CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

regulations

Results 26 - 50 of 333Sort Results By: Published Date | Title | Company Name
Published By: Workforce Software     Published Date: Feb 02, 2015
Leave administration is one of the most challenging aspects of workforce management and an area that continues to become more complicated as leave regulations—and lawsuits—increase. For employers, having to understand and comply with complex federal regulations, such as the Family and Medical Leave Act (FMLA), in addition to myriad local laws, union rules and company policies can be overwhelming. The task of complying with these many regulations often consumes a great deal of time for HR teams, especially those operating across multiple geographies.
Tags : 
workforce software, software, automate, outsource, fmla, act, cloud, management, employee leave, strategy, human resource technology, remote access, cloud computing, human resources
    
Workforce Software
Published By: DigiCert     Published Date: Jun 19, 2018
Just as automation has become mandatory for scaling cloud workflows and critical workloads up or down in today’s dynamic business environment, the same is true in today’s dynamic threat environment. The ability to automate certificate renewals with our Complete Website Security solution helps you to strengthen certificate security, while helping you save resources, time and money on certificate administration and ensuring you remain compliant with industry rules and regulations. Download this whitepaper today to find out more.
Tags : 
    
DigiCert
Published By: Department for International Trade     Published Date: Feb 09, 2018
This is an exciting time for the UK’s diverse automotive industry. We’re experiencing rapid growth with many of the world’s leading manufacturers – including the BMW Group, Ford, Jaguar Land Rover, Nissan and Toyota – recognising the business case for investing here. The UK offers one of the lowest labour costs in western Europe, a competitive corporation tax (set to fall to just 17% by 2020) and regulations that support innovation and expansion. Meanwhile, the UK’s geographic location and strong supply and distribution infrastructure makes us a gateway to a customer base throughout Europe and beyond.
Tags : 
innovation, development, workforce, productivity, business, markets
    
Department for International Trade
Published By: Cognizant     Published Date: Oct 23, 2018
As financial services firms embrace digital, they need business assurance strategies that extend conventional quality assurance methods to address the nuances of emerging technologies such as blockchain and advanced artificial intelligence (AI). At the same time, they also need assurance that their strategies can accommodate changes in the ever-shifting regulatory landscape wrought by the acceleration of digital within the core of their businesses. This white paper explores how financial firms can excel in digital by holistically addressing the quality of business processes built on disruptive technologies while assuring compliance to regulations.
Tags : 
cognizant, finance, digital
    
Cognizant
Published By: TIBCO Software     Published Date: Nov 07, 2019
Is your risk infrastructure showing signs of strain in the face of FRTB, Basel III, and BCBS 239? Imagine a risk function where discrepancies among business, risk, and finance views are eliminated, setting the stage for advanced technologies, robotic process automation, and machine learning. Take a step beyond first generation data governance towards unified data and analytics across the enterprise. In this whitepaper, we explore how technology can help financial institutions not just automate compliance, but demonstrate organizational commitment to the change management process and adherence to the principles of regulations and law. Get insights into: How you can master regulatory change as part of transforming the risk function, elevating knowledge and data resources through governance, MDM, data science, and analytics An overview of the key market challenges for delivering a unified data management and governance model Real-world case studies from G-SIBs focused on data governanc
Tags : 
    
TIBCO Software
Published By: Adobe     Published Date: Feb 20, 2014
U.K. planning and design consultancy creates sustainable, dynamic, and progressive places for people to live, work, and play by standardizing on Adobe solutions.
Tags : 
adobe, adobe creative cloud, standardization, collaboration, tco, total cost of ownership, enterprise agreement, software deployment, license management, productivity, document security, compliance, industry regulations, file management, document management, software development, software compliance, cloud computing
    
Adobe
Published By: Mimecast     Published Date: Jan 19, 2018
The importance of information security and data protection is growing by the day for organizations. This is due to an evolving threat landscape and a higher adoption of internet dependent services, which, in the process of creating new opportunities, also lead to more vulnerabilities. As a consequence, national and international regulations are also changing according to the new challenges, calling for better preparedness. The new BCI Information Security Report 2017 sponsored by Mimecast looks to benchmark how organizations handle sensitive data and how resilient organizations are when it comes to data protection.
Tags : 
bci information, security and data protection, security report, data protection
    
Mimecast
Published By: Rackspace     Published Date: Mar 20, 2019
Banks embarking on any cloud activities must first overcome the compliance of rigorous security policies and regulations. For its 100th anniversary commemorative website, The Bank of East Asia (BEA) partnered Rackspace Professional Services – for expertise and advice on advanced cloud management, best practices and security – to help with the designing of a highly secured and compliant AWS environment to host the new, celebratory website.
Tags : 
    
Rackspace
Published By: Alert Logic     Published Date: Jun 12, 2014
Log management is an organizational requirement that extends beyond simple data collection. Today’s compliance regulations demand the ability to collect, analyze and report on all data collected. This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
Tags : 
log management, log collection, log solutions, log storage, security logs, it management, enterprise applications
    
Alert Logic
Published By: Workforce Software     Published Date: Jun 04, 2015
This paper provides a guide to large employers confronted by the time and attendance evaluations dilemma.
Tags : 
workforce software, workforce management, pay slip, government regulations, compliance, labour regulations
    
Workforce Software
Published By: BlueHornet     Published Date: Jun 06, 2008
Applying opt-in email marketing strategies and best practices to transactional emails can be a win-win for customers and marketers. But the two types of communications are not the same. This white paper is written to help email marketers and online retailers understand: What sets transactional emails apart from commercial messages; how they must comply with all federal regulations; and where to take advantage of opportunities to optimize their transactional email program.
Tags : 
email marketing, email messaging, blue hornet, bluehornet
    
BlueHornet
Published By: iCIMS     Published Date: Jan 17, 2014
This webinar from iCIMS will show you how to equip your talent team with the proper screening technology, stay in compliance with HR regulations, and best practices for pre and post hire candidate screening.
Tags : 
icims, talent management, new hires, hiring, finding new employees, screening, new candidates, hr issues, hr trends, screen employees
    
iCIMS
Published By: FICO     Published Date: Jun 07, 2016
As any line of business (LOB) leader knows, making customer level decisions that balance risk and profit just keeps getting harder. And even when you think you have the right decisions, turning them into actions can be even trickier. You also need to consider the factors that make smart decisions difficult. Big data. Regulations. Customers who want an offer, fast, or else you’re going to lose them.
Tags : 
    
FICO
Published By: FICO     Published Date: Jun 07, 2016
As any line of business (LOB) leader knows, making customer level decisions that balance risk and profit just keeps getting harder. And even when you think you have the right decisions, turning them into actions can be even trickier. You also need to consider the factors that make smart decisions difficult. Big data. Regulations. Customers who want an offer, fast, or else you’re going to lose them.
Tags : 
    
FICO
Published By: BlackLine     Published Date: Aug 06, 2018
The biotechnology and pharmaceutical industry is among the most heavily regulated industries in the world, challenged by evolving regulations, complex compliance requirements and close regulatory scrutiny. At the same time, companies must address the market pressures of globalization, the use of predictive data analytics and digital technologies, and the industry’s ongoing consolidation. In this challenging environment, confidence in internal controls is crucial.
Tags : 
    
BlackLine
Published By: Industrial Energy Audit Services     Published Date: Nov 27, 2010
A quick guide to help you determine how (or if) the EPA's new Boiler MACT regulations will affect your company.
Tags : 
boiler mact, industrial energy audit, energy audit, boiler energy audit
    
Industrial Energy Audit Services
Published By: Brainshark     Published Date: Oct 16, 2013
Banking, insurance, securities and investment firms are challenged to keep employees, broker dealers, investors and others current in a world of constant change. Enabling video and mobile communications is the most efficient way to clearly communicate and stay ahead of competitors and changing regulations. Discover how 8 out of the top 10 US financial institutions use Brainshark communications to increase compliance, decrease risks, and lower the costs of communications.
Tags : 
finance, financial services, banking, investment, insurance, broker, credit union, banks, compliance, audit, sales, training, communications, certification, powerpoint, ppt, presentation, training video, partner training, brainshark
    
Brainshark
Published By: LifeLock     Published Date: Sep 12, 2016
It only takes one stolen laptop, one employee’s USB stick, one hacker, one virus, or one careless error to compromise your company’s reputation and revenue. The threat of data breach is real and it’s critical that your company is prepared. A thorough plan that can be executed quickly is essential to comply with relevant regulations, maintain customer loyalty, protect your brand and get back to business as soon as possible.
Tags : 
est practices, identity theft, security, protection, authentication
    
LifeLock
Published By: Intralinks     Published Date: Oct 30, 2014
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: Half of all respondents lack the confidence to deal with risky file sharing practices 62% of respondents accidently sent files to unauthorized individuals outside the organization 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: The extent of the risk associated with unsecure file sharing The individual behaviors driving and organizational responses to information lossThe key considerations for secur
Tags : 
file sharing, enterprise environment, fire sharing technologies, risk to organizations, compliance with regulations, security, enterprise applications, business technology
    
Intralinks
Published By: Intralinks     Published Date: Apr 13, 2015
While file sharing proliferates in the enterprise environment, the unsecure and unsanctioned deployment of file sharing technologies poses significant risk to organizations. Extensive new research conducted by Ponemon Institute in North America and Europe, sponsored by Intralinks, reveals that individuals are behaving badly, organizations are addressing the challenges inadequately, and IT professionals feel a loss of control. Here is just a sample of the results: • Half of all respondents lack the confidence to deal with risky file sharing practices • 62% of respondents accidently sent files to unauthorized individuals outside the organization • 70% of organizations do not conduct regular audits to determine if file sharing activities are in compliance with regulations Download this research report now to find out: • The extent of the risk associated with unsecure file sharing • The individual behaviors driving and organizational responses to information loss
Tags : 
    
Intralinks
Published By: NAVEX Global     Published Date: Mar 21, 2018
The U.S. Foreign Corrupt Practices Act (FCPA), the U.K. Bribery Act (UKBA), Sapin II and many other Anti-Bribery and Corruption (ABC) laws and regulations around the world make it clear that bribery and corruption is prohibited, illegal and the source of fines, penalties, reputational damage, and in some cases criminal liability. This is particularly true when the bribes are offered to foreign government officials, especially by third parties. Before examining some of the common red flags and the appropriate courses of action to take, reviewing the various guidelines and frameworks available for organisations to build adequate procedures to protect themselves against third party risks is advisable. These frameworks have assisted organisations in establishing a strong legal defence in the event that a bribe does occur. These measures are having ramifications across the globe and they inform many of the components of the best ABC programmes in place today.
Tags : 
    
NAVEX Global
Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: IBM     Published Date: Oct 24, 2013
This IBM whitepaper prepares companies to face the impending complexities of the new FASB and IASB lease accounting standards. Learn how smart companies will move beyond the regulations alone and use the regulations as a springboard to transform the way they manage all their assets.
Tags : 
lease accounting, accounting, real estate, asset manager, ibm tririga, new accounting standard, fasb, iasb, compliance
    
IBM
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: dvsAnalytics     Published Date: Apr 20, 2011
Due to increasingly strict federal, state, and industry regulations aimed at protecting health & financial information, an understanding of the required rules and standards and how they relate to call recording is critical
Tags : 
hipaa, pci dss, nacha, audit logs, call recording, data encryption, user access controls, ephi, phi
    
dvsAnalytics
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search