X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 iapp privacy


Vox Populi: Is The Use of Polygraph Testing In Human Resources Ethical or Useful?
If you do a search on the famous phrase “You can’t handle the truth!” from the movie A Few Good Men, you will find it in a list of useless movie quotes

iapp privacy  Populi: Is The Use of Polygraph Testing In Human Resources Ethical or Useful? If you do a search on the famous phrase “ You can’t handle the truth! ” from the movie A Few Good Men , you will find it in a list of useless movie quotes . Ironically, it was also voted as the twenty-ninth greatest movie quote of all time by the American Film Institute . My point is that one should be very careful when handling the truth—especially if you’re a human resource (HR) professional. That being said, the

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

HCIMS - Laboratory Information System RFI/RFP Template

Product Functionality, System Management, Privacy and Security, and Product Technology 

Evaluate Now

Documents related to » iapp privacy

Rosslyn Analytics


Rosslyn Analytics is a software-as-a-service (SaaS) business intelligence (BI) vendor that  brings dynamic data analysis and real-time decision making to business organizations and government entities around the world. It develops and markets the award-winning RAPid data management and analytics platform. Rosslyn Analytics builds intelligent businesses by enabling its clients to prepare, manage, and serve analytics-ready data to their business users.  

iapp privacy   Read More

Security Begins on Your Desktop


The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them and that investment should be protected. Additionally, companies have both competitive and legal obligations to assure that such data is kept private and secure. Many companies and most people are unaware of the obligation and potential threats.

iapp privacy   Read More

Case Study: IT Asset Security Tool Helps Healthcare Provider Track 97% of Laptops


Learn how IT asset tracking tools helped Allina Hospitals and Clinics monitor 2,700 computers on and off their network without having to invest in additional infrastructure. This case study shows how their security system enabled this leading health care provider to go from a 30 percent tracking record to an almost perfect record for its growing inventory of laptops and electronic health records.

iapp privacy   Read More

Hold Onto Your WAPs, Here Come the Apps!


Due to the seemingly certain global standardization on the Wireless Access Protocol (WAP), Short Message Service (SMS) and the addition of Wireless Markup Language (WML) software vendors are quickly porting applications to service wireless access users.

iapp privacy   Read More

Data Masking: Strengthening Data Privacy and Security


Many business activities require access to real production data, but there are just as many that don’t. Data masking secures enterprise data by eliminating sensitive information, while maintaining data realism and integrity. Many Fortune 500 companies have already integrated data masking technology into their payment card industry (PCI) data security standard (DSS) and other compliance programs—and so can you.

iapp privacy   Read More

The New Mobile Order


IT is feeling the pressure to allow users to access sensitive corporate data via their personal mobile phones. Employees want the flexibility to use applications such as enterprise resource planning (ERP), customer relationship management (CRM), e-mail and instant messaging not only from within the workplace, but at any time from any device. Yet, with network security and customer privacy at stake, IT has been slow to bow.

iapp privacy   Read More

Google Acquires Smart, Connected Products Manufacturer Nest


Google has announced that it has entered into an agreement to buy smart device manufacturer Nest Labs for $3.2 billion (USD) in cash. Now the future of smart, connected products takes on an entirely new twist with Google strongly in the mix.

iapp privacy   Read More

Off-duty Conduct-Balancing an Employer’s Needs With an Employee’s Right to Privacy


Workplace privacy issues are increasing dramatically, along with related employee complaints and litigation. As companies struggle to control health care costs, increase productivity, and maintain company confidentiality, they become concerned with how employees spend their time away from work. Meanwhile, employees naturally have a strong desire to limit “invasion” of their personal lives. Just where do you draw the line?

iapp privacy   Read More

The Need for Vulnerability Management


New network vulnerabilities appear every day due to flaws in software, faulty configuration, and human error. Detecting, removing, and controlling vulnerabilities requires vulnerability management (VM)—the continuous use of software tools to purge exploitable risks. Find out how making VM a part of your network security strategy can help you counter sophisticated exploits and document compliance with security standards.

iapp privacy   Read More

Marketing and Intelligence, Together at Last


Net Perceptions ties its own business intelligence package along with Angara’s technology for improving conversion rates into a tidy ASP package.

iapp privacy   Read More