X
Software Functionality Revealed in Detail
We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.
Get free sample report

Compare Software Solutions
Visit the TEC store to compare leading software solutions by funtionality, so that you can make accurate and informed software purchasing decisions.
Compare Now
 

 email privacy


DoubleClick Merger Good News For Privacy Advocates?
DoubleClick agreed to purchase NetCreations in a stock exchange valued at $191 million. NetCreations is the leader in ethical direct mail advertising

email privacy  Merger Good News For Privacy Advocates? DoubleClick Merger Good News For Privacy Advocates? D. Geller - October 13, 2000 Event Summary NetCreations, Inc. was founded in 1995 by current CEO Rosalind Resnick and CTO Ryan Scott Druckenmiller. Ms Resnick was one of the early celebrities of the Internet revolution. A business journalist who began covering the Internet from its inception as a commercial concept, she founded the NetGirl Forum on America Online, which during her tenure in 1995 and 1996

Read More


Software Functionality Revealed in Detail

We’ve opened the hood on every major category of enterprise software. Learn about thousands of features and functions, and how enterprise software really works.

Get free sample report
Compare Software Solutions

Visit the TEC store to compare leading software by functionality, so that you can make accurate and informed software purchasing decisions.

Compare Now

HCIMS - Laboratory Information System RFI/RFP Template

Product Functionality, System Management, Privacy and Security, and Product Technology 

Evaluate Now

Documents related to » email privacy

Rules, Tools, Policies, and Best Practices for Compliance in the United States


A strategic compliance program can help employers in the United States (US) reduce the likelihood of litigation, regulatory investigations, security breaches, privacy violations, and other electronic disasters. Find out what it takes to make a compliance program succeed, and learn the importance of establishing clearly written rules, formal employee education, and effective hosted-services solutions right from the start.

email privacy  regularly request access to email for audit or review. If you are unsure which government or industry regulations govern your employees' use of email, now is the time to find out. States Put Teeth in Privacy Laws: Security Breach Notification Laws Take Data Theft and Compliance with Laws and Procedures Seriously As of December 2008, 44 states, the District of Columbia, Puerto Rico and the U.S. Virgin Islands had enacted breach notification laws, requiring companies to notify customers and other affected Read More

The Roaring Penguin Training Network


A recent paper presented evidence that Bayesian filtering could be effective using a shared Bayes database, even among hundreds or thousands of different users. This lead to the Roaring Penguin Training Network (RPTN), a mechanism for sharing Bayes votes among different CanIt customers. This white paper describes the Roaring Penguin Training Network (RPTN).

email privacy  Bayesian Technique , Canit Email Filtering RTPN Database Access , Roaring Penguin RPTN Bayes Statistics , Roaring Penguin Software RPTN Database Access , Roaring Penguin Training Network Bayesian E-Mail Filtering , Bayesian Filtering Canit Training Network , Bayes Theroem Roaring Penguin Software Inc , Encrypting E-Mail Mechanism , Fighting Spam Bayes Method Whitepaper , Bayesian Approach to Filtering Junk E-Mail Whitepaper , GNU Privacy Guard GPG Signature , Blocker Software Roaring Penguin Whitepaper , Read More

Alibris Charged with Intercepting Email


Internet book dealer Alibris has agreed to pay a $250,000 fine after being charged with 10 counts of intercepting electronic communications.

email privacy  an ISP. Incoming Valinet email intended for local bookdealers was filtered for source Amazon.com and was captured in log files under direction from the original Alibris/Interloc management team. Market Impact The case was heard before Judge Michael A. Ponsor in the U.S. District Court in Springfield, Massachusetts. A maximum fine of $250,000 for each count means that Alibris could have ended up paying $2.5million in penalties. Earlier this year, Forbes described Alibris' growth as stunning. Read More

I Know What You Did Last Week - But I'll Never Tell


Internet advertising is under attack from privacy advocates and private citizens as DoubleClick reveals that it can correlate surfing behavior with individual identities. DoubleClick points out that this is only possible when the personal identification is provided voluntarily. Opponents question whether the average surfer understands the implications of providing information.

email privacy  senders of bulk commercial email to track the surfing behavior of people who merely read the email. January, 2000 President Clinton uses his State of the Union message to declare first and foremost, we have to safeguard our citizens' privacy. Online auction house ReverseAuction.com settles the Federal Trade Commission's charges that it violated consumers' privacy by acquiring consumers' personal information from a competitor's site and then sending deceptive spam to those consumers soliciting their Read More

Brave New World-Biometrics in HR


Human resources (HR) professionals often have to deal with errors in recording employees’ effectiveness while accomplishing their jobs. My colleague Ted Rohm gives an overview in this recent blog post of how biometrics can help with these HR challenges. He makes the case that biometrics technology is an option worth considering for certain aspects of business operations. As Ted mentions in his

email privacy  New World-Biometrics in HR Human resources (HR) professionals often have to deal with errors in recording employees’ effectiveness while accomplishing their jobs. My colleague Ted Rohm gives an  overview  in this recent blog post of how biometrics can help with these HR challenges. He makes the case that biometrics technology is an option worth considering for certain aspects of business operations. As Ted mentions in his article, the most common use cases of biometrics in HR are time and Read More

Freeware Vendor's Web Tracking Draws Curses


The free cartoon character cursor provided by Comet Systems Inc. tracks and stores the web visits of millions of people. This potential privacy issue was discovered and announced by the same security consultant who discovered, in March of 1999, that Microsoft Windows was inserting unique serial numbers into many documents created within Office 97 programs like Word and Excel.

email privacy  Vendor's Web Tracking Draws Curses Event Summary Comet Systems Inc., a privately held company that gives away software that can convert your cursor into an animated shape of your choosing when you surf the Web, has been collecting information about where the estimated six to fourteen million users of the Comet Cursor point their browsers. The discovery was made by a private security consultant, Richard Smith, a founder of Phar Lap Software, who was also responsible for revealing security problems Read More

Data Privacy: Protecting the Core of your Business


Many companies are struggling to comply with a patchwork of regulations related to sensitive corporate information. As a result, companies are looking for new database security and auditing solutions to help prevent unauthorized access to confidential information—and to satisfy internal and external auditors—without the performance loss and insider security risk of traditional database management system (DBMS) logging approaches.

email privacy   Read More

Why Not Take Candy From Strangers? More Privacy Problems May Make Ad Agencies Nutty


Online advertising network 24/7 has acquired AwardTrack, a newly launched provider of loyalty programs.

email privacy  Not Take Candy From Strangers? More Privacy Problems May Make Ad Agencies Nutty Event Summary AwardTrack had only been offering its services - loyalty programs by which a website can offer incentive points to its users for any behavior from completing a survey to reading an e-mail - for six weeks when ad network 24/7 (NASDAQ: TFSM) made them an offer they couldn't resist. 24/7 now owns AwardTrack after an exchange of stock valued at $75 million. Among AwardTrack's attractions was that it allows surfers Read More

A Question of Continuity: Maximizing Email Availability for Your Business


This white paper looks at the value of email availability and how it can be improved. It examines the key characteristics and capabilities of each type of solution. And it looks in detail at an option that meets key requirements whenever an email availability strategy has to be planned, implemented and managed to time and to budget. IT professionals looking to improve their existing IT security should read this paper.

email privacy  Question of Continuity: Maximizing Email Availability for Your Business This white paper looks at the value of email availability and how it can be improved. It examines the key characteristics and capabilities of each type of solution. And it looks in detail at an option that meets key requirements whenever an email availability strategy has to be planned, implemented and managed to time and to budget. IT professionals looking to improve their existing IT security should read this paper. Read More

Rules-based Marketing: Helping Companies Transform Leads into Sales


For years, small to medium businesses have envied the powerful marketing campaigns of their larger counterparts. But today, bigger budgets and marketing departments are no longer the only keys to marketing success. Rules-based marketing is an automated strategy involving if–then rules, resulting in communications that are more timely, relevant, and consistent across multiple communication channels, for even the smallest organization.

email privacy  you send out an email announcing a Web-based seminar. Using rules-based marketing, you can set rules that automate the different actions you’ll take based on the different responses (or lack of responses) to your invitation. For instance, those who didn’t open your email may, a few weeks later, receive a follow-up with a different subject line. Those who opened the email but didn’t click through would receive the same message, albeit with different benefits statements. And those who clicked through Read More

Smart Protection Network: Stop Web Threats Before They Reach You


The Internet is now an important business tool—but it also puts companies at risk of exposure to Web-based threats that can cause major damages, such as financial losses, identity theft, and loss of intellectual property, to name a few. To protect your business data and reputation, learn about a multilayered solution that can offer stronger protection while reducing your reliance on time-consuming signature downloads.

email privacy  and automatic protection from email and Web threats. Feedback Loops Integrated feedback loops provide continuous communication between Trend Micro products, and the company's 24/7 threat research centers and technologies in a two-way update stream. Each new threat identified via a single customer's routine reputation check automatically updates all of Trend Micro's threat databases, blocking any subsequent customer encounters of a given threat. Because the threat information gathered is based on the Read More

How to Choose an SMS Provider


For over 15 years, short message service (SMS) has been a quick and reliable way to receive and deliver information—anytime, anywhere. Today, SMS helps provide dialogue with consumers. Inbound SMS, or mobile originated (MO), is an important tool to enhance customer interaction. Learn the most important factors to consider when choosing an SMS provider, including flexibility, price, international coverage, and reliability.

email privacy  Computer , SMS Provider Email , SMS Provider Error , SMS Provider Failed , SMS Provider List , SMS Provider Location , SMS Provider Settings , SMS Service Provider , SMS Text Provider , SMS Text Messages , Mobile SMS Messages , SMS Messages , Send SMS Messages , Free SMS Messages , Sending SMS Messages , Email SMS Messages , SMS Message Service , Mobile SMS Message , Archive SMS Messages , Best SMS Messages , Download SMS Messages , Get SMS Messages , SMS Provider Applauded , SMS Provider Options , Find Read More

Analysis of Virgin Net's Hacker Scare


The Company only operates in England and claims the break-in attempts were only to specific and contained areas.

email privacy  Recommendations As commercially available email sites continue to grow, a wealth of information is pooled together for those who know what they are looking for. The typical security level for these sites is substandard and therefore becomes an appealing target for hackers, who prefer to think of themselves as 'crackers'. When using a free Internet based e-mail service, refrain from using the service for financial and/or professional services, if you feel uncomfortable with the content of your email, Read More

Response Management: Enabling a Demand-driven Supply Network


Customer and commercial demands are changing the way manufacturers manage their positions in the supply chain. The financial impact on a company that is unable to respond to change can be crippling, especially in a global market. Learn about the benefits of using a response management process, so you can access live data from multiple systems across various locations—for more intelligent and empowered decision making.

email privacy  response management resource , email response management , advocate response management capability , operations performance management , emergency response management , emergency preparedness response , rapid response management , response management enables , email response management solutions , management accountability framework , email management product , incorporates response support , supply chain management solutions , response management enables rapid response , demand response devices . THE Read More