Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

hr documents

Results 1 - 21 of 21Sort Results By: Published Date | Title | Company Name
Published By: ASG Software Solutions     Published Date: Feb 24, 2010
A recent survey of CIOs found that over 75% want to develop an overall information strategy in the next three years, yet over 85% are not close to implementing an enterprise-wide content management strategy. Meanwhile, data runs rampant, slows systems, and impacts performance. Hard-copy documents multiply, become damaged, or simply disappear.
Tags : 
asg, cmdb, bsm, itil, bsm, metacmdb, archiving, sap
    
ASG Software Solutions
Published By: MobileIron     Published Date: Feb 17, 2015
The personal cloud is the most persistent data loss threat to the enterprise today because many employees use their own cloud services to store work documents. Traditionally, content security solutions functionally link security and storage which requires the migration of work documents to a new content storage repository in order to enforce security policies. This increases complexity by creating more repositories for the enterprise to manage. Most importantly, this approach does not solve the personal cloud problem because individual users continue to store their work documents, for convenience, in cloud services that IT cannot secure.
Tags : 
cloud, mobileiron, mobile, security
    
MobileIron
Published By: Document Cloud for Enterprise     Published Date: Apr 23, 2015
With Adobe Document Cloud, HR teams can become more efficient in hiring, onboarding and documentation.
Tags : 
maximize hr efficiency, adobe document cloud, hr staff, hr documents, send information to candidates, electronic documents, esign, hr personnel
    
Document Cloud for Enterprise
Published By: Fiserv     Published Date: Nov 07, 2017
"In today’s ever-evolving lending landscape where loan quality and risk management challenge profitability and the customer experience, technology may be the key to thriving – both now and in the future. Winning financial services institutions will be the ones that transform their business models to place loan quality and risk management at the center of their operations. To facilitate continuous life-of-loan management, inclusive of the requisite data transparency and audit trails that support loan quality and loss mitigation, these institutions will implement and automate a loan completion process. Such a process will manage data quality and access to loan data and documents throughout origination, servicing and sale on the secondary market."
Tags : 
mortgage data quality, loan quality, loan data quality, mortgage quality, loan compliance, lending compliance, mortgage compliance, trid
    
Fiserv
Published By: Dassault Systèmes     Published Date: Jun 19, 2018
This paper introduces a brief explanation of digital continuity and the opportunities and threats that it faces. The movement of product information to the digital domain in the 21st century has meant that we do not have physical items, like pieces of paper, which we can authenticate as being reliable information for decision making. Digital continuity is meant to remedy shortcomings of the digital environment by ensuring that information is unique, authoritative, current, and consistent, or more simply, has the characteristic of singularity. This paper includes: • Digital continuity within the Product Lifecycle • Digital continuity within manufacturing • Threats to digital continuity If we implement digital continuity correctly, we have all the advantages of the singularity of paper documents, but with the instantaneous and simultaneous ability to access the latest, updated information. Offered Free by: Dassault Systemes
Tags : 
    
Dassault Systèmes
Published By: IBM     Published Date: Feb 16, 2017
Watch this video to learn how IBM Datacap and Box enable better customer centricity through the capture of data across mobile devices, scanners, email, fax and files. This solution works with Box to store documents in the cloud.
Tags : 
ibm, ecm, analytics, ibm datacap, ibm box, enterprise applications
    
IBM
Published By: Rand Secure Archive     Published Date: Jun 06, 2013
Without a doubt, technology has revolutionized the way business is done. The vast majority of internal and external communication is now done through email, instant messaging, VOIP and other types of electronic communication. In addition, most business documents exist in digital form. The digitization of business has had significant implications for litigation. Legal eDiscovery is now an essential part of settling cases between organizations. Previously, many companies believed that eDiscovery was only for organizations that were public or highly regulated, but now most companies recognize that electronically stored information (ESI) regulations are applicable to all organizations and there is an ever-increasing need for cost-effective eDiscovery.
Tags : 
coding, ediscovery, legal, effective, organization, networking, security, it management
    
Rand Secure Archive
Published By: PC Mall     Published Date: Mar 03, 2012
Canon's digital imaging products allowed Shoreline Records Management to chart a course to help increase productivity and reduce costs to promote business growth. Find out what Canon can do for your business in this case study!
Tags : 
canon, productivity, mobile, remote, shoreline, records, sanners, cnaon
    
PC Mall
Published By: Veeam '18     Published Date: Mar 13, 2018
Windows Server 2016 has been generally available since October 2016. This eBook has been updated to provide the latest and greatest additions within Window Server 2016 as it applies to virtualization; Hyper-V. This is the main topic we will be discussing in this eBook, Windows Server 2016 Virtualization — also known as Hyper-V 2016. Components within Hyper-V are updated or additional functionality is added with each release of Windows Server. Knowing this is important to understanding the increased functionality as well as the overall usability of Windows Server through documents such as this. Many of the new features and functionalities do require some basic usage of PowerShell. Throughout this eBook you will find sample PowerShell scripts documented as examples allowing IT professionals to leverage Hyper-V PowerShell within their own environments.
Tags : 
microsoft, windows, server, technology, organization, optimization
    
Veeam '18
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, your accountancy firm’s data and your clients’ information could easily be exposed to hackers. Download this white paper to learn more about PDF password protection failures that: • Expose data when people share passwords with others, especially through email. • Prevent your firm from knowing when files are read by unauthorized individuals. • Allow hackers to easily to gain access to confidential financial documents within minutes.
Tags : 
business documents, file sharing, file security, file backup, file sync, file delivery, data protection, data security
    
Citrix ShareFile
Published By: Canon Solutions America     Published Date: Feb 28, 2019
Security threats can be next to invisible, but this infographic shows exactly where your healthcare organization can be most at risk. It also gives you valuable tips for helping secure your patient data, financial documents, and medical records.
Tags : 
phi security, healthcare data privacy, data protection in healthcare, ehr solutions, ehr security, electronic health records management, hipaa breach, hipaa compliance checklist
    
Canon Solutions America
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
    
Trend Micro, Inc.
Published By: IBM     Published Date: Aug 28, 2014
From recruitment to onboarding and processing, HR teams spend hundreds of hours every year manually typing and processing documents. But what if you could eliminate tedious, manual processes to save valuable time - and get critical data across the organization faster? Employee Lifecycle Management solutions from IBM can help you integrate employees faster and simplify your daily task list, so you can get back to what's important - take the assessment to see how much time you could save.
Tags : 
online tool, employee lifecycle, employee onboarding
    
IBM
Published By: IBM     Published Date: Jun 05, 2018
Keeping up with ever changing contract management work is challenging. Governing legal and procurement content is written by thousands of people and applied to hundreds of situations. To stay compliant, organizations employ knowledgeable professionals to analyze every sentence to determine the changes that need to be made to company contracts. The manual process of sifting through these dense, complicated documents is inefficient and prone to error. Watson Compare and Comply is trained on contract specific knowledge and classifications and can streamline contract workflows through semantic understanding. Join Director of Watson Offering Management, Adam Orentrichler, and Chief Data Scientist of SAP Ariba, David Herman, as they discuss how Watson can transform the way your company manages contract governance.
Tags : 
    
IBM
Published By: DocuSign     Published Date: Apr 12, 2017
Attracting & retaining talent are two of the most important functions of an HR organization, but paper has a nasty habit of tying up HR resources and keeping HR professionals from getting the job done. Now imagine a paper-free workplace. It can happen with eSignature solutions. With eSignatures, organizations can sign, send, and approve documents anywhere, at any time and keep business moving forward. Join this webinar to learn how you can transform key, paper-heavy functions like hiring, onboarding, and benefits enrollment to fast and secure digital experiences.
Tags : 
    
DocuSign
Published By: BambooHR - HR Software     Published Date: May 28, 2013
HR’s role varies from cheerleader to counselor to Chief Culture Officer- we get it! Tracking employee data in spreadsheets is a headache you don’t have time for, we make it simple- to free you up for more meaningful work. Watch the webinar!
Tags : 
hris, human resources, employee data, talent management, pto, time off management, hr software, employee management
    
BambooHR - HR Software
Published By: Atlas Business Solutions     Published Date: Feb 27, 2008
Whether you are a seasoned Human Resource professional, or the owner or manager of a small business, understanding the intricacies involved in organizing the Human Resource functions is absolutely essential to running an efficient and legally compliant company. In this whitepaper, you’ll learn about the four main types of HR documents every manager can’t live without.
Tags : 
personnel, workforce, human resources, workforce management, document management, atlas business solutions, atlas, abs
    
Atlas Business Solutions
Published By: IBM     Published Date: Jan 19, 2017
Watch this video to learn how IBM Datacap and Box enable better customer centricity through the capture of data across mobile devices, scanners, email, fax and files. This solution works with Box to store documents in the cloud.
Tags : 
ibm, analytics, data, ibm box, customer centricity, ibm datacap, enterprise applications
    
IBM
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.