HIT Consultant Insightful coverage of healthcare innovation
 

policy

Results 126 - 150 of 480Sort Results By: Published Date | Title | Company Name
Published By: Imprivata     Published Date: Dec 06, 2013
The vital information CIOs need to ensure that their text messaging is both secure and in compliance with the current regulations.
Tags : 
secure messaging, hipaa compliant text messaging, hipaa password policy, hipaa security rule, healthcare communications
    
Imprivata
Published By: NetApp     Published Date: Mar 06, 2018
This Gartner Report on an effective hyperconvergence strategy includes their research findings and recommendations. It also includes a deep dive analysis of key determinants in a hyperconverged solution decision. For more information, please view our privacy policy here.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Mimecast     Published Date: Feb 13, 2017
Security and risk (S&R) pros have the challenging task of using finite resources (including budget, time, and people) to protect their businesses from every possible attack type. On top of this, S&R pros don’t just need to watch out for threats coming from outside their walls, but must keep an eye on internal threats as well. S&R decision-makers face threats from three groups of insiders – compromised accounts (internal accounts that have been compromised by external attacks), careless misuse (internal policy violators and those who accidentally leak or expose data or systems), and malicious insiders (insiders who purposefully take or misuse data or exploit systems), and they must be prepared for each. In February 2017, Mimecast commissioned Forrester Consulting to evaluate the state of enterprise security readiness for internal email threats.
Tags : 
email security, internal threats, mimecast, forrester
    
Mimecast
Published By: VMware     Published Date: May 10, 2017
VMware® Workspace™ ONE™ is VMware’s digital workspace solution, designed to give access to any application from any type of device under automated and granular policy control. VMware was one of the first adopters of Workspace ONE, deploying across its full user population in early-to mid 2016. Download this white paper to discover the objectives that drove VMware’s decisions of how and when to deploy, plus an overview of the business results achieved so far.
Tags : 
    
VMware
Published By: Jamf     Published Date: Nov 05, 2018
Hobson & Company (H&C), a leading research firm focused on total cost of ownership (TCO) and return on investment (ROI) studies, conducted independent research and found that a proven Apple device management solution delivers a quick and compelling ROI to both large and small enterprises. • Simplifying IT management o 90% reduction in time spent managing apps o 80% reduction in time spent provisioning • Improving end-user experience o 60% reduction in end-user productivity loss o 15% reduction in volume of help desk tickets • Mitigating risk o 90% reduction in time spent creating inventory reports o 65% reduction in time spent managing policy and setting changes
Tags : 
    
Jamf
Published By: XpertHR     Published Date: Oct 23, 2017
Employers should take note that a significant number of legal changes on the federal, state and local level have or will have a substantial impact on workplace policies and employee handbooks. It is critical for an employer to review, amend and properly update its handbook for 2018 so that it reflects the latest legal requirements. An employer also needs to understand what the legal update is and how it affects the workplace, as well as develop and implement policies, practices and procedures to remain compliant. Further, an employer may need to update its employee handbook based on internal changes (e.g., benefits, performance management). Below are relevant XpertHR resources, including Employee Handbook policy statements, to assist an employer in updating its own handbook.
Tags : 
    
XpertHR
Published By: XpertHR     Published Date: Nov 13, 2018
As 2018 comes to a close, it is critical to ensure that your organization—and more specifically, your employee handbook—is compliant with the latest legal developments on the federal, state and local levels. Whether it’s a new state law or an amendment to an existing local law, as an employer, you must determine whether a new or amended law affects your handbook and workplace policies and what revisions are necessary. For example, does a new statewide lactation accommodation law prompt the addition of a new policy to the employee handbook? Here are some of the top issues you should be aware of for 2019 when updating your handbook: 1. Equal Employment Opportunity (EEO) 2. Leaves of Absence and Time Off 3. Equal Pay and Wage Discrimination And more… {Get the guide}
Tags : 
handbooks, employee handbooks, compliance, policies, work rules, 2019 trends, eeo, leave management
    
XpertHR
Published By: ePharma     Published Date: Jan 08, 2018
As new technological advancements emerge, the pharmaceutical industry must adapt to changes in the market space. What will the future of health and care look like, particularly in the United States, as it pertains to innovation, commercialism and policy?
Tags : 
    
ePharma
Published By: K 12 Insight     Published Date: Apr 13, 2018
After Parkland, Safety is on everyone’s mind. While physical safety measures, such as metal detectors and door locks can help, school leaders also have to think about emotional safety. Do students feel safe in your schools? Download this guide, and learn three ways to give students and parents a voice in the school safety discussion.
Tags : 
school safety, k-12, bullying, school leaders, safety policy, threats, communication
    
K 12 Insight
Published By: AppZen     Published Date: Jun 17, 2019
Setting clear expectations and guidelines around travel and entertainment expenses (T&E) is crucial to establishing a healthy company culture. Employees want to feel at ease laying out money for the company, feeling confident they will get reimbursed quickly. Crafting a comprehensive T&E policy and making sure it’s available to all employees is an important first step, but a policy alone isn’t enough — a culture of anxiety and mistrust can emerge from even the most carefully constructed policies.
Tags : 
    
AppZen
Published By: Absolute Software     Published Date: Dec 20, 2012
Three Simple Steps to Legally Secure and Manage Employee-owned Devices Within a Corporate Environment
Tags : 
byod, policy, guide, mobile, security, cloud, apps, administration
    
Absolute Software
Published By: Absolute Software     Published Date: Dec 20, 2012
Aberdeen's analysis confirms that the case for convergence between endpoint management is still very strong in the mobile, Bring Your Own Device era.
Tags : 
byod, device, security, enterprise, mobility, policy
    
Absolute Software
Published By: Brainloop     Published Date: Nov 09, 2011
Business users are a key part of a company\'s security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company\'s confidential documents--provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training--yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.
Tags : 
brainloop, technology, security, user compliance, indentity management
    
Brainloop
Published By: Brainloop     Published Date: Nov 09, 2011
This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help identify compliance risks in your company. The 10 scenarios illustrate smart, cost-effective strategies for SOX, PII, HIPPA and security policy issues.
Tags : 
brainloop, security, compliance risks, sharing information, security management, data protection
    
Brainloop
Published By: Eloqua     Published Date: Jan 13, 2012
Email deliverability is about maximizing the potential number of emails reaching the inbox. Privacy is about safeguarding the personal information contained in your mailing database. Download this guide to learn about privacy and deliverability.
Tags : 
email deliverability, email privacy, privacy and deliverability, email marketing, marketing automation, email marketing platform, digital body language, database marketing
    
Eloqua
Published By: NAVEX Global     Published Date: Apr 20, 2018
Learn how to effectively and efficiently manage your organisation's employee handbook, code of conduct and other important documents. This guide gives organisations of all sizes insight on how to optimize policy and procedure management with real-world examples, helpful tips, and research. What you’ll learn: - Best Practices on How to Plan, Implement, and Measure your programme - Eleven Commandments of Policy Formatting and Writing - 20 Questions for Prioritising Policy Development Efforts - Pros & Cons of Various Distribution Methods - Assessment Questions to Evaluate Your Current Document Management Strategy - Build versus Buy Considerations
Tags : 
    
NAVEX Global
Published By: NAVEX Global     Published Date: Jul 31, 2018
Compare your policy and procedure management programme to industry standards and identify where your programme needs improvements. Read the top challenges policy management programmes face in 2018 and expert recommendations on meeting those challenges. What You'll Learn: Where organisations are struggling with policy management What the best organisations do to create efficiency in their programme How organisations are starting to comply with new SFO and DOJ guidance How automated systems improve results and satisfaction for policy management
Tags : 
    
NAVEX Global
Published By: LifeSize, a division of Logitech     Published Date: Feb 01, 2013
Do you work smarter on your own tablet, smartphone or laptop? Go for it, says corporate IT. Read this white paper to learn how BYOD is an emerging trend in business policy. In a recent survey 44% of firms have embraced BYOD. Will you do the same?
Tags : 
byod, bring your own device, simplicity, tablet, smartphone, laptop, byod party, lifesize
    
LifeSize, a division of Logitech
Published By: M86 Security     Published Date: Nov 02, 2010
This white paper explains some of the key concepts of data loss prevention (DLP), including the problems organizations encounter in implementing an effective DLP policy and how to alleviate them.
Tags : 
m86 security, data loss prevention, email, web gateway best practices, dlp policy
    
M86 Security
Published By: M86 Security     Published Date: Dec 01, 2010
This paper is intended for IT decision makers, HR managers and executives responsible for adopting and enforcing email and Web Acceptable Use Policies (AUPs) within an organization.
Tags : 
m86 security, social media policy, web acceptable use policies, aups, email and web security
    
M86 Security
Published By: CDW-Apple     Published Date: Dec 10, 2012
In a 2011 IDC study, IT decision-makers report that, on average, 34 percent of their employees access business applications from smartphones.
Tags : 
mobile, cdw, mobile integration, byod, it policy, business mobile integration, mobile it
    
CDW-Apple
Published By: CDW-Apple     Published Date: Dec 12, 2012
The ultimate reference guide to taking your business mobile.
Tags : 
mobile, mobile integration, byod, it policy, business mobile integration, mobile it
    
CDW-Apple
Published By: Enterprise Mobile     Published Date: Sep 30, 2013
Creating a BYOD policy helps to minimize frustration and risk as you take advantage of cost savings. With a BYOD policy in place, you’ll be able to confidently move forward with your own BYOD program, staying at the forefront of mobility trends and fostering improved productivity and user satisfaction. Using a short template can help you identify the key elements that your policy should include. The more policy elements you’re able to cover in the template and the more elements you add on your own, the easier it will be to create the final, formal BYOD policy.
Tags : 
mobility-as-a service, managed mobility services, byod, bring-your-own-device, enterprise mobile, mobility, enterprise mobility, mobile strategy
    
Enterprise Mobile
Published By: Aruba Networks     Published Date: Nov 15, 2013
With more Internet-connected mobile devices than people in the world in 2013, IT must provide seamless connectivity to every class of user — employees, contractors, guests and even customers — appropriate to their role and type of device. Mobility in the workplace isn’t just for user benefit and productivity. The migration to mobility begets several IT benefits.
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Le lieu de travail nouvelle génération repose sur la mobilité. À l’heure où le nombre d’appareils mobiles connectés à Internet dépasse la population mondiale, il est essentiel que les services informatiques soient en mesure d’offrir à chaque catégorie d’utilisateurs (employés, entrepreneurs, invités et clients) une connectivité fluide et adaptée à leurs besoins et types d’équipement. Outre les atouts évidents pour les utilisateurs et l’effet bénéfique sur la productivité, la migration vers la mobilité est source de nombreux avantages pour les services informatiques. Téléchargez ce livre blanc pour les découvrir…
Tags : 
just media, aruba networks, workplace benefits, wire-like wireless, context-aware security, user experience, automate adds, reduce network costs
    
Aruba Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.