X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 legal privacy


Ten Key Legal Concerns in E-Commerce Ventures and Contracts
IT managers must understand the legal issues – at least well enough to know when there is an issue. E-commerce is so new that lawyers (and the law) are having

legal privacy  combination of practical and legal methods, including the use of trademarks. Some of those methods of protection should be addressed by contractual provisions that govern the use of the name and any related trademarks. Something to watch out for: If your web host or developer registers your domain name for you, make sure that you, rather than the host or developer, is listed as the owner on the registration. Also, clarify who will have responsibility for renewing domain name registrations so you do not

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

HCIMS - Laboratory Information System RFI/RFP Template

Product Functionality, System Management, Privacy and Security, and Product Technology 

Evaluate Now

Documents related to » legal privacy

Security Begins on Your Desktop


The documents, spreadsheets, databases and other files on the personal computers used to conduct business are corporate assets. It cost money to create them and that investment should be protected. Additionally, companies have both competitive and legal obligations to assure that such data is kept private and secure. Many companies and most people are unaware of the obligation and potential threats.

legal privacy  resources, research, finance, and legal teams. Personal computer-based firewalls to assure network security within the corporate intranet, when connected to other corporate internets, and when connected to public networks. E-mail encryption at the desktop and e-mail gateways. Virus inoculation at the desktop, servers, and e-mail gateways. Remote diagnostics for personal computers. Public data networks with and without Virtual Private Network capabilities. Business Management Response Share the Read More

Rules, Tools, Policies, and Best Practices for Compliance in the United States


A strategic compliance program can help employers in the United States (US) reduce the likelihood of litigation, regulatory investigations, security breaches, privacy violations, and other electronic disasters. Find out what it takes to make a compliance program succeed, and learn the importance of establishing clearly written rules, formal employee education, and effective hosted-services solutions right from the start.

legal privacy  Email Discovery? Top 10 Legal and Business Reasons to Retain and Archive Corporate Email Protect the Integrity of Your Email: What Type of Email Makes Good Business Records and Reliable Evidence? Regulators Grow Increasing Watchful: Regulators Take Seriously the Protection and Production of Electronic Evidence States Put Teeth in Privacy Laws: Security Breach Notification Laws Take Data Theft and Compliance with Laws and Procedures Seriously State Encryption Laws: Widespread Changes in the Use, Storage, Read More

Duty of Care Online


Useful reading for any online business, this white paper offers helpful hints for establishing comprehensive duty of care procedures. When setting up an online business, it is important to consider the legal aspects required—most importantly, an adequate privacy policy, and legally binding terms and conditions. Find out more.

legal privacy  important to consider the legal aspects required—most importantly, an adequate privacy policy, and legally binding terms and conditions. Find out more. Read More

Not Just Words: Enforce Your E-mail and Web Acceptable Usage Policies


Unmanaged employee use of e-mail and the Web can subject your organization to costly risks including litigation, regulatory investigations, and public embarrassment. Responsible organizations should deploy clearly written acceptable usage policies (AUPs) for e-mail and Web usage, supported by employee training and enforced by technology solutions. Find out how to develop and enforce e-mail and Web AUPs in your workplace.

legal privacy  Rule 6 Exercise Your Legal Right to Monitor Email & Web Rule 7: No Reasonable Expectation of Privacy Email & Web Rule 8: Lock Out Malicious Intruders Email & Web Rule 9: Annual Review of Acceptable Usage Policies Sample Email Acceptable Usage Policy Sample Web Acceptable Usage Policy About The ePolicy Institute About MessageLabs Email & Web Rule 1: Litigation and Regulations, Productivity and Security Create the Need for Strategic Email and Web Management Employee use of the company computer system can Read More

SAP Becoming a (Legal) Polygamist


SAPMarkets, the US dot-com spin-off of German ERP leader SAP AG, is partnering with Commerce One to build and sell software for online trading exchanges. This announcement comes only a month after its partnership with Nortel Networks for CRM product offering. SAP, owing to this alliance, has a chance to put content behind its extensive recent advertising campaign for mySAP.

legal privacy  Becoming a (Legal) Polygamist SAP Becoming a (Legal) Polygamist P.J. Jakovljevic - July 21, 2000 Event Summary According to the press release from June 14 at SAPPHIRE 2000 Las Vegas, the annual SAP Americas customer conference, SAP AG, the leading provider of inter-enterprise software solutions, SAPMarkets Inc., the SAP subsidiary dedicated to delivering mySAP.com marketplaces, and Commerce One Inc., the leader in global e-commerce solutions for business, announced a preliminary agreement to jointly Read More

DoubleClick Merger Good News For Privacy Advocates?


DoubleClick agreed to purchase NetCreations in a stock exchange valued at $191 million. NetCreations is the leader in ethical direct mail advertising. DoubleClick’s policies have led to protests and front-page news. How will a marriage between these two kids from different sides of the tracks work out?

legal privacy  Merger Good News For Privacy Advocates? DoubleClick Merger Good News For Privacy Advocates? D. Geller - October 13, 2000 Event Summary NetCreations, Inc. was founded in 1995 by current CEO Rosalind Resnick and CTO Ryan Scott Druckenmiller. Ms Resnick was one of the early celebrities of the Internet revolution. A business journalist who began covering the Internet from its inception as a commercial concept, she founded the NetGirl Forum on America Online, which during her tenure in 1995 and 1996 Read More

Employee Web Use and Misuse: Companies, Their Employees, and the Internet


The Internet creates new opportunities for mischief—and new challenges for managers. How do you balance individual access with the overall good of the business? What’s the right balance between monitoring and blocking? Learn about a Web security solution that can allow you to monitor and enforce your Internet usage policies, bringing site monitoring and filtering together with anti-virus and anti-spyware protection.

legal privacy  internet, they create a legal risk. Software piracy is illegal. If an organization uses illegal copies of software, it may face a civil suit and company directors risk criminal penalties. Reputation risk. Social networking can create opportunities for employees to leak confidential information or spread damaging rumors online. Bad behavior by a single employee can reflect on the reputation of the whole organization. Blocking non-business internet access In the face of all these problems, many managers Read More

Global Trade and the Role of Governance, Risk Management, and Compliance Software


The growing number of legal and regulatory requirements associated with global trading is one of many reasons enterprises are looking into global trade management applications, and into harnessing the up-and-coming, strategic software category of governance, risk management, and compliance.

legal privacy  complying with the mushrooming legal and regulatory requirements in a firefighting, knee-jerk, or disjointed manner from bottom up, enterprises are increasingly realizing that a holistic approach from top down is necessary. By harnessing the emerging, strategic software category of GRC, enterprises will be better able to deal with the myriad of compliance issues that are today's business reality. A unified GRC approach should enable commercial companies and government businesses alike to establish Read More

AccessData


AccessData’s enterprise software includes computer forensics, incident response, legal review, compliance auditing, and information assurance. The company provides training and certification.

legal privacy  computer forensics, incident response, legal review, compliance auditing, and information assurance. The company provides training and certification. Read More

Automating Document-intensive Tasks with Workflow Software


In today’s business world, heightened privacy concerns and tightened regulations such as the US Sarbanes-Oxley (SOX) Act have forced organizations to improve their workflow and archival and records management processes. That's why many results-oriented organizations are now using workflow software—bringing together people, processes, and documents to improve efficiency, reduce costs, and meet compliance requirements.

legal privacy  Document-intensive Tasks with Workflow Software In today’s business world, heightened privacy concerns and tightened regulations such as the US Sarbanes-Oxley (SOX) Act have forced organizations to improve their workflow and archival and records management processes. That's why many results-oriented organizations are now using workflow software—bringing together people, processes, and documents to improve efficiency, reduce costs, and meet compliance requirements. Read More

The Roaring Penguin Training Network


A recent paper presented evidence that Bayesian filtering could be effective using a shared Bayes database, even among hundreds or thousands of different users. This lead to the Roaring Penguin Training Network (RPTN), a mechanism for sharing Bayes votes among different CanIt customers. This white paper describes the Roaring Penguin Training Network (RPTN).

legal privacy  Roaring Penguin Training Network Roaring Penguin's CanIt® software solutions will stop spam before it reaches your mail server. CanIt products provide per user Bayesian analysis including access to the RPTN Bayesian training database. Source: Roaring Penguin Software Resources Related to The Roaring Penguin Training Network : Bayesian Spam Filtering (Wikipedia) Email Filtering (Wikipedia) The Roaring Penguin Training Network Bayesian E-mail Filtering is also known as : Bayesian Approach to Filtering Read More

Micropayments Rise Again


eCharge, whose previous initiative was a service that would allow consumers to charge purchases to their phone bill, will announce a new charging and billing system that is completely Internet based.

legal privacy  Rise Again Event Summary eCharge, whose previous initiative was a service that would allow consumers to charge purchases to their phone bill, will announce a new charging and billing system that is completely Internet based. The eCharge system will allow consumers to sign up, get real-time approval and buy immediately. Other features allow the creation of sub-accounts with spending limits for individual family members. A consumer can use eCharge on any website that had signed up with the Read More

The Emerging Threat of Legal Liability for Failure to Prevent Spyware Attacks


Corporations striving to comply with data security laws and regulatory initiatives must implement anti-spyware measures. Businesses who fail to take reasonable physical, administrative, and technical measures to prevent the unauthorized acquisition, alteration, or destruction of valuable information, risk costly and disruptive legal proceedings. And courts and responsible agencies will freely second-guess such decisions in the event of a data breach.

legal privacy  Emerging Threat of Legal Liability for Failure to Prevent Spyware Attacks Corporations striving to comply with data security laws and regulatory initiatives must implement anti-spyware measures. Businesses who fail to take reasonable physical, administrative, and technical measures to prevent the unauthorized acquisition, alteration, or destruction of valuable information, risk costly and disruptive legal proceedings. And courts and responsible agencies will freely second-guess such decisions in the Read More

Data Privacy: Protecting the Core of your Business


Many companies are struggling to comply with a patchwork of regulations related to sensitive corporate information. As a result, companies are looking for new database security and auditing solutions to help prevent unauthorized access to confidential information—and to satisfy internal and external auditors—without the performance loss and insider security risk of traditional database management system (DBMS) logging approaches.

legal privacy   Read More