Similar Articles |
|
Entrepreneur August 2003 Nichole L. Torres |
I Spy Workplace surveillance is coming to small and midsize businesses. |
Entrepreneur January 2010 Jennifer Wang |
Hey, We Saw That Should I monitor my employees' e-mail? |
IndustryWeek November 1, 2007 Brad Kenney |
Forecasted Wireless Growth -- 2007-2011: By the Numbers Asset monitoring tops the list on forecasted wireless growth. |
PC Magazine November 1, 2006 Robert Lemos |
Watching the Watchmen Most companies monitor their employees in some way, but is corporate Big Brother going too far? |
InternetNews August 5, 2010 |
File Monitoring Key to Enterprise Security Employees are responsible for more data breaches than outside hackers and security software experts say companies must do a better job of supervising where and how employees access files. |
CIO May 1, 2003 Kathleen Carr |
Where Have All the Euros Gone? Security is a primary concern everywhere, but in Europe that concern isn't reflected in budgeting decisions. Here's how European companies are spending their security euros. |
Bank Technology News April 2007 John Adams |
Employee Monitoring: Keeping Employees from Wasting Company Time Monitoring employees' Web usage is often framed as a security issue -- avoiding lawsuits and controlling trade secrets. But it can also keep them focused on work. |
Entrepreneur January 2006 Jane Easter Bahls |
Mail Call It might seem Big Brother-like for you to monitor employee e-mail, but there may be good reasons for doing so. However, the most obvious legal concern is making sure you're not setting yourself up for an invasion-of-privacy claim. |
Insurance & Technology February 8, 2004 |
Auditing Technology from ACL Services ACL Services Ltd., a provider of audit and data analysis technology to financial executives and audit professionals, has launched the Continuous Controls Monitoring solution suite. |
Entrepreneur April 2007 Chris Penttila |
Mind Your Money If you're not verifying employee expense forms yet, you should start now. |
Inc. October 2005 John Fried |
The Rules You Make about E-mail The most important part of an e-mail system isn't the software. It's the rules you make about using it. |
Financial Advisor December 2008 David Lawrence |
Sending A Message Employee manuals set rules for financial advisory firms that can save time and money. |
IndustryWeek October 21, 2009 |
Dealing With Contract Risks Negotiating a good deal is an essential aspect of procurement, but it's easy to oversimplify negotiations as only a matter of getting the best price from a supplier. |
IndustryWeek May 18, 2011 |
Social Media: Navigating the Legal Perils A disciplined approach to Facebook, Twitter and other social media helps companies benefit from these networks while minimizing the chances of costly information leaks. |
Wall Street & Technology December 19, 2007 Cory Levine |
MyComplianceOffice Provides Proof of Compliance by Auditing Activities The compliance management solution promises to make the monitoring of compliance programs more efficient for wealth managers. |
CIO June 1, 2002 Ken Segarnick |
Courts Say It's OK: Peep Away Readers' questions about the legal consequences of electronic monitoring: What rights, if any, does an employee have in protecting his privacy in the workplace?... Can the company access my personal AOL account?... etc. |
CIO September 15, 2002 Meridith Levinson |
The Best Offense While most security dollars go to technology, CIOs in our exclusive survey say investments in staff -- and education efforts to guide them -- must back up that robust firewall. |
IndustryWeek June 1, 2002 David Drickhamer |
Factory Monitoring -- Just Do It Amanda Tucker, director of business compliance project at Nike Inc., explains that it is no longer considered acceptable just to have a code of conduct. There has to be monitoring behind it. |
Information Today June 14, 2010 |
Support for Public Access to Oil Leak Monitoring Data Almost 40 organizations led by OpenTheGovernment.org and including a number of library associations, joined in sending a letter to President Obama urging him to give the public access to all monitoring data. |
InternetNews June 29, 2004 Robyn Greenspan |
Spam: Problems Coming and Going While most Internet users deal with the annoyance of unwanted messages in their personal inboxes, corporations are also worrying about confidential data being sent via e-mail and properly managing their e-mail subscriber lists. |
Financial Advisor March 2012 David Lawrence |
Creating A Social Media Policy Financial advisors are wise to embrace the new communication medium. But, there are a number of issues to be addressed as they embark on a communications strategy. |
InternetNews March 10, 2008 |
MTV Computers Hacked, Files Stolen Files containing confidential data on about 5,000 employees at MTV Networks were illegally accessed by someone outside the company. |
Wall Street & Technology May 20, 2008 Cory Levine |
Capgemini Partners With Teradata to Create Compliance and Operations Platform The new platform will enable holistic regulatory reporting and monitoring of trade status issues. |
PC Magazine August 1, 2007 Matthew D. Sarrel |
Web Content Filtering A better solution to decreasing the company time devoted to Web usage monitoring and eliminating malware infections cause by Web sites. |
Investment Advisor September 2010 Angela Herbers |
The Fast Track: The Six Most Common Problems with Employees Owner advisors, read this column, then give it to your employees. |
CIO October 15, 2010 Karlyn & McLaughlin |
New Rules for Employees' Mobile Device Privacy How CIOs should adjust their privacy policies to conform to the Supreme Court's decision on monitoring employees' text messages. |
Bank Systems & Technology October 28, 2004 Ivan Schneider |
CSI: Financial Services Bankers can take a more proactive role in preventing crimes from occurring and discovering suspicious activity as it happens. |
Investment Advisor April 1, 2011 Angie Herbers |
Now Cultures and No Cultures There are really only two kinds of problem employees, and both can be turned into great employees |
CIO April 15, 2006 Matt Villano |
A Better Way to Search for Trouble Splunk is a system log search tool that empowers system administrators to scrutinize their network performance logs more easily. |
CIO December 1, 2006 Lauren Capotosto |
Strategic Planning: The Troops Want More CIOs could help establish the appropriate performance monitoring systems, once strategic metrics are agreed upon. |
InternetNews December 8, 2008 Richard Adhikari |
Survey Finds Data Breaches Hit Most Enterprises Despite the growing number of data breaches reported by U.S. businesses, corporate database security is still not up to scratch. Yet many admins and senior management still feel confident in their security precautions. |
Salon.com August 3, 2000 Diane Seo |
Big Brother -- or your company -- is watching you Hide those dirty pictures, scratch the solitaire: Major companies are increasingly monitoring employee Web, e-mail and phone activity. |
Entrepreneur April 2009 Chris Penttila |
Awkward! 10 potentially sticky work situations and how to manage them. |
Pharmaceutical Executive February 1, 2011 Sumit Nijhawan |
Worth a Pound of Cure In an era of information overload, continuous monitoring, solutions can prevent your pharma business from losing money and save a few lives along the way |
InternetNews April 8, 2010 |
Cloud Application Management Sees New Players Eucalyptus System teams with GroundWork Open Source to go better pursue the growing market for cloud app monitoring and management. |
Search Engine Watch April 4, 2000 |
Making Search Sticky EoExchange powers subject-specific search engines for a variety of web sites, such as American Banker and Red Herring. Now the company has announced page monitoring tools that can be integrated into those results.... |