X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 securities litigation


Not Just Words: Enforce Your E-mail and Web Acceptable Usage Policies
Unmanaged employee use of e-mail and the Web can subject your organization to costly risks including litigation, regulatory investigations, and public

securities litigation  for violations of federal securities laws. From securities fraud, to jumping the gun, selective disclosure, and forward- looking statements, public companies must ensure that employees do not use email to disclose proprietary insider information, transmit untrue content, or otherwise violate securities laws.2 Best Practice: For public companies and regulated firms, it is particularly important that email and web usage is managed in accordance with the company's written acceptable usage policies and

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

Documents related to » securities litigation

Can You Trust Entrust?


An information security company whose middle name is 'Trust' is accused of misrepresentation of revenue projections.

securities litigation   Read More

i2 Bleeds In Shark-Infested Waters


What a difference a year makes. Two months after the Nike debacle, more than a dozen class action lawsuits for securities fraud are now pending in federal and state courts. Will the SCM vendor find a safe harbor, sink to the bottom, or tread water through 2001?

securities litigation   Read More

Managing Risk through Financial Processes: Embedding Governance, Risk, and Compliance


Initiatives to automate and streamline financial processes often focus more on reducing costs than adding value. Adding the kind of value you should have in your financial processes stands at the heart of a broader initiative known as governance, risk, and compliance (GRC). Learn why embedding the components of GRC within your financial processes can help you track financial flows and alert you when things might go awry.

securities litigation   Read More

Business Objects Objects Again


In a repeat of the Brio lawsuit of 1999, Business Objects has now sued Cognos over a U.S. patent that Business Objects holds for a query technology. Cognos says the suit is “invalid and unenforceable”, but it cost Brio $10 million.

securities litigation   Read More

Mastering E-discovery: The IT Manager’s Guide to Preservation, Protection, and Production


Formally defining, effectively retaining, and successfully archiving e-mail and other electronic business records is one of the most important tasks facing many organizations today. Learn how to quickly and cost-effectively preserve, protect, and produce legally compliant e-mail and other electronically stored information (ESI) in anticipation of litigation and regulatory audits, with an e-discovery compliance program.

securities litigation   Read More

ACCPAC -- Being Much More Than Meets The Eye Part Two: Announcements Continued


ACCPAC continues to expand its products footprint and operations worldwide.

securities litigation   Read More

Depository Trust and Clearing Corporation (DTCC) Case Study


The Depository Trust & Clearing Corporation (DTCC) is the world’s largest financial services post-trade infrastructure organization, having cleared and settled more than $1.4 quadrillion (USD) worth of securities in 2005. In the highly competitive financial services industry, the secure processing of transactions is vital to DTCC's success, which is why DTCC integrated security testing into the application development processes.

securities litigation   Read More

E*Trade Ignores Private Security Warning, But Public Hullaballoo Gets Response


E*Trade was notified about a cookie vulnerability in August, but the correction wasn't made until after the problem became public.

securities litigation   Read More

Making Gramm-Leach-Bliley Security Compliance Fast and Easy


Designed to improve consumer financial services, the Gramm-Leach-Bliley Act (GLBA) includes security provisions for protecting confidential electronic financial information. For the approximately 9,500 financial institutions affected, compliance can be complex and process-intensive. Learn about network security auditing and vulnerability management solutions that can make GLBA compliance faster and more cost-effective.

securities litigation   Read More

Are ERP Workarounds a Terrific Way of Shooting Yourself in the Foot?


Are ERP workarounds a terrific way of shooting yourself in the foot? TEC Analyst Gabriel Gheorghiu says “There’s no way to avoid ERP workarounds. And yes, they’re a problem.” TEC Analyst Jorge García says “No they’re not.” Managing Editor David Clark attempts to moderate (just a wee bit too late).

securities litigation   Read More