provisions to consider • Best practice around updating and amending policies Plus, get tips on how to approach your handbook as a multistate employer. {Download now}
Tags : handbooks, employee handbooks, compliance, policies, work rules
     XpertHR
By: Skillsoft     Published Date: Jul 23, 2014
This ExecBlueprint provides practical advice for developing such a code that will go beyond “window dressing” and inspire leaders and employees alike to build and sustain a compliant and ethical culture. While acting ethically is important for its own sake, the authors also provide pragmatic reasoning for fostering such a culture: ethical organizations earn the trust — and loyalty — of employees, customers, and investors. Accordingly, the code should be simple to understand, widely circulated, and aggressively enforced. But most importantly: adherence starts at the top.
Tags : skillsoft, ethical workplace, compliance, code of conduct, industry standards, rules, employee behavior, corporate behavior, enterprise applications
     Skillsoft
By: ForeScout     Published Date: Aug 14, 2012
Information security has undergone a sea change in the past 10 years. Compliance mandates in the form of industry standards and Federal rules like NERC, FFIEC, HIPAA/HITECH and PCI-DSS are the new norm. To stay in compliance, IT teams need to be able to keep up with updatesand changes to existing mandates while also being prepared for new ones. To maximize efficiency, manage risk and reduce potential violations due to compliance failure, organizations need to implement security tools whose features support multiple specifications within and across different compliance frameworks.
Tags : forescout, counteract, compliance, independent, assesment, network, access, control, maps, leading, compliance, mandates, and helps, automate, grc, operations, federal, rules, nerc, ffiec
     ForeScout
By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations, target validation logic, delegate privilege management, access phone support, access email support, digital certificate verification, windows, activex, data management
     Dell Software
By: IBM     Published Date: Dec 07, 2010
To support increasing demands, healthcare organizations need to improve their agility between processes and people through improved information sharing
Tags : ibm, advanced case management, healthcare, content management, social networking, collaboration, analytics, policies, rules
     IBM
By: Sage     Published Date: Oct 14, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : sage, compliance, workforce, fines, reporting, mandates
     Sage
By: IBM ILOG.     Published Date: Jul 14, 2009
How-to vidoes explain the inner workings of JRules and BRMS, from writing rules to invoking decision services.  Become an instant expert!
Tags : ibm, jrules, brms, video, rules, decision making, services, systems, control, data, customer, customer service, enterprise applications, data management
     IBM ILOG.
By: Tripwire     Published Date: Jun 30, 2009
Find out whether your health company's network systems are well enough to pass an internal security checkup, or are running the risk of a much more invasive examination by federal regulators and plaintiff's lawyers.
Tags : tripwire, hipaa, security, provision, network, health, company, system, internal, security, risk, examination, federal, regulation, lawyer, data, control, administration, compliance, healthcare
     Tripwire
By: Dell     Published Date: Aug 16, 2013
"Virtualization has changed the data center dynamic from static to fluid. While workloads used to be confined to the hardware on which they were installed, workloads today flow from host to host based on administrator-defined rules, as well as in reaction to changes in the host environment. The fluidic nature of the new data center has brought challenges to resource allocation; find out how your organization can stay ahead of the curve. Read the White Paper"
Tags : best practices, cpu, memory, storage, vsphere, virtual
     Dell
By: Group M_IBM Q1'18     Published Date: Jan 16, 2018
An IBM Security webinar featuring Gartner analyst Anton Chuvakin Gone are the days of a clearly defined network perimeter, in which you can confidently rely on static rules to detect intruders. As the cyber threat landscape has evolved, so has the vendor landscape. With all the options available, do you know which threat detection solutions to invest in – much less which ones will still exist in five years? Listen to this IBM Security webinar featuring Gartner analyst Anton Chuvakin to learn: Similarities and differences between SIEM and UEBA solutions Predictions on the future of these two markets How QRadar’s single-platform approach to SIEM and UEBA can help you not only detect more threats, but also more accurately determine if a threat is real versus benign
Tags : webinar, threat detection, ueba, siem, ibm security, qradar, single-platform approach
     Group M_IBM Q1'18
By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor, power distribution network, vrm, voltage regulator module, signal, smas, analog models, backward crosstalk, capacitive crosstalk, controlling crosstalk, correct emc problems, correct emi problems, cross talk
     Mentor Graphics
By: AlienVault     Published Date: Oct 21, 2014
As cyber attacks grow more sophisticated, many organizations are investing more into incident detection and response capabilities. Event monitoring and correlation technologies and security operations are often tied to incident handling responsibilities, but the number of attack variations is staggering, and many organizations are struggling to develop incident detection and response processes that work for different situations. In this webcast, we'll outline the most common types of events and indicators of compromise (IOCs) that naturally feed intelligent correlation rules, and walk through a number of different incident types based on these. We'll also outline the differences in response strategies that make the most sense depending on what types of incidents may be occurring. By building a smarter incident response playbook, you'll be better equipped to detect and respond more effectively in a number of scenarios.
Tags : vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
     AlienVault
By: Seamless     Published Date: Jun 18, 2013
Michael Farino is the Hospitality Manager for the New York office of DLA Piper (DLA), one of the world’s largest business law firms.Michael and his team oversee the firm’s meal program and all caterin gand special events. With 500 employees in the office and dozens of client meetings and special events each month, this is no small task. DLA worked with Seamless to create a set of rules that would govern when and how employees could order food. Each and every one of DLA’s 500 NYC-based employees was given a username and password. Everyone was free to log-in and order their own meals. Everyone was also assigned to a specific budget group. These budget groups are based each person’s role at the Firm and can accommodate different spending limits and permission levels. As Michael notes, “right away, Seamless gave us the power to enforce our rules,but still be flexible so people get what they need. It’s a win-win.”
Tags : 
     Seamless
By: Sage     Published Date: Jul 30, 2014
Managing employer compliance can be a tedious task, but it’s a highly visible, important way that the human resources department minimizes risk for the business and keeps the workforce running smoothly. Use this guide to stay informed about employment laws, reporting rules, and developing workforce compliance issues that may impact your organization. We’ll help you navigate ten crucial mandates, explaining the obligations and compliance considerations you need to be aware of in order to take on your responsibilities.
Tags : sage, compliance, workforce, fines, reporting, mandates
     Sage
By: Workforce Software     Published Date: Nov 23, 2015
Access this white paper to learn how WorkForce Software’s EmpCenter suite meets the needs of global employers by automating organizational policies in alignment with national and local labor laws, as well as internal policies and union rules. You’ll learn: The challenges associated with overlapping and ambiguous labor regulations WorkForce Software’s approach to meeting the needs of global companies How WorkForce Software applies regulatory updates to the EmpCenter suite Which compliance regulations are covered in EmpCenter’s preconfigured solutions
Tags : labor compliance, multinational organizations, global employers, automation, labor laws, union rules, compliance, labor regulations
     Workforce Software
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com