Chapter 1. Introduction

Size: px
Start display at page:

Download "Chapter 1. Introduction"

Transcription

1 Chapter 1 Introduction 1.1 Background to the research project Information overload as a phenomenon has been in existence for some decades now. Collie (2005), for instance, claims that we are being bombarded with much more information than we could possibly process, digest or internalise. Technology, however, has not only assisted us in overcoming the traditional problem of sourcing information but has also helped us to control and access information in such a way as to add meaning to it. The author in question has also researched ways in which to curb information overload and increase productivity with technology. Johnson (1998) has, in his turn, presented us with a solution to the plight of the information professional dealing with information skills. He recommends that we apply more specific techniques of filtering information from different sources and goes on to urge us to pay close attention to the evaluation, consolidation and repackaging of information in a bid to add more value to it. Lyman and Varian (2003) have researched the information overload phenomenon in a bid to develop various techniques to create less stressful work environments and ways for professionals to develop a framework and strategy more effectively to deal with information. A growing number of publications have seen the light on the current state of technology and management. Specific attention has been given to policies, compliance and litigation, mobile and writing styles. In spite of this, little attention has been given to companies communication-traffic profiles. While the challenges of management are significant, new approaches are being adopted that embrace and extend it with collaborative tools, thus linking organisations. Carmel (2004) indicates in his research that it is possible through developing certain strategies to provide a unified and cost-effective approach to the reduction of clutter and to the improvement of productivity and content for knowledge workers. 1

2 Anthony and Dawley (2003) have undertaken a study to examine employee sentiments concerning the use of . They have concluded that even though boosts productivity, overload and glut stem from peer misuse and lack of training. Watson (2002) has conducted extensive research to examine the utilisation of scanning and surveillance technology employed in consulting businesses of the United Kingdom. In so doing, he investigated the attitudes of employees and management alike towards surveillance and monitoring issues. He concluded that there has to be a fair balance between business and employee interests, which balance is the key to determining the future direction workplace monitoring should take. Despite the extensive research projects sited above, it is the author s opinion that more research needs to be undertaken on electronic-messaging systems. Financial institutions are large commercial players that are forever investing in new technology and information-communication tools in a bid to improve customer service and to boost employee morale and productivity. Now that customers and employees are able to communicate information in real time, it puts pressure on recipients to follow a new approach that is much faster and much more direct than traditional modes of interaction. New devices, such as mobile and instant messaging, have caused communication patterns to change dramatically. Recipients of real-time will have to make time for queries, to direct these queries to the appropriate information resource or other recipients or to deal with queries themselves. On all hierarchical levels, though, recipients tend to feel overwhelmed by information that has no relevance to them. has a different part to play at different levels in an organisation, though, and it is important not only to establish how people are influenced at the various levels but also to determine ways and means of reducing stress and loss of productivity. 1.2 Research problems and sub-problems The central research problem The following central research question was formulated for this study: To what extent does the information overload phenomenon in today s financial environment influence the productivity of office workers, with special reference to the use of as a formal and informal information resource? 2

3 1.2.2 The sub-problems In order to answer the central question, the following sub-problems were identified: 1. What is the extent of information overload in today s networked society? 2. What does electronic communication entail and how has improved communication in the Information Age? 3. How does overload influence the attitudes and the productivity of employees in the workplace? 4. What policy guidelines are necessary to establish sound usage by employees (knowledge workers)? 1.3 Research methodology A detailed literature study was deemed necessary in order to ensure that a solid foundation be laid, forming the departure point for the empirical research. A quantitative-research approach was adopted. For the purpose of this study, the population of individuals was selected from Standard Bank South Africa, Head Office Johannesburg. The units of analysis or sampling frame included executives, operational managers and customer-interfacing managers. The sample used is representative, because the target population has similar parameters (characteristics). For the purpose of this study, probability sampling was the most appropriate option, and the stratified-sampling method was used. \ The empirical study was effected by compiling a questionnaire (Addendum 1). The purpose of the questionnaire was to investigate the extent, if any, to which information workers/employees are experiencing information overload and also overload within Standard Bank. In total, 115 questionnaires were distributed among employees of Standard Bank, of whom 106 responded. The questionnaires were effected in the following employee categories: Executives: 40 were given out and 32 responded. Operational managers: 50 were given out and 50 responded. Customer-interfacing managers: 25 were given out and 24 responded. The questionnaire used for this study was designed according to the literature study that was done within the theoretical context of the research. Closed- and open-ended questions were included in the survey. Questionnaires were distributed by hand, and responses to each question had to be made by hand. 3

4 The questionnaire consisted of the following sub-sections: Biographical detail. Information and networks. . Bank-related questions. General technology-related questions. After having gathered the empirical data, the completed questionnaires were submitted to the Statistical Consultation Service ( STATCON ) at the University of Johannesburg for processing. The questionnaire outcome is indicated in Appendix Literature review As indicated in the previous section, the research design comprised a literature study that forms the basis for the empirical research. It is safe to say, then, that chapters 2, 3, 4 and 5 form the theoretical framework, discussing the various aspects with the associated variables that impact on the central research problem. Following, a brief summary of each chapter. Chapter 2: Information overload in the Information Society In chapter 2, the literature review is used to examine the meaning of information in the Network Society, as well as the technological side of information. This chapter is also used to address the first sub-problem. The paradigm shift from the Industrial Age to the Information Age will also be taken under discussion, providing a backdrop for a comparison of the industrial and information workers. The Network Society is an extension of the Information Society and uses different networks to exchange, communicate and collect information through applications such as the Internet, the World Wide Web, intranets and information portals. The various probable causes of information overload, such as the explosive growth of information transmitted through electronic channels like the Internet, telephone or broadcasting, will also be explored. Chapter 3: Electronic communication and In chapter 3, the focus will fall on the second sub-problem, namely on what electronic communication is and how has contributed to the Information Age. This chapter consists of an investigation into the developments of information communication and related technologies, such as the electronic- 4

5 communication mediums and channels, which include broadcasting, telephone and the Internet. One of the Internet s greatest applications, however, is . This chapter is, therefore, used to focus on the impact of , with special emphasis on as a means of communication and a source of information. It is also used to discuss the various writing styles of users. In addition, this chapter is used to examine the phenomenon of spam, as well as the impact spam may have on an organisation and/or an individual. In addition, the chapter is used to discuss new technologies and devices, such as Smartphones and Personal Digital Assistants ( PDAs ), that have served to improve office workers ability to be more productive and to save time. This is all possible through wireless-computing networks. The downside of these new technologies, however, is that employees will never really be cut off from their offices and would be exposed to an even greater deluge of s than before. Chapter 4: The effective management of technology in organisations In chapter 4, an in-depth examination is undertaken of the effect of on the user and what management measures organisations could take to prevent overload. This examination also extends to the third and fourth sub-problems, which pose the question as to how overload is influencing office workers productivity and attitudes, and what policy guidelines managers could implement to ensure sound usage. Possible solutions will be offered for the overload problem, such as techniques for employees or other users to avoid overload the implications to organisations and the implementation of a proper management system ( EMM ) management strategies to guard against misuse and overload other factors that need to be taken into consideration when implementing an EMM system, such as corporate electronic-communication policies, monitoring and surveillance software and solutions and, finally, archiving solutions and the key activity of archiving. Chapter 5: Electronic communication in the banking sector Chapter 5 is devoted to a discussion of the information-communication technology of the South African banking industry, with special emphasis on the electronic communication of Standard Bank South Africa. This chapter is used to look at external communication with customers and partners. In so doing, 5

6 Standard Bank s self-service banking channels will be discussed, as well as a unified communication strategy approach, which, it is to be hoped, could be used to solve some customer problems with receiving different messages from different mediums, such as faxes, SMSs and s. The internal-communications section will include a discussion on Standard Bank s communication through telephones, broadcasting and the Internet. An investigation will also be launched into the intranet usage of Standard Bank, as well as into the system the Bank uses for its staff members. In conclusion, this chapter offers a review of what technology could possibly mean to the banking scenario in general. Aspects identified in this section include marketing, customer service, security alerts and fraud detection, data collection and secure online-chat services Chapter 6: Empirical research The first part of chapter 6 will be devoted to a study of the rationale of the study, followed by a study of its research methodology. A closer examination is then undertaken to explain what research is, the research approach adopted for this study, as well as the sample target group and the data-collection and dataprocessing procedures followed. The empirical research was done in Standard Bank Head Office in Johannesburg, whose executives, operational managers and customer-interfacing managers were asked to respond to a questionnaire. The last section of this chapter is used to focus on the analysis and interpretation of the questionnaire results. 1.4 Research findings and conclusion Chapter 7 indicates the conclusion recommendations of the study, which are discussed below. Volumes and volumes of information are generated every year, which information flows through electronic channels or gets stored on different media. The information worker of today has a wide range of information sources to choose from, including sources from broadcasting media, telephones, mobile devices and the Internet. 6

7 The Internet constitutes one of the most significant technological breakthroughs of the last century and has boosted not only the way in which many organisations conduct their business but also the way in which they exchange and disseminate information. The intranet also falls under these applications, and respondents to the questionnaire used in this study felt that this should be used effectively to disseminate the latest available information that could be of use or interest to them. is the most-used computer-mediated application and is used more often than the World Wide Web, instant messaging or peer-to-peer file sharing, as indicated by respondents. Respondents also indicated out of the factor analysis that ing was a highly efficient means of communication, especially in view of its convenience. Given the magnitude of this breakthrough in communication technology, however, it was bound to have certain consequences. One of the more serious consequences of this new-found technology is that of overload, the very topic of the central research problem in this study. Cases of overload were well represented among the respondents, since 25% of them receive more than 60 s each day, whilst 30% of the respondents confessed to spending three or more hours on receiving, creating, reading or sending s every day, which left a total of 65% of them feeling overwhelmed by the sheer number of s they receive every day. In a bid to regain control of the situation, it was recommended that respondents should create a time slot in their day specifically to respond to and/or create s. The results of the questionnaire also indicated that respondents receive only a small number of spam mail, thanks to the fact that Standard Bank has a proper management system in place, in terms of which s are filtered and scanned for spam and viruses. Standard Bank has also implemented technology and software in the office environment to support mobile devices, such as Black Berry, which, in turn, allow employees mobile access to their s, be they work related or of a personal nature. Results also showed that respondents agreed to the monitoring of employee s. Such monitoring will serve to track misuse, to protect the trade secrets of the company and its intellectual property, as well as to guard against 7

8 information being leaked to unauthorised third parties. Standard Bank also complies with legislation by having implemented various policies, such as electronic-communications computer user policies, security policies, and so forth. Yet, if changes were to be wrought in legislation or in technology, employees should be properly informed thereof and should know how such changes could possibly influence their way of communicating electronically. Archiving is vitally important to the future of every organisation, and has distinct benefits for its users. Archiving solutions will, among others, ensure that an organisation remains compliant with regulations, legal discovery and storage management. archiving will also help to reduce overburdened users and IT administrators, since it will aid in reducing database sizes and in ensuring quick searches for and retrieval of stored s. Standard Bank has not yet implemented a formal archiving solution and respondents agreed that one should be implemented as soon as possible. Respondents also agreed that formal training in management ought to bring about significant changes in protocol, etiquette and use in their organisation. 8

Investigating e-mail overload in the South African banking industry

Investigating e-mail overload in the South African banking industry Peer Reviewed Article Vol.9(3) September 2007 Investigating e-mail overload in the South African banking industry E. Burger Centre for Information and Knowledge Management University of Johannesburg Johannesburg,

More information

Acceptable Use of ICT Policy For Staff

Acceptable Use of ICT Policy For Staff Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy

More information

INSTANT MESSAGING SECURITY

INSTANT MESSAGING SECURITY INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part

More information

Outbound Email and Data Loss Prevention in Today s Enterprise, 2010

Outbound Email and Data Loss Prevention in Today s Enterprise, 2010 Outbound Email and Data Loss Prevention in Today s Enterprise, 2010 Results from Proofpoint s seventh annual survey on outbound messaging and content security issues, fielded by Osterman Research during

More information

Email Management and Security Good Practice Guide. August 2009

Email Management and Security Good Practice Guide. August 2009 Email Management and Security Good Practice Guide August 2009 contents 1 Introduction to Good Practice Guides 3 2 Email Management and Security Overview 3 2.1 Understanding Good and Better Practice 4 3

More information

COMPUTER USAGE - EMAIL

COMPUTER USAGE - EMAIL BASIC BELIEF This policy relates to the use of staff email at Mater Dei and is designed to provide guidelines for individual staff regarding their use. It encourages users to make responsible choices when

More information

Email archives: no longer fit for purpose?

Email archives: no longer fit for purpose? RESEARCH PAPER Email archives: no longer fit for purpose? Most organisations are using email archiving systems designed in the 1990s: inflexible, non-compliant and expensive May 2013 Sponsored by Contents

More information

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description

UNCLASSIFIED. UK Email Archiving powered by Mimecast Service Description UNCLASSIFIED 11/12/2015 v2.2 UK Email Archiving powered by Mimecast Service Description Cobweb s UK Email Archiving, powered by Mimecast, provides businesses with a secure, scalable cloud-based message

More information

Outbound Email and Data Loss Prevention in Today s Enterprise, 2009

Outbound Email and Data Loss Prevention in Today s Enterprise, 2009 Outbound Email and Data Loss Prevention in Today s Enterprise, 2009 Results from Proofpoint s sixth annual survey on outbound messaging and content security issues, fielded by Osterman Research, July,

More information

5 ways Mimecast relieves the headache of email

5 ways Mimecast relieves the headache of email 5 ways Mimecast relieves the headache of email A Paralogic Networks Guide www.scholarisintl.com Introduction Email is one of the core internet technologies; for many businesses in the mid-1990s, the very

More information

Belmont 16 Foot Sailing Club. Privacy Policy

Belmont 16 Foot Sailing Club. Privacy Policy Belmont 16 Foot Sailing Club Privacy Policy APRIL 2014 1 P age Belmont 16 Foot Sailing Club Ltd (the 16s ) respects your right to privacy and is committed to protecting your personal information. This

More information

All Users of DCRI Computing Equipment and Network Resources

All Users of DCRI Computing Equipment and Network Resources July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform

More information

Solving Key Management Problems in Lotus Notes/Domino Environments

Solving Key Management Problems in Lotus Notes/Domino Environments Solving Key Management Problems in Lotus Notes/Domino Environments An Osterman Research White Paper sponsored by Published April 2007 sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

Internet Use Policy and Code of Conduct

Internet Use Policy and Code of Conduct Internet Use Policy and Code of Conduct UNIQUE REF NUMBER: AC/IG/023/V1.1 DOCUMENT STATUS: Agreed by Audit Committee 18 July 2013 DATE ISSUED: July 2013 DATE TO BE REVIEWED: July 2014 1 P age AMENDMENT

More information

Protecting Your Network Against Risky SSL Traffic ABSTRACT

Protecting Your Network Against Risky SSL Traffic ABSTRACT Protecting Your Network Against Risky SSL Traffic ABSTRACT Every day more and more Web traffic traverses the Internet in a form that is illegible to eavesdroppers. This traffic is encrypted with Secure

More information

Email Archiving, Retrieval and Analysis The Key Issues

Email Archiving, Retrieval and Analysis The Key Issues Email Archiving, Retrieval and Analysis The "If you are going to find a smoking gun, you will find it in email." Abstract Organisations are increasingly dependent on email for conducting business, internally

More information

ELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1

ELECTRONIC MAIL (E-MAIL) September 2014. Version 3.1 ELECTRONIC MAIL (E-MAIL) September 2014 Version 3.1 Western Health and Social Care Trust Page 0 of 6 E-mail Policy V3.1 Policy Title ELECTRONIC MAIL (E-MAIL) POLICY Policy Reference Number CORP09/006 Original

More information

CONTENTS. 1.0 Introduction

CONTENTS. 1.0 Introduction CONTENTS 1.0 Introduction 2.0 Why we are different? 2.1 What can a Firewall do? 2.2 What can an Intrusion Detection System do? 2.3 What can a Mail Security System do? 2.4 What can Defencity NetSecure do?

More information

Cisco Incident Response and Workforce Enablement for the Utility

Cisco Incident Response and Workforce Enablement for the Utility Cisco Incident Response and Workforce Enablement for the Utility Over the next ten years, it is predicted that aging energy infrastructure and utility industry workforce will undergo their greatest transition

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning

More information

Planning for Success: Privacy Impact Assessment Guide

Planning for Success: Privacy Impact Assessment Guide Planning for Success: Privacy Impact Assessment Guide Acknowledgement This guide is partially based on the Privacy Impact Assessment Guides and Tools developed by the Ministry of Government and Consumer

More information

Please read these Terms and Conditions of Use carefully. They govern the provision and use of the MyPAYE Online Payroll service and website.

Please read these Terms and Conditions of Use carefully. They govern the provision and use of the MyPAYE Online Payroll service and website. Terms and Conditions of Use Your online payroll is run via for MyPAYE Online Payroll Service Please read these Terms and Conditions of Use carefully. They govern the provision and use of the MyPAYE Online

More information

SHOULD SALES FORCE AUTOMATION CHANGES BRAND AUTOMATION FOR LG

SHOULD SALES FORCE AUTOMATION CHANGES BRAND AUTOMATION FOR LG SHOULD SALES FORCE AUTOMATION CHANGES BRAND AUTOMATION FOR LG Dr. Ashish Mathur (M) Associate Professor, Department of Management Studies Lachoo Memorial College of Science & Technology, Jodhpur ABSTRACT

More information

EMPLOYEE BEHAVIOR & EXPECTATIONS CITY OF PORTLAND HUMAN RESOURCES ADMINISTRATIVE RULES 4.08 INFORMATION TECHNOLOGIES

EMPLOYEE BEHAVIOR & EXPECTATIONS CITY OF PORTLAND HUMAN RESOURCES ADMINISTRATIVE RULES 4.08 INFORMATION TECHNOLOGIES CITY OF PORTLAND HUMAN RESOURCES ADMINISTRATIVE RULES EMPLOYEE BEHAVIOR & EXPECTATIONS Purpose The City of Portland provides information technologies to its employees to use in the course of doing their

More information

STATE RECORDS COMMISSION. SRC Standard 6 OUTSOURCING. A Recordkeeping Standard for State Organizations

STATE RECORDS COMMISSION. SRC Standard 6 OUTSOURCING. A Recordkeeping Standard for State Organizations STATE RECORDS COMMISSION SRC Standard 6 OUTSOURCING A Recordkeeping Standard for State Organizations State Records Commission of WA Perth, Western Australia February 2002 Table of Contents Definitions

More information

Results Oriented Change Management

Results Oriented Change Management Results Oriented Change Management Validating Change Policy through Auditing Abstract Change management can be one of the largest and most difficult tasks for a business to implement, monitor and control

More information

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

Cyber Security - What Would a Breach Really Mean for your Business?

Cyber Security - What Would a Breach Really Mean for your Business? Cyber Security - What Would a Breach Really Mean for your Business? August 2014 v1.0 As the internet has become increasingly important across every aspect of business, the risks posed by breaches to cyber

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Chapter 4. The effective management of e-mail technology in organisations

Chapter 4. The effective management of e-mail technology in organisations Chapter 4 The effective management of e-mail technology in organisations 4.1 Introduction In 2002, Agarwal and Rodhain indicated e-mail to be the most-used online application. They also identified it as

More information

Records management policy. Document author Assured by Review cycle. Audit and Risk Commitee. 1. Introduction...3. 2. Purpose or aim...3. 3. Scope...

Records management policy. Document author Assured by Review cycle. Audit and Risk Commitee. 1. Introduction...3. 2. Purpose or aim...3. 3. Scope... Records management policy Board library reference Document author Assured by Review cycle P017 Head of Compliance Audit and Risk Commitee 3 Years This document is version controlled. The master copy is

More information

TOWN OF COTTESLOE POLICY EMAIL MANAGEMENT

TOWN OF COTTESLOE POLICY EMAIL MANAGEMENT EMAIL MANAGEMENT POLICY STATEMENT Town of Cottesloe email accounts are intended for business transactions in support of the Town s strategic goals and objectives. Accordingly any email transmission residing

More information

USE OF INFORMATION TECHNOLOGY FACILITIES

USE OF INFORMATION TECHNOLOGY FACILITIES POLICY CI-03 USE OF INFORMATION TECHNOLOGY FACILITIES Document Control Statement This Policy is maintained by the Information Technology Department. Any printed copy may not be up to date and you are advised

More information

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT.

The term Broadway Pet Stores refers we to the owner of the website whose registered office is 6-8 Muswell Hill Broadway, London, N10 3RT. Website - Terms and Conditions Welcome to our website. If you continue to browse and use this website you are agreeing to comply with and be bound by the following terms and conditions of use, which together

More information

Competency frameworks COMPUTING AND INTERNET CERTIFICATE (C2i)

Competency frameworks COMPUTING AND INTERNET CERTIFICATE (C2i) Competency frameworks COMPUTING AND INTERNET CERTIFICATE (C2i) Mission Numérique pour l'enseignement Supérieur (MINES - DGESIP) (Digital Mission for Higher Education) Ministry of Higher Education and Research

More information

Outbound Email Security and Content Compliance in Today s Enterprise, 2005

Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Results from a survey by Proofpoint, Inc. fielded by Forrester Consulting on outbound email content issues, May 2005 Proofpoint,

More information

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE

THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE THE CHALLENGES OF DATA SECURITY IN THE MODERN OFFICE February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced

More information

COURSE INFORMATION BSB61015 Advanced Diploma of Leadership and Management

COURSE INFORMATION BSB61015 Advanced Diploma of Leadership and Management COURSE INFORMATION BSB61015 Advanced Diploma of Leadership and Management What is the Australian Qualifications Framework? The Australian Qualifications Framework (AQF) establishes the quality of Australian

More information

Appendix 6c. Final Internal Audit Report Disaster Recovery Planning. June 2007. Report 6c Page 1 of 15

Appendix 6c. Final Internal Audit Report Disaster Recovery Planning. June 2007. Report 6c Page 1 of 15 Appendix 6c Final Internal Audit Report Disaster Recovery Planning June 2007 Report 6c Page 1 of 15 Contents Page Executive Summary 3 Observations and Recommendations 8 Appendix 1 - Audit Framework 13

More information

E-commerce and Legal Compliance

E-commerce and Legal Compliance E-commerce and Legal Compliance Moving all or part of your business online can be an exciting time, opening up a range of opportunities and new markets for you and your business. Hand in hand with these

More information

Employee Travel Monitoring System

Employee Travel Monitoring System Employee Travel Monitoring System Employee Travel Monitoring System A crucial factor for corporations seeking to fulfil duty of care obligations is the ability to evaluate and monitor the travel movements

More information

Email Security Policies

Email Security Policies 09-0264ch07.qxd 10/11/01 12:31 PM Page 103 7 Email Security Policies W E ARE QUICK TO EMBRACE NEW TECHNOLOGIES when they improve the ability to communicate.the explosion of email is the most recent testament

More information

Better protection for customers, and recurring revenue for you!

Better protection for customers, and recurring revenue for you! AVG AntiVirus Better protection for customers, and recurring revenue for you! Offer your customers the latest protection without draining your resources. A single, central management platform alerts when

More information

Overcoming Your Email Management Challenges Reducing Business Risk & Lowering Costs with integrated Hosted Exchange and Email Archival services

Overcoming Your Email Management Challenges Reducing Business Risk & Lowering Costs with integrated Hosted Exchange and Email Archival services Overcoming Your Email Management Challenges Reducing Business Risk & Lowering Costs with integrated Hosted Exchange and Email Archival services Cobweb Solutions Limited South Wing, Delme Place, Cams Hall

More information

How to gather and evaluate information

How to gather and evaluate information 09 May 2016 How to gather and evaluate information Chartered Institute of Internal Auditors Information is central to the role of an internal auditor. Gathering and evaluating information is the basic

More information

Policy: Remote Working and Mobile Devices Policy

Policy: Remote Working and Mobile Devices Policy Policy: Remote Working and Mobile Devices Policy Exec Director lead Author/ lead Feedback on implementation to Clive Clarke SHSC Information Manager SHSC Information Manager Date of draft 16 February 2014

More information

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5

BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES. Version 5 BRING YOUR OWN DEVICE (BYOD) STUDENT & PARENT GUIDELINES Version 5 08/25/2015 Table of Contents BYOD Program Overview... 3 What is BYOD?... 3 BYOD Rationale... 3 Overview of BYOD Program... 3 Objective

More information

Lindiwe Mpindiwa Zimbabwe Revenue Authority Harare, Zimbabwe

Lindiwe Mpindiwa Zimbabwe Revenue Authority Harare, Zimbabwe Date submitted: 02/08/2010 Impact of Intranet as a knowledge sharing tool: experiences of ZIMRA Lindiwe Mpindiwa Zimbabwe Revenue Authority Harare, Zimbabwe Meeting: 107. Knowledge Management, Continuing

More information

Physical Security Services

Physical Security Services Physical Security Services The ANVIL Group Physical Security Services The ANVIL Group is an internationally renowned and accredited security company specialising in Crisis Avoidance. Established in 1988,

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

CHARTER OF ETHICS AND BEHAVIOUR

CHARTER OF ETHICS AND BEHAVIOUR CHARTER OF ETHICS AND BEHAVIOUR Behaviour Principles and Rules P.02 Deployment P.07 The Charter of Ethics was adopted at the meeting of the Groupe Eurotunnel Board Meeting of 28/01/2013 Groupe Eurotunnel

More information

The Next Generation of Corporate Communications

The Next Generation of Corporate Communications The Next Generation of Corporate Communications Videoconferencing White Paper Webcast-enabled videoconferencing systems deliver new, more cost effective one-to-many events Corporate Communications Will

More information

AUP COMPLIANCE. Auditing the AUP compliance. by using a non-invasive surveillance solution.

AUP COMPLIANCE. Auditing the AUP compliance. by using a non-invasive surveillance solution. AUP COMPLIANCE Auditing the AUP compliance by using a non-invasive surveillance solution. About Acceptable Use Policy Today, performing at work without a computer is impossible. Besides using computers

More information

Information Governance Policy

Information Governance Policy Information Governance Policy Version: 4 Bodies consulted: Caldicott Guardian, IM&T Directors Approved by: MT Date Approved: 27/10/2015 Lead Manager: Governance Manager Responsible Director: SIRO Date

More information

Curriculum content for small business management modules

Curriculum content for small business management modules 17 Curriculum content for small business management modules Maria M. Bounds Department of Business Management University of Johannesburg This study investigates the curriculum of Small Business Development

More information

Information Governance Framework

Information Governance Framework Information Governance Framework March 2014 CONTENT Page 1 Introduction 1 2 Strategic Aim 2 3 Purpose, Values and Principles 2 4 Scope 3 5 Roles and Responsibilities 3 6 Review 5 Appendix 1 - Information

More information

email management solutions

email management solutions Safeguard business continuity and productivity with Mimecast email management solutions Computacenter and Mimecast in partnership Expert software solutions Computacenter and Mimecast help organisations

More information

Managing specialty finance compliance requirements with a compliance management system

Managing specialty finance compliance requirements with a compliance management system Managing specialty finance compliance requirements with a compliance management system Prepared by: Andrew Amrine, Supervisor, RSM US LLP andrew.amrine@rsmus.com, +1 253 382 2239 September 2013 For over

More information

Email Usage Policy Document Profile Box

Email Usage Policy Document Profile Box Document Profile Box Document Category / Ref QSSD 660 Version: 0004 Ratified by: Governance and Risk Committee Date ratified: 12 th January 2012 Name of originator / author: Name of responsible committee

More information

What drives bank customers to adopt online banking?

What drives bank customers to adopt online banking? What drives bank customers to adopt online banking? Majharul Talukder The growing pervasiveness and adoption of the Internet has caused banking institutions to experiment with innovative ways of banking

More information

Get your businesses going in the right direction with a targeted list of permission based emails. Don t get into spam. Get into their hearts.

Get your businesses going in the right direction with a targeted list of permission based emails. Don t get into spam. Get into their hearts. EMAIL MARKETING Get your businesses going in the right direction with a targeted list of permission based emails. Don t get into spam. Get into their hearts. PERMISSION SEGMENTATION SUCCESS We all are

More information

TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY

TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY TITLE C169 COMPUTER USE, INTERNET & EMAIL POLICY DEPARTMENT Corporate Services POLICY DIRECTIVE HISTORY Council Resolution No 313/03 adopted at the Ordinary Meeting of Council on 19 August 2003. PURPOSE

More information

Introduction. The merger and conversion of the Halifax

Introduction. The merger and conversion of the Halifax Introduction Internal communications occur between various members and parts of an organisation and, usually, there are several different ways of delivery. Communication is a two-way process through which

More information

WHITE PAPER Social Media In Technology. A Unified Strategy for Success

WHITE PAPER Social Media In Technology. A Unified Strategy for Success WHITE PAPER Social Media In Technology A Unified Strategy for Success Social Media In Technology A Unified Strategy for Success Technology companies pride themselves on being early adopters of the newest

More information

The New Way to Work Together

The New Way to Work Together Getting to know The New Way to Work Together SharePoint is about giving you and the people you work with a better way to get things done together. That means your content is stored and organized in one

More information

www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail

www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail www.thalesgroup.com Business Ethics Conduct Guide Best practice guidelines for using e-mail Contents PREFACE...3 DID YOU KNOW?...4 Make better use of time... 4 Manage the mass of information... 5 Avoid

More information

A FINEXTRA RESEARCH REPORT SPONSORED BY AXWAY MARCH 2015 OPERATIONAL INTELLIGENCE AND PAYMENTS MONITORING A REPORT ON A SURVEY BY FINEXTRA AND AXWAY

A FINEXTRA RESEARCH REPORT SPONSORED BY AXWAY MARCH 2015 OPERATIONAL INTELLIGENCE AND PAYMENTS MONITORING A REPORT ON A SURVEY BY FINEXTRA AND AXWAY A FINEXTRA RESEARCH REPORT SPONSORED BY AXWAY MARCH 2015 OPERATIONAL INTELLIGENCE AND PAYMENTS MONITORING A REPORT ON A SURVEY BY FINEXTRA AND AXWAY OPERATIONAL INTELLIGENCE AND PAYMENTS MONITORING A

More information

E-Mail Security. on your terms SOFTSCAN

E-Mail Security. on your terms SOFTSCAN E-Mail Security on your terms SOFTSCAN With fraudulent and offensive emails delivered in vast quantities to businesses every day a foolproof email security system is essential. Setting the standards SoftScan

More information

AWARENESS T E C H N O L O G I E S. Complete internal threat solution on the endpoint delivered as a service. A Whitepaper By Ron Penna

AWARENESS T E C H N O L O G I E S. Complete internal threat solution on the endpoint delivered as a service. A Whitepaper By Ron Penna Complete internal threat solution on the endpoint delivered as a service About, Inc, Inc (ATI) is a Los Angeles, California company founded in 2002 who has over 200,000 total users and 10,000 corporate

More information

Transport Layer Security (TLS) About TLS

Transport Layer Security (TLS) About TLS Transport Layer Security (TLS) About TLS Contents Secure email at HSBC 2 About Transport Layer Security. 2 Setting up a Forced TLS connection with HSBC 4 Glossary... 5 Support..... 5 Secure email at HSBC

More information

Programme Specification

Programme Specification Programme Specification Title: Accountancy and Finance Final Award: Bachelor of Arts with Honours (BA (Hons)) With Exit Awards at: Certificate of Higher Education (CertHE) Diploma of Higher Education (DipHE)

More information

LIBER Case Study: University of Oxford Research Data Management Infrastructure

LIBER Case Study: University of Oxford Research Data Management Infrastructure LIBER Case Study: University of Oxford Research Data Management Infrastructure AuthorS: Dr James A. J. Wilson, University of Oxford, james.wilson@it.ox.ac.uk Keywords: generic, institutional, software

More information

CHAPTER1 INTRODUCTION

CHAPTER1 INTRODUCTION CHAPTER1 INTRODUCTION 1.1 BACKGROUND TO THE STUDY The last two decades have seen tremendous change in the manner in which business is conducted. This change is due to increased global competition and constant

More information

Stakeholder Guide 2014 www.effectivehealthcare.ahrq.gov

Stakeholder Guide 2014 www.effectivehealthcare.ahrq.gov Stakeholder Guide 2014 www.effectivehealthcare.ahrq.gov AHRQ Publication No. 14-EHC010-EF Replaces Publication No. 11-EHC069-EF February 2014 Effective Health Care Program Stakeholder Guide Contents Introduction...1

More information

Remote Infrastructure Management Emergence of the Cloud-based Helpdesk

Remote Infrastructure Management Emergence of the Cloud-based Helpdesk Remote Infrastructure Management Emergence of the Cloud-based Helpdesk A leadership perspectives white paper Recommended next steps for business and industry executives Issue 11 in a series Executive Summary

More information

The use of ICTs as an alternative to business travel: the scenario in South Africa

The use of ICTs as an alternative to business travel: the scenario in South Africa The use of ICTs as an alternative to business travel: the scenario in South Africa Anneli Douglas a Berendien A. Lubbea a a University of Pretoria, South Africa {anneli.douglas; berendien.lubbe}@up.ac.za

More information

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1

Protection. Code of Practice. of Personal Data RPC001147_EN_WB_L_1 Protection of Personal Data RPC001147_EN_WB_L_1 Table of Contents Data Protection Rules Foreword From the Data Protection Commissioner Introduction From the Chairman Data Protection Responsibility of Employees

More information

Company Profile. Risk (n) - Our Future. Our Mission. the chance of something happening that will have an impact on objectives.

Company Profile. Risk (n) - Our Future. Our Mission. the chance of something happening that will have an impact on objectives. Page 2 Company Profile SAFcomm is a fully managed contractor compliance service focused on meeting the needs of our Clients and their contractors and suppliers. Our service has been specifically designed

More information

RECORDS MANAGEMENT POLICY

RECORDS MANAGEMENT POLICY RECORDS MANAGEMENT POLICY Version 8.0 Purpose: For use by: This document is compliant with /supports compliance with: To outline the lifecycle of a record and to provide guidance on retention and disposal

More information

Report of the Auditor-General

Report of the Auditor-General Report of the Auditor-General on an investigation into the procurement of the enterprise content management system at the Companies and Intellectual Property Registration Office in South Africa March 2010

More information

Leveraging Media with SAP CRM

Leveraging Media with SAP CRM n o v e m b e r 2 0 1 2 Leveraging Media with SAP CRM OpenText Digital Asset Management Connector for SAP CRM I n today s business landscape, marketers are faced with a mountain of challenges to ensure

More information

Email Rules in Brief. Every email user has one or more roles 28.11.2013. the rules are partly different for e.g. the staff and the students

Email Rules in Brief. Every email user has one or more roles 28.11.2013. the rules are partly different for e.g. the staff and the students Email Rules in Brief Every email user has one or more roles the rules are partly different for e.g. the staff and the students All rules shall be obeyed use different passwords at the university of applied

More information

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by :

GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use. Approval for this regulation given by : GENERAL REGULATIONS Appendix 10 : Guide to Legislation Relevant to Computer Use Name of regulation : Purpose of regulation : Approval for this regulation given by : Responsibility for its update : Regulation

More information

INFORMATION GOVERNANCE POLICY

INFORMATION GOVERNANCE POLICY INFORMATION GOVERNANCE POLICY Primary Intranet Location Information Management & Governance Version Number Next Review Year Next Review Month 7.0 2018 January Current Author Phil Cottis Author s Job Title

More information

Inspectorate Guidelines for Schools P R O M O T I N G T H E Q U A L I T Y O F L E A R N I N G

Inspectorate Guidelines for Schools P R O M O T I N G T H E Q U A L I T Y O F L E A R N I N G School Self-Evaluation Guidelines for Primary Schools Inspectorate Guidelines for Schools I N S P E C TO R AT E P R O M O T I N G T H E Q U A L I T Y O F L E A R N I N G 2 School Self-Evaluation Guidelines

More information

ADVANCED CERTIFICATE IN PROJECT MANAGEMENT. (AdvCertPM) PROSPECTUS

ADVANCED CERTIFICATE IN PROJECT MANAGEMENT. (AdvCertPM) PROSPECTUS ADVANCED CERTIFICATE IN PROJECT MANAGEMENT (AdvCertPM) PROSPECTUS ACADEMIC QUALIFICATIONS OVERVIEW ACADEMIC QUALIFICATIONS Project, Programme, Portfolio, and Value Chain Management have become a key knowledge

More information

Part 2: Records and Information Management: Creation and Use

Part 2: Records and Information Management: Creation and Use Records and Information Management: Creation and Use Part 2: Records and Information Management: Creation and Use Creating Records and Information Information Capture and Use Legal Compliance Risk Assessment

More information

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System

United Tribes Technical College Acceptable Use Policies for United Tribes Computer System United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical

More information

GUIDE TO ACHIEVING EMAIL COMPLIANCE a South African perspective

GUIDE TO ACHIEVING EMAIL COMPLIANCE a South African perspective GUIDE TO ACHIEVING EMAIL COMPLIANCE a South African perspective Abstract This document highlights some of the South African rules and regulations that require the effective management of email. It looks

More information

E- Learning as a Strategy for Enhancing Access to Music Education*

E- Learning as a Strategy for Enhancing Access to Music Education* E- Learning as a Strategy for Enhancing Access to Music Education* Dr. Beatrice A. Digolo (Corresponding Author) E mail: digolobetty@yahoo.com, Tel:254-0712506224 Miss Elizabeth A. Andang o E mail: betsango@yahoo.com,

More information

Council Policy. Records & Information Management

Council Policy. Records & Information Management Council Policy Records & Information Management COUNCIL POLICY RECORDS AND INFORMATION MANAGEMENT Policy Number: GOV-13 Responsible Department(s): Information Systems Relevant Delegations: None Other Relevant

More information

ITEM FOR FINANCE COMMITTEE

ITEM FOR FINANCE COMMITTEE For discussion on 6 December 2013 FCR(2013-14)40 ITEM FOR FINANCE COMMITTEE HEAD 156 GOVERNMENT SECRETARIAT: EDUCATION BUREAU Subhead 871 Vocational Training Council New Item Enhancement of information

More information

THE MOST PREFERRED FREE E-MAIL SERVICE USED BY STUDENTS

THE MOST PREFERRED FREE E-MAIL SERVICE USED BY STUDENTS Paper presented at the 9th International Educational Technology Conference (IETC2009), Hacettepe University, 6-8 May 2009, Ankara, Turkey THE MOST PREFERRED FREE E-MAIL SERVICE USED BY STUDENTS Nadire

More information

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016

Policy No: 2-B8. Originally Released: 2001. Date for Review: 2016 Topic: Information and Communication Technology use by Students Policy No: 2-B8 Policy Area: Standing Committee: Education Religious Education and Curriculum Committee Originally Released: 2001 Date for

More information

ACCESS & USAGE POLICY

ACCESS & USAGE POLICY E-MAIL ACCESS & USAGE POLICY For LPG Distributors VERSION 1.0 1. Introduction and Applicability This document describes the policies of Hindustan Petroleum Corporation Limited hereinafter referred as Corporation

More information

Information Technology Research in Developing Nations: Major Research Methods and Publication Outlets

Information Technology Research in Developing Nations: Major Research Methods and Publication Outlets Information Technology Research in Developing Nations: Major Research Methods and Publication Outlets Franklin Wabwoba, Anselimo Peters Ikoha Masinde Muliro University of Science and Technology, Computer

More information

Email Security: A Holistic Approach for SMB. 041: Email Security. Insight White Paper

Email Security: A Holistic Approach for SMB. 041: Email Security. Insight White Paper Implementing the latest anti-virus software and security protection systems can prevent many internal and external threats. But these security solutions have to be updated regularly to keep up with new

More information

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock

Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Information & Communications Technology Usage Policy Olive AP Academy - Thurrock Version Control Sheet Title: Purpose: Owner: Information Communications Technology Policy To advise staff of the procedures

More information

Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda

Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda Delegate Invitation & Information Pack 26 th 28 th July 2011, Speke Resort & Conference Centre Munyonyo, Kampala, Uganda The East Africa Economic & Hi-Tech Crime Forum, Uganda, 2011 (the Forum), is an

More information