eRecords Management Reports

Data Security in the E-discovery Process
sponsored by TechTarget Security
EBOOK: In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more.
Posted: 12 May 2011 | Published: 04 Oct 2011

TechTarget Security

7 Criteria to Consider when Adding Document Management Software to your Solution Portfolio
sponsored by Contentverse
WHITE PAPER: The following white paper provides readers with the top 7 things to look for when evaluating a document management solution. Learn how distinguish which characteristics are integral to successful document management, where to turn for the technology, and more.
Posted: 27 May 2014 | Published: 27 May 2014

Contentverse

The Complete Guide to E-signature Technology
sponsored by Adobe Systems Incorporated
EGUIDE: In this e-guide, learn how to streamline your document distribution process through the use of e-signature technology. Discover key differences between e-signature and digital signature applications, and review your software options with Adobe.
Posted: 01 May 2019 | Published: 01 May 2019

Adobe Systems Incorporated

eBook: Data Security in the E-discovery Process
sponsored by Dell and VMware
EBOOK: In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security.
Posted: 27 Aug 2013 | Published: 31 Dec 2011

Dell and VMware

Enterprise Content Management for Transforming Government
sponsored by EMC Corporation
WHITE PAPER: Read this issue brief by Center for Digital Government to learn how the Commonwealth of Massachusetts and the County of San Diego are improving service delivery by managing information electronically.  What benefits could ECM bring to your agency?
Posted: 10 Dec 2010 | Published: 10 Dec 2010

EMC Corporation

Hightail Case Study: Burr & Forman LLP
sponsored by Hightail
CASE STUDY: The following case study explores the document dilemma taken on by Burr and Forman LLP and the solution they used to vastly improve legal document sharing.
Posted: 29 Apr 2014 | Published: 29 Apr 2014

Hightail

Disaster recovery planning for health care data
sponsored by Sirius and NetApp
EGUIDE: This E-Guide from SearchHealthIT.com demonstrates why disaster recovery and business continuity is particularly important for health care facilities. Within, learn how to formulate a successful disaster recovery plan to ensure the avoidance of compliance penalties or reputational damage due to data loss.
Posted: 15 Jun 2012 | Published: 15 Jun 2012

Sirius and NetApp

Records Management Strategies to Maintain Regulatory Compliance
sponsored by TechTarget Security
EBOOK: Data governance needs and mandates make compliant records management difficult in the digital age. In this handbook, learn records and information management strategies to avoid regulatory complications, including mobile device management strategies and how retention/deletion schedules can help – and sometimes hurt – compliant records management.
Posted: 16 Apr 2015 | Published: 16 Apr 2015

TechTarget Security

Preparing for Personal Data Privacy Policies
sponsored by Micro Focus
EGUIDE: As data privacy laws continue to be established, the relationship that individuals have with companies has changed. No longer are companies free to just collect data and do whatever they please; they now effectively become stewards of the data. In this e-guide, discover how organizations can better manage personal data.
Posted: 12 Jul 2019 | Published: 10 Jul 2019

Micro Focus

Data Management Guidelines: Four Records Retention Issues To Address
sponsored by Symantec Corporation
EGUIDE: This e-guide details data management guidelines to help you determine what you should keep when implementing a records retention policy. Learn about four issues that can occur if you retain too much unnecessary data, including access trouble, cost influx, and more.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Symantec Corporation