Obstruct Terrorism Act of 2001 Reports

Notes and summaries of Facebook discovered documents (with multiple colour highlights) - undated
sponsored by TechTarget ComputerWeekly.com
RESOURCE: This undated document summarises the information contained in some of the exhibits produced by Godkin's 16 May declaration. The author is unknown.
Posted: 08 Feb 2021 | Published: 06 Nov 2019

TechTarget ComputerWeekly.com

Policing cyber crime
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security series considers the duties of the police in the UK and asks whether these roles remain realistic and achievable in cyber space
Posted: 08 Feb 2021 | Published: 23 Sep 2016

TechTarget ComputerWeekly.com

Computer Weekly – 14 November 2023: The UK AI Safety Summit – what did it achieve?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look back at the UK government's AI Safety Summit and assess what it achieved – and what it didn't. Our latest buyer's guide examines the future of business software and modernising legacy applications. And we find out how the UK PSTI Act aims to protect your smart devices. Read the issue now.
Posted: 10 Nov 2023 | Published: 14 Nov 2023

TechTarget ComputerWeekly.com

Infographic: Bridging the Gap Between Business and IT
sponsored by IBM
WHITE PAPER: This infographic illustrates the necessity of integration between business and IT, as well as the fundamental disagreements that exist between the two groups.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

IBM

Becoming a Social Business: The IBM Story
sponsored by IBM
WHITE PAPER: In this white paper, IDC explores example case studies of IBM’s internal evolution to a social business as a means to guide other large organisations considering making a similar transition.
Posted: 23 Jun 2011 | Published: 22 Jun 2011

IBM

e-Book: Chapter 4 - ESI Datamap: Managing Litigation Risk
sponsored by Symantec Corporation
BOOK: This whitepaper explains how an ESI data map serves as a unifying document that ties together information about record locations, litigation hold instructions and retention. Businesses that create an ESI data map their risk of e-discovery noncompliance.
Posted: 01 Jul 2008 | Published: 01 Jul 2008

Symantec Corporation

How to Create the Most Effective Compliance Program at Your Organization
sponsored by IntraLinks, Inc
EGUIDE: In this e-guide from SearchSecurity.com, expert Mike Chapple reveals his key tips on how to develop an effective data privacy compliance program and maintain proper documentation to effectively meet expanding data privacy laws.
Posted: 16 May 2014 | Published: 16 May 2014

IntraLinks, Inc

eBook: The Pillars of Employee Performance Management
sponsored by SumTotal Systems, Inc.
EBOOK: Now more than ever, HR professionals are tasked with optimizing performance management processes across the board, so they can ensure the most efficient use of corporate resources. Performance management will lead a company toward better engaging, retaining, and developing its most valuable asset: the workforce.
Posted: 11 Mar 2009 | Published: 11 Mar 2009

SumTotal Systems, Inc.

The Social Enterprise: Using Social Enterprise Applications to Enable the Next Wave of Knowledge Worker Productivity
sponsored by Oracle Corporation
WHITE PAPER: Enterprise social applications are the next generation of collaboration and productivity tools, capturing the interpersonal knowledge of workers and the implicit connections among people, systems, and data.
Posted: 16 Oct 2008 | Published: 16 Oct 2008

Oracle Corporation

EMA Analyst Report: Enabling Real-World Business Transformation through IBM Service Management
sponsored by IBM
INFORMATION CENTER: Visit this information center and find out how smarter technology can result in gains in efficiency, business alignment and risk management strategies.
Posted: 05 Oct 2009 | Published: 01 Oct 2009

IBM