legal risks

Results 1 - 25 of 28Sort Results By: Published Date | Title | Company Name
Published By: Druva     Published Date: Oct 02, 2017
There is increasing urgency for organizations today to comply with regional data protection regulations or face potential financial and legal repercussions, and customer backlash. This awareness is heightened by recent headlines related to data breaches, rising risks of BYOD, and other privacy lapses that have bottom line and reputational consequences. Learn how to prepare for this new world of data privacy with actionable advice for senior IT leaders addressing data privacy concerns in their organizations. This paper covers key issues to consider when it comes to protecting corporate and employee data privacy, including: Sectorial regulations, including HIPAA and FINRA Evolving Data Protection Acts in EU countries with a strong focus on citizen privacy, data residency requirements, and concerns over data production BYOD policies blurring the lines between personal and business data Internal controls for safeguarding PII & PHI
Tags : 
data breaches, data privacy, hipaa, finra, byod, pii, phi
    
Druva
Published By: CEB     Published Date: May 19, 2014
This document helps general counsel identify potential information technology issues that may create legal or regulatory risks. General counsel should use the ten questions and our guidance on what to listen for in the CIO's response to pressure test the company's IT management and security controls.
Tags : 
ceb, cio, information risk, it management, security controls, general counsel, regulatory risks, security
    
CEB
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
But what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA for use of these networks. Adopting new technologies that allow employees to share information and exchange ideas with each other and with your customers is often the best way to achieve better business results, but doing so can involve considerable risk. That’s because the content people create using these technologies is subject to the scrutiny of regulators, legislators, and litigators. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Pharmaceuticals companies must be knowledgeable of, and abide by, specific information retention regulations in every country where they do business, including those countries that prohibit data from leaving the countries’ borders. Not having technology in place to help manage these requirements and increasing risks, or
Tags : 
collaboration, social media risk and reward, retention regulations, data, business requirements, it management, enterprise applications
    
Actiance, Inc.
Published By: Actiance, Inc.     Published Date: Jan 15, 2015
Social Media Risks and Benefits for the Pharmaceuticals Industry Drug makers are just beginning to realize how social networks can improve business processes. Social media helps your organization share information and exchange ideas with your customers quickly, but doing so can involve considerable risk. That’s because social media is subject to the scrutiny of regulators, legislators, and litigators. So, what seems like a spoon full of sugar is often a tough pill to swallow when you consider regulatory requirements from agencies like the FDA. On top of that, increasing litigation has made it a business requirement to consider solutions that help bring down skyrocketing legal costs. Not having technology in place to help manage these requirements and increasing risks, or doing so without careful planning, can be a costly mistake. Read this paper to gain an understanding of: What the regulatory landscape of the pharmaceuticals industry looks like What concerns you should be aware of f
Tags : 
social media, increased risks, business processes, regulatory requirements, it management
    
Actiance, Inc.
Published By: Webroot UK     Published Date: Feb 04, 2013
This case study describes how a technology company with globally dispersed locations addressed concerns about Web security. These included an increasing number of mobile workers, numerous malware infections on its network, and the legal and financial risks of employees accessing inappropriate material on the Internet.
Tags : 
cascade, microtech, security, maleware protection, web proxy, reduced, workload, benefits, business technology
    
Webroot UK
Published By: NAVEX Global     Published Date: Jul 31, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Use this document to identify when bribery and corruption activities are most likely to be occurring within your business. Next to each bribery and corruption ‘red flag’ we have provided some suggested responses and best practices an organisation can use to address these issues and minimize the risks for your business. You’ll learn: What procedures should I have in place for third party engagements? Are there particular red flags that indicate increased corruption risk? How should I respond to high-risk third-party red flags?
Tags : 
    
NAVEX Global
Published By: Skillsoft     Published Date: Mar 06, 2014
Compliance training is a necessity to reduce the liability and legal risks businesses face on a daily basis.
Tags : 
risk management, compliance, code of conduct, governance, risk assessment, safety, training, risk prevention, skillsoft, human resources, corporate counsel
    
Skillsoft
Published By: Symantec.cloud     Published Date: Apr 27, 2010
Our latest research uncovers the legal risks from employee use of the email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality, remote worker
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Aug 10, 2010
This white paper examines a Web security solution that gives companies the ability to monitor and enforce their Internet usage policies, bringing site monitoring and URL filtering together while insuring security with anti-virus and anti-spyware protection.
Tags : 
messagelabs us, messagelabs hosted web security, employee web use, web security, employee monitoring, internet misuse, url filtering
    
Symantec.cloud
Published By: Symantec.cloud     Published Date: Aug 10, 2010
With 75% of business intellectual property contained in email, efficiently managing this data can pose a major challenge. Learn how hosted email archiving reduces legal risks while improving employee productivity.
Tags : 
messagelabs, symantec hosted services, email archiving, employee productivity, compliance
    
Symantec.cloud
Published By: JobPad inc     Published Date: Mar 29, 2012
Try JobPad's patent pending outplacement service and reduce your outplacement costs by 90%. JobPad is a new trend in cost effective outplacement. By offering JobPad, you will be seen as a responsible Company and reduce legal risks. It costs less than 10% compared to traditional outplacement service.
Tags : 
outplacement, career transition, downsizing, layoffs, restructuring
    
JobPad inc
Published By: BitSight Technologies     Published Date: Jan 11, 2016
Is Illegal File Sharing Occurring Within Your or Your Vendors’ Cyber Ecosystem? Learn about the risks posed by peer-to-peer file sharing and why you should be monitoring this activity.
Tags : 
networking, security, it management, data management, human resource technology, it career advancement, business technology
    
BitSight Technologies
Published By: Trend Micro SaaS     Published Date: Oct 08, 2008
Businesses are experiencing a dramatic increase in spam and email-based attacks. These assaults not only hurt employee productivity, they consume valuable IT staff time and infrastructure resources. These threats can also expose organizations to data leaks, compliance issues and legal risks. Trend Micro's SaaS email security solution blocks spam, viruses, phishing, and other email threats before they touch your network, helping you reclaim IT staff time, end-user productivity, bandwidth, mail server storage and cpu capacity. Optional content filtering enforces compliance and helps prevent data leaks.
Tags : 
saas, trend, trend micro, software as a service, email threats, mail server, productivity, bandwidth, trendlabs, email security, security, interscan messaging, service level agreement, sla, virus, spam, phishing, distributed denial of service, ddos, filtering
    
Trend Micro SaaS
Published By: Intralinks     Published Date: Mar 12, 2014
The implications of data loss are significant. Organizations that ignore the law affecting collaboration and information sharing are at serious risk of litigation, fines and brand damage. The paradigm shift from organizationally-defined to user-defined information governance is making it that much more difficult to maintain control of business activity and data. This informative white paper by legal firm Field Fisher Waterhouse evaluates the legal risks of uncontrolled collaboration and information sharing and what to do about them, while providing in-depth insights into: • Landmark incidents that have influenced data protection laws • How to navigate different jurisdictional privacy frameworks • Top 4 types of legal risk to protect against • Top 5 recommendations for implementing good governance
Tags : 
data security, compliance, technology, network security, regulatory compliance, security, knowledge management, enterprise applications, data management, data center
    
Intralinks
Published By: Druva     Published Date: Aug 05, 2016
As employees use more devices and cloud apps like Box.com, Google and O365, responding to legal hold or eDiscovery requests becomes costlier and time consuming. Read how to take a proactive approach to eDiscovery data collection for data within and outside the firewall, thereby reducing the risks and costs of litigation.
Tags : 
cloud backup, enterprise, cloud computing, best practices, storage
    
Druva
Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity, security, knowledge management, enterprise applications, business technology
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, security, maturity, c suite, cybersecurity, knowledge management, enterprise applications, business technology
    
IBM
Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security
    
Absolute Software
Published By: Silk Road Technology     Published Date: Jul 30, 2014
Five years ago, many HR representatives put their hands over their ears and pretended they’d never heard the words “social media.” However, social media – which encompasses any internal or external online outlet that allows for two-way dialogue and includes websites such as blogs, Facebook, Instagram, LinkedIn, Pinterest, Twitter, Yelp, and YouTube – has only become more pervasive. In fact, according to Laura Friedel, a partner in Levenfeld Pearlstein’s Labor and Employment Practice Group, 75 percent of employees currently access social media on their mobile devices while at work and 67 percent do so more than twice a day.
Tags : 
silkroad, social media, legal risks, facebook, instagram, linkedin, pinterest, twitter, yelp, employees
    
Silk Road Technology
Published By: MessageLabs Ltd.     Published Date: Jun 10, 2010
Read our latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality, remote worker, risk management, human resources services
    
MessageLabs Ltd.
Published By: MessageLabs     Published Date: Jun 03, 2009
Planning to implement an email archiving system? There are many issues to consider – legal risks, storage concerns and data security – it can seem a complex topic!Download this guide to help you make informed decisions about your archiving requirements
Tags : 
email archiving, it manager, symantec, messagelabs, search, retrieval, communications, retention, messaging, mailbox, find emails, e-mail, data protection, archiving, archive, outlook, it management, knowledge management, data management
    
MessageLabs
Published By: Symantec.cloud     Published Date: Nov 29, 2010
Read the latest research & uncover the legal risks to your business from employee use of email & internet.
Tags : 
messagelabs symantec, email legal risk, internet security, copyright infringement, confidentiality, remote worker, risk management, human resources services
    
Symantec.cloud
Published By: Oracle     Published Date: Sep 24, 2012
This paper will outline why social recruiting is becoming an imperative for companies today and how you can get started in reaching highly qualified candidates and passive job seekers while building brand recognition and reducing sourcing costs.
Tags : 
social recruiting, social network, recruiting, human resources, legal risks, business technology
    
Oracle
Published By: Oracle     Published Date: Jan 28, 2013
Your company may see the potential for social recruiting or may be using tools today, but a social recruiting strategy needs to be part of overall company goals and objectives to deliver true return on investment (ROI).
Tags : 
social recruiting, social network, recruiting, human resources, legal risks
    
Oracle
Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security
    
Mimecast
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.