Why You Need to Focus on Social Networking in Your Company

Size: px
Start display at page:

Download "Why You Need to Focus on Social Networking in Your Company"

Transcription

1 y Why You Need to Focus on Social Networking in Your Company An Osterman Research White Paper Published July 2010 SPONSORED BY #$!#%&'()*(!!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington Tel: Fax:

2 Executive Summary THE UPSIDE AND DOWNSIDE OF SOCIAL NETWORKING Social networking tools like Twitter, Facebook, LinkedIn and many others fill an important gap in electronic communication and information delivery: they allow the broadcast of information in ways not practical with or other collaboration tools, while at the same time allowing a highly granular push and pull model of information delivery, such as rapid back-and-forth dialogue between employees, customers, etc. These tools can be used to build a brand or a company s reputation, monitor perceptions about a wide range of issues, disseminate information, demonstrate industry expertise, and build brand loyalty. Social networking permits individuals to share information and companies to gain competitive advantage in ways not practical or possible with other tools. However, social networking tools used in a corporate context also pose an enormous liability on a number of fronts: These tools make it incredibly easy for individuals to share confidential, sensitive or otherwise private information, both inadvertently and maliciously, potentially violating privacy or other laws. Similarly, they make it easy for employees to post slanderous or libelous content about fellow employees, a company s management, its clients and others. They are another avenue through which business records can be created and in the absence of good archiving tools lost, leading to e-discovery, legal hold, evidence spoliation and other problems. The absence of good security defenses that are devoted specifically to monitoring social networking protocols can offer hackers and other malicious types yet another means to introduce malware into an organization. An inability to link identities from social networks to a corporate identity can pose significant problems from a risk management perspective in the context of things like e-discovery and regulatory compliance. For example, a post to a social networking site by a registered representative is considered by FINRA to be a public appearance 1 a securities firm employing the representative must be able to accurately identify who has made the post. KEY TAKEAWAYS Social networking tools offer substantial benefits to individuals and organizations, but they must be managed properly. Decision makers must understand the risks and benefits from the use of social networking tools in general and also from the specific tools that might be of value. They must develop granular policies about their use and implement the means to enforce these policies. They must also implement the systems that will monitor, review, block and archive social networking content; all while ensuring that social networking can be used in as friction-free a manner as possible Osterman Research, Inc. 1

3 ABOUT THIS WHITE PAPER This white paper presents IT and business decision makers in organizations of all sizes an overview of the benefits and problems inherent in social networking, what they should consider doing to address these problems, and some practical things to consider as they seek to protect their organizations from unfettered use of social networking. Finally, it offers an overview of Smarsh, the sponsor of this white paper. The Growing Use of Social Networking SOCIAL NETWORKING USE IS GROWING RAPIDLY The use of social networking tools, both for corporate and personal use, is increasing at a rapid pace. For example: As of early June 2010, there were 190 million users of Twitter, each of whom post an average of 10.3 tweets per month 2. In February 2008, Twitter had 475,000 unique visitors 3, an increase of 400 times in just 28 months. Also as of June 2010, there are 519 million users of Facebook 4, up from 20 million unique visitors in February , an increase of nearly 26 times during the same period. As of May 2010, LinkedIn a primarily business-oriented tool had 65 million users 6, up from just one million in September Further, Osterman Research has found that corporate users spend an average of 18 minutes on a typical workday using social networking tools, or about 4% of their workday 8, as shown in the following figure Osterman Research, Inc. 2

4 Minutes Spent per User per Day Employing Various Communication Tools SOCIAL NETWORKING OFFERS A NUMBER OF IMPORTANT BENEFITS While much has been made of social networking tools being used to announce what individuals had for breakfast or distributing other fairly trivial content, these tools are actually being used for real world business applications. For example, social networking tools can be used for a variety of business purposes, such as generating new business, making product announcements, distributing company information, establishing industry expertise with a group of prospects, managing a brand, monitoring user opinions or consumer sentiment, and so forth. Social networking tools provide a unique channel for receiving and disseminating information that other media simply do not offer..but IT ALSO INCREASES OVERALL CORPORATE RISK Despite the many benefits of social networking and the unique opportunity it offers to gain competitive advantage, educate prospects and the like, it also increases corporate risk substantially. For example, among the risks that organizations face when their users employ social networking are the following: Unauthorized sharing of sensitive or confidential information Consider the following tweets from early July 2010 (tweeters names removed): o o work is getting fired next month...i wanna tell them, should I, jobs r hard 2 come by, and I think they need a heads up, HELP!!! I love to see when my boss is drunk and its 8:30 pm (@ [COMPANY NAME REMOVED]) [MAP TO COMPANY LOCATION REMOVED] 2010 Osterman Research, Inc. 3

5 Inappropriate comments made by employees Employees will at times make comments using social networking tools that could reflect poorly on their employer. For example, in early 2009, an employee of Ketchum, a public relations firm, used Twitter to post some derogatory comments about the city of Memphis shortly before presenting to the worldwide communications group at FedEx Memphis largest employer. An employee of FedEx discovered the tweet, responded to the tweeter, and then copied FedEx s senior managers, the management of FedEx s communication department and the powers that be at Ketchum 9. Identity management An organization that cannot prove the identity of individuals purporting to be representatives of their company, or that cannot tie social networking identities to corporate identities, faces significant risks from a compliance perspective. Another venue for malware infiltration Social networking tools, by virtue of the fact that they use newer techniques like short URLs, can allow malware to enter a corporate network in ways it could not via or the Web. Also, the growing availability of third-party applications for which there is no quality assurance testing or the like, such as many of the 40,000-plus applications available on Facebook, increases malware risk. Business records lost that should be retained Social networking posts sometimes contain business records that should be retained. For example, the Financial Industry Regulatory Authority (FINRA) issued Regulatory Notice in January 2010 that requires retention of relevant posts to social networking sites made by broker-dealers. Local governments that make announcements on social networking sites will often need to retain this content as part of sunshine or freedom-of-information laws. Some courts have already begun using posts to social networking sites as part of e-discovery proceedings 10. Organizations cannot rely on social networking site operators to retain posts. For example, Facebook retains content only for 30 days, Twitter retains only the last 3,200 tweets, and so forth. Clearly, organizations must retain data and they cannot rely on social networking operators to do this for them. Most organizations today do not have the ability to capture relevant content from social networking sites and retain it for long periods as many do for other types of business records. Nor do they have the ability to monitor employee posts to social networking venues to check for inappropriate content that could result in a lawsuit or quash a merger or damage their corporate reputation. The result is that organizations are increasingly at risk as the use of social networking tools continues to grow. This risk is multi-faceted and includes the potential spoliation of evidence, a failure to prevent sexual harassment between employees, charges of libel and other quite negative consequences. It is also important to note that there are thousands of social networks in use the problems discussed in this white paper are not limited just to Twitter, Facebook and 2010 Osterman Research, Inc. 4

6 LinkedIn. For example, Orkut is the most widely used social network in Brazil, Skyrock is the most popular in France, and bulletin board systems are the most popular social networking tools used in China. In short, the growth of social networking has far outstripped decision makers awareness of the risks they face from its use, as well as the technologies that have been implemented to address the risks. And, the problem has been compounded because much of the growth in the use of social networking tools has occurred during a period in which IT budgets were being cut and decision makers attention has been focused elsewhere. Social Networking is Too Important Not to Manage DECISION MAKERS CAN NO LONGER IGNORE SOCIAL NETWORKING Clearly, decision makers can ignore the risks of inappropriate use of social networking tools only at the risk of facing enormous legal judgments, regulatory compliance problems, or significant damage to their corporate reputation. On the flip side, they cannot avoid the use of social networking tools, particularly in highly competitive industries, because these tools offer the opportunity to win new customers, derive additional revenue from existing customers, position a company in a new market, etc. The bottom line is that social networking is now too important not to be considered carefully by corporate IT and business decision makers. HOWEVER, MOST ORGANIZATIONS DO NOT HAVE POLICIES OR TOOLS FOCUSED ON MANAGING THE USE OF SOCIAL NETWORKING Osterman Research has discovered that most organizations either have no policy focused on the use of social networking tools, or whatever policies that do exist are relatively basic. For example, as shown in the following figure, the three leading social networking tools used in corporate environments are the three tools least governed by any sort of corporate policy Osterman Research, Inc. 5

7 Existence of Policies for Various Communication and Social Networking Tools (% of Organizations That Have Established a Policy) Many decision makers have not bothered to establish policies for use of social networking tools in large part because a) they often underestimate the penetration and reach of these tools in their organizations, and b) they simply don t realize the risks associated with unmanaged and unfettered use of these tools. This puts organizations at serious risk, as discussed above. Further, the lack of policies focused on appropriate and inappropriate use of social networking means that organizations have not taken the critical step necessary for them to implement the right tools and procedures for managing the use of social networking without policies, it is virtually impossible to deploy and manage the right systems, since these system exist simply to enforce policies. SOCIAL NETWORKING MUST BE PROPERLY MANAGED There are three things that any organization should do in the context of managing social networking in their organization: Monitor content posted by representatives of the organization Organizations should monitor all posts to externally facing social networking sites like Facebook, Twitter, LinkedIn, etc. These posts can contain a variety of sensitive content, such as information about an impending merger, upcoming layoffs, the identity of a new customer, a recently discovered technical problem in a product, or 2010 Osterman Research, Inc. 6

8 other content that senior management may not want publicly divulged. The principle that should be used in managing social networking content should be largely the same as that used for any type of data leak prevention as it applies to , instant messaging and other electronic tools. Monitor content sent within the organization Information that is sent using internally facing social networking tools, such as Lotus Connections or Microsoft SharePoint, should also be monitored closely for content that could be harmful. As with other electronic communication tools, employees can send racially or sexually offensive content to one another, they could share trade secrets internally that should not be distributed to employees without appropriate clearance, or they could make statements about other employees that could violate privacy requirements. Further, some industries have strict regulatory obligations to limit the transfer of certain types of information between different operations within a company. For example, in a vertically integrated energy company, Federal Energy Regulatory Commission (FERC) Order No. 717 requires companies to create an ethical wall between the transmission and marketing functions of their business. Similarly, various laws focused on the financial services industry exist to prevent inappropriate communication between research and trading operations. Archive business records contained within social networking posts It is also critically important to retain relevant content within social networking posts for purposes of regulatory compliance and e-discovery, as well as for internal demands for things like informal early case assessment. Because a tweet/retweet, Facebook post or LinkedIn testimonial can contain a business record, there is no distinction between this type of record and one contained in an or instant messaging conversation. Further, because most social networking tools forward notifications to , there is a good chance that an organization s social networking content is being stored in other organizations archives. An organization s retention of relevant social networking content clearly demonstrates appropriate management of its electronic records. As discussed above, FINRA codified the requirement to retain relevant social networking posts in Regulatory Notice That document reads, in part, Every firm that intends to communicate, or permit its associated persons to communicate, through social media sites must first ensure that it can retain records of those communications as required by Rules 17a-3 and 17a-4 under the Securities Exchange Act of 1934 and NASD Rule A Four-Step Plan for Managing Social Networking Osterman Research recommends that any organization that is using or is considering using social networking capabilities of any kind undertake a four-step process for protecting against the risks associated with the use of these technologies, while at the same time maximizing the value they derive from them Osterman Research, Inc. 7

9 UNDERSTAND HOW AND WHY SOCIAL NETWORKING IS USED It is important for any organization to understand how and why social networking is used in the organization. For example, if the only use of these tools is personal, that will have different ramifications for the technologies that are deployed to monitor and archive content than if social networking is used for established business purposes. Consequently, IT should conduct a thorough audit of how social networking is used, which tools are used, why they are used and so forth. This audit should also include a forward-looking focus on how these tools might be used in the future, how competing firms are using these tools, and new capabilities that might be employed in the future. It is important to note that there may be a significant disconnect between what IT perceives as a legitimate application of social networking and what individual users or business units perceive as legitimate. The goal, of course, is to balance the competing interests of both groups and derive the greatest benefit from the use of social networking while still remaining compliant with corporate policies and security requirements, which could include: Marketing, communications, PR teams and spokespeople who want the ability to post commentary, create events and utilize the full functionality of social networks. Corporate users, such as Human Resources and legal staff who need to research new hires and investigate shared content. Regulatory compliance teams who must not only maintain records of shared content and activities, but also approve and moderate subject matter. Employees who utilize social networks to prospect for business, network with customers and partners and collaborate with suppliers. UNDERSTAND THE RISKS OF INADEQUATE MANAGEMENT Next, it is important to understand the consequences that can result when social networking content is not monitored, when business records in social networking posts are not retained, and so forth. It would be appropriate at this phase of the evaluation process to understand the potential consequences associated with not managing social networking use adequately. For example: If employees want to discuss work conditions or complain about their benefits, for example, employers are not permitted to interfere with these communications according to rules codified in the National Labor Relations Act. This means that employers must tread a fine line between monitoring and blocking social networking for inappropriate use or sharing of content in an inappropriate way and preserving the rights of employees to share information. Further complicating the issue is the need for multinational organizations to satisfy the diverse requirements of each territory in which it operates. If business records or actionable information are sent via social networking tools, management s decision to purge this content could be seen as spoliation of evidence in a lawsuit. For example, if management decides not to preserve sexually harassing 2010 Osterman Research, Inc. 8

10 direct messages sent using Twitter, a party offended by this content that takes legal action may be entitled to access the archives of these posts as part of an e-discovery exercise and could claim spoliation in their absence. The ramifications of spoliation can be substantial and include fines and sanctions imposed by the court, the requirement to pay the prevailing party s legal fees, attorneys costs for additional motions, and other serious consequences. The US Federal Trade Commission has issued a ruling that restricts organizations use of testimonials by bloggers, if bloggers have been paid to endorse a product, and so forth. Somewhat related to the point above is that investment advisers cannot be the beneficiary of a testimonial or recommendation on LinkedIn because of the potential violation of Rule 206(4) of the Investment Advisers Act of This rule makes it illegal for an investment adviser to publish or benefit from an advertisement or testimonial that deals with their conduct as an adviser. Registered representatives are subject to scrutiny when they post content on social networking sites, including monitoring of their posts and retention of their communications. IMPLEMENT POLICIES FOCUSED ON APPROPRIATE USE OF SOCIAL NETWORKING The next requirement is to implement policies that will attempt to strike the appropriate balance between employee freedom to communicate via social networking tools, the business benefits that will come from the use of these tools, compliance with industry regulations, and advice from legal counsel. Considerations for these policies include: Policies about the use of social networking tools should be part of an overall messaging and communication policy that covers the use of corporate , personal Webmail, instant messaging, collaboration workspaces, cloud-based storage tools and any venue through which individuals might share corporate information. Sufficient granularity should be included so that differing roles within the organization are clearly subject to different policies. For example, energy and securities traders should have different rules about their use of social networking than clerical staff, senior managers should be subject to different policies when communicating with external auditors than when they communicate with employees, formal communications that represent a company position should be subject to different scrutiny than personal communications, and so on. Policies should also include a detailed discussion about appropriate use of social networking tools, including requirements not to post sexually or racially offensive comments or images, not to include links to inappropriate Web sites, not to defame or slander others, not to post content that could run afoul of copyright laws, not to post personnel records or other sensitive information, and the like Osterman Research, Inc. 9

11 The specific tools that can and cannot be used should be specified clearly, preferably along with a rationale for the decision. Where appropriate and where possible, disclaimers should be included for communications like Facebook posts or blogs. Obviously, disclaimers will not be practical for tweets and other space-limited communication tools (unless, possibly, a short URL is included that points to a corporate disclaimer). Policies should clearly spell out that management reserves the right to monitor employee communication via social networking, when it has the right to act on this information, and that content may be retained for an indefinite period. Policies should also spell out the corporate reaction to and consequences of a breach of policy. DEPLOY THE RIGHT TECHNOLOGIES Finally, any organization should deploy technologies that will do the following: Monitor posts Monitor employee posts on every social networking protocol that might be used. This monitoring may be after the fact, such as sampling employee posts to check for inappropriate content; or it might be in real time to monitor posts before they leave the organization. Control the use of unauthorized tools Osterman Research has found that while many IT decision makers oppose the use of specific social networking tools or at least find them not to be legitimate for use in a business context, far fewer actually do anything to prevent their use. Archive and log content Archive and log all relevant content that might constitute a business record and that might need to be retained. It is generally easier to simply archive or log all social networking content than take the risk that some important content might slip through and not be retained, but this will depend to a large extent on the industry in which an organization operates and other factors. A key part of content logging is to ensure that the identity of the individuals who use social networking tools is clear and that content can be tied back to their corporate identity. Most organizations will want to integrate their social networking archive with their primary electronic content archive. This makes legal holds, as well as searching across all electronic content during early case assessment and e-discovery, much easier and less time-consuming. Block threats It is also vitally important to block threats that can enter an organization through social networking tools. This is particularly important given a) the widespread use of short URLs that offer the user no visual cues about the veracity of the link, and b) the fact that many social networking tools can display content provided by 2010 Osterman Research, Inc. 10

12 individuals to whom users have not given permission to display posts. One of the key problems with social networking from a security perspective is that these tools are generally less well defended than more established tools like . Given the rapid increase in the use of many of these tools, many IT departments are scrambling to keep up with the rapid growth of social networking tools, leaving organizations vulnerable to malware infiltration. For example, an Osterman Research survey conducted during May 2010 revealed that 12% of mid-sized and large organizations in North America had been the victim of malware infiltration during the previous 12 months, while 9% of organizations had had sensitive or confidential information accidentally or maliciously leaked through a social networking or Web 2.0 application 12. Sponsor of This White Paper Smarsh 921 SW Washington St. Suite 540 Portland, OR encryption. Smarsh provides hosted solutions for archiving electronic communications, including , instant messaging and social media platforms such as Facebook, LinkedIn and Twitter. Founded in 2001, the company helps over 10,000 organizations manage and enforce flexible, secure and cost-effective compliance and records retention strategies and mitigate risk. Smarsh also offers integrated modules within its archiving suite for classification and policy management, data-leak prevention and All services are centrally administrated through the Web-based Smarsh Management Con-sole. Permissioned administrators can review electronic communication, implement classification, DLP and encryption policies and produce selected data on-demand. All actions taken through any component of the suite are audited and logged, and customizable reports on system usage and message/system audit history can be produced on-demand. The SaaS (software as a service) delivery model enables clients to eliminate IT infrastructure costs and minimize operating burden, while benefiting from Smarsh expertise in hosting large volumes of mission-critical client data. For more information, visit or follow Smarsh at Osterman Research, Inc. 11

13 2010 Osterman Research, Inc. All rights reserved. No part of this document may be reproduced in any form by any means, nor may it be distributed without the permission of Osterman Research, Inc., nor may it be resold or distributed by any entity other than Osterman Research, Inc., without prior written authorization of Osterman Research, Inc. Osterman Research, Inc. does not provide legal advice. Nothing in this document constitutes legal advice, nor shall this document or any software product or other offering referenced herein serve as a substitute for the reader s compliance with any laws (including but not limited to any act, statue, regulation, rule, directive, administrative order, executive order, etc. (collectively, Laws )) referenced in this document. If necessary, the reader should consult with competent legal counsel regarding any Laws referenced herein. Osterman Research, Inc. makes no representation or warranty regarding the completeness or accuracy of the information contained in this document. THIS DOCUMENT IS PROVIDED AS IS WITHOUT WARRANTY OF ANY KIND. ALL EXPRESS OR IMPLIED REPRESENTATIONS, CONDITIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE DETERMINED TO BE ILLEGAL Unpublished Osterman Research survey data, May Source: Messaging and Web Security Market Trends, ; Osterman Research, Inc Osterman Research, Inc. 12

EXECUTIVE BRIEF PON SPON. The Cloud Application Explosion. Published April 2013. An Osterman Research Executive Brief. sponsored by.

EXECUTIVE BRIEF PON SPON. The Cloud Application Explosion. Published April 2013. An Osterman Research Executive Brief. sponsored by. EXECUTIVE BRIEF PON Explosion An Osterman Research Executive Brief Published April 2013 sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel:

More information

The 5 Best Practices For Archiving Email

The 5 Best Practices For Archiving Email y Messaging Best Practices for 2011 An Osterman Research White Paper Published December 2010 SPONSORED BY ( "#$#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Tel: +1

More information

SURVEY REPORT SPON. Identifying Critical Gaps in Database Security. Published April 2016. An Osterman Research Survey Report.

SURVEY REPORT SPON. Identifying Critical Gaps in Database Security. Published April 2016. An Osterman Research Survey Report. SURVEY REPORT Gaps in Database An Osterman Research Survey Report sponsored by Published April 2016 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel:

More information

WHITE PAPER SPON. Do Ex-Employees Still Have Access to Your Corporate Data? Published August 2014 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. Do Ex-Employees Still Have Access to Your Corporate Data? Published August 2014 SPONSORED BY. An Osterman Research White Paper WHITE PAPER N Do Ex-Employees Still Have Access to Your Corporate Data? An Osterman Research White Paper Published August 2014 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box

More information

WHITE PAPER SPON. Information Security Best Practices: Why Classification is Key. Published November 2011 SPONSORED BY

WHITE PAPER SPON. Information Security Best Practices: Why Classification is Key. Published November 2011 SPONSORED BY WHITE PAPER N Information Security Best Practices: Why Classification is Key An Osterman Research White Paper Published November 2011 sponsored by SPONSORED BY SPON sponsored by Osterman Research, Inc.

More information

EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, 2012-2017. Published May 2013. An Osterman Research Executive Brief

EXECUTIVE BRIEF SPON. File Synchronization and Sharing Market Forecast, 2012-2017. Published May 2013. An Osterman Research Executive Brief EXECUTIVE BRIEF N Sharing Market Forecast, sponsored by An Osterman Research Executive Brief Published May 2013 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

WHITE PAPER SPON. Managing Content in Enterprise Social Networks. Published August 2014 SPONSORED BY. An Osterman Research White Paper.

WHITE PAPER SPON. Managing Content in Enterprise Social Networks. Published August 2014 SPONSORED BY. An Osterman Research White Paper. WHITE PAPER N Managing Content in Enterprise An Osterman Research White Paper Published August 2014 SPONSORED BY sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

The Cost Benefits of a Hybrid Approach to Security

The Cost Benefits of a Hybrid Approach to Security ed by The Cost Benefits of a Hybrid Approach to Security An Osterman Research White Paper Published February 2010 SPONSORED BY! #$!#%&'()*(!!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black

More information

WHITE PAPER SPON. The Benefits of Vendor Consolidation and Centralized IT Management. Published June 2014 SPONSORED BY

WHITE PAPER SPON. The Benefits of Vendor Consolidation and Centralized IT Management. Published June 2014 SPONSORED BY WHITE PAPER N An Osterman Research White Paper Published June 2014 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 253

More information

WHITE PAPER SPON. Email Archive Migration: Opportunities and Risks. Published February 2014. An Osterman Research White Paper.

WHITE PAPER SPON. Email Archive Migration: Opportunities and Risks. Published February 2014. An Osterman Research White Paper. WHITE PAPER N Email Archive Migration: An Osterman Research White Paper Published February 2014 sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

Using SaaS to Reduce the Costs of Email Security

Using SaaS to Reduce the Costs of Email Security Using SaaS to Reduce the Costs of Email Security y An Osterman Research White Paper Published February 2009 SPONSORED BY onsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

WHITE PAPER SPON. Making File Transfer Easier, Compliant and More Secure. Published February 2012 SPONSORED BY!!! An Osterman Research White Paper

WHITE PAPER SPON. Making File Transfer Easier, Compliant and More Secure. Published February 2012 SPONSORED BY!!! An Osterman Research White Paper WHITE PAPER N Making File Transfer Easier, Compliant and More Secure An Osterman Research White Paper Published February 2012 SPONSORED BY sponsored by sponsored by SPON sponsored by Osterman Research,

More information

WHITE PAPER SPON. Achieving Rapid Payback With Mobile Device Management. Published November 2012. An Osterman Research White Paper.

WHITE PAPER SPON. Achieving Rapid Payback With Mobile Device Management. Published November 2012. An Osterman Research White Paper. WHITE PAPER N Achieving Rapid Payback With An Osterman Research White Paper Published November 2012 sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

WHITE PAPER SPON. Making File Transfer Easier, Compliant and More Secure. Published February 2012 SPONSORED BY!!! An Osterman Research White Paper

WHITE PAPER SPON. Making File Transfer Easier, Compliant and More Secure. Published February 2012 SPONSORED BY!!! An Osterman Research White Paper WHITE PAPER N Making File Transfer Easier, Compliant and More Secure An Osterman Research White Paper Published February 2012 SPONSORED BY sponsored by SPON sponsored by sponsored by Osterman Research,

More information

WHITE PAPER SPON. Considerations for Archiving in Exchange Environments. Published July 2013 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. Considerations for Archiving in Exchange Environments. Published July 2013 SPONSORED BY. An Osterman Research White Paper WHITE PAPER N Considerations for Archiving in An Osterman Research White Paper Published July 2013 SPONSORED BY sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

Why You Need to Consider Virtualization

Why You Need to Consider Virtualization ! An Osterman Research White Paper Published September 2008 SPONSORED BY!! Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 866 842 3274 info@ostermanresearch.com

More information

How To Calculate Total Cost Of Ownership (Tco) For Email Systems

How To Calculate Total Cost Of Ownership (Tco) For Email Systems WHITE PAPER N The TCO of Enterprise Email An Osterman Research White Paper Published June 2012 SPONSORED BY sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

10 Steps to Establishing an Effective Email Retention Policy

10 Steps to Establishing an Effective Email Retention Policy WHITE PAPER: 10 STEPS TO EFFECTIVE EMAIL RETENTION 10 Steps to Establishing an Effective Email Retention Policy JANUARY 2009 Eric Lundgren INFORMATION GOVERNANCE Table of Contents Executive Summary SECTION

More information

Realizing the Cost Savings and Other Benefits from SaaS Email Archiving

Realizing the Cost Savings and Other Benefits from SaaS Email Archiving y Realizing the Cost Savings and Other Benefits from SaaS Email Archiving An Osterman Research White Paper Published January 2009 SPONSORED BY onsored by sponsored by Osterman Research, Inc. P.O. Box 1058

More information

The Financial Advisor s Guide to Social Media Regulations

The Financial Advisor s Guide to Social Media Regulations The Financial Advisor s Guide to Social Media Regulations For US, UK and Canada With the right preparation and attention to detail, firms should feel confident about their ability to reach out to customers

More information

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost

Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost y Cloud-Client Enterprise Security Impact Report Increased Protection at a Lower Cost An Osterman Research White Paper Published January 2009 SPONSORED BY onsored by Phone: +1 877-21-TREND www.trendmicro.com/go/smartprotection

More information

Total Cost of Ownership - SharePoint Security

Total Cost of Ownership - SharePoint Security y Comparing Leading Email and SharePoint Security Solutions An Osterman Research White Paper Published January 2009 SPONSORED BY onsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond,

More information

The Cost Effective Migration to Integrated Hybrid SaaS Email Security

The Cost Effective Migration to Integrated Hybrid SaaS Email Security y The Cost Effective Migration to Integrated SaaS Email Security An Osterman Research White Paper Published July 2010 SPONSORED BY #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black

More information

WHITE PAPER SPON. The Cost and ROI Advantages of IronKey Workspace W300 for Windows to Go. Published May 2013 SPONSORED BY

WHITE PAPER SPON. The Cost and ROI Advantages of IronKey Workspace W300 for Windows to Go. Published May 2013 SPONSORED BY WHITE PAPER N of IronKey Workspace W300 An Osterman Research White Paper Published May 2013 SPONSORED BY SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA

More information

WHITE PAPER SPON. The Need for IT to Get in Front of the BYOD Problem. Published October 2012 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. The Need for IT to Get in Front of the BYOD Problem. Published October 2012 SPONSORED BY. An Osterman Research White Paper WHITE PAPER N The Need for IT to Get in Front An Osterman Research White Paper Published October 2012 sponsored by SPONSORED BY SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

WHITE PAPER SPON. Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content. Published October 2011

WHITE PAPER SPON. Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content. Published October 2011 WHITE PAPER Quantifying the Costs and Benefits of Archiving Your Email and Other Electronic Content An Osterman Research White Paper Published October 2011 SPON sponsored by sponsored by Osterman Research,

More information

Should You Install Messaging Security Software on Your Exchange Server?

Should You Install Messaging Security Software on Your Exchange Server? Should You Install Messaging Security Software on Your Exchange Server? An Osterman Research White Paper Published July 2008 SPONSORED BY Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

EXECUTIVE BRIEF SPON. Third-Party Archiving Solutions Are Still Needed in Exchange 2013 Environments. Published April 2015

EXECUTIVE BRIEF SPON. Third-Party Archiving Solutions Are Still Needed in Exchange 2013 Environments. Published April 2015 EXECUTIVE BRIEF Third-Party Archiving Solutions Are Still Needed in Exchange Environments An Osterman Research Executive Brief sponsored by Published April 2015 SPON sponsored by Osterman Research, Inc.

More information

The Growing Problem of Outbound Spam

The Growing Problem of Outbound Spam y The Growing Problem of Outbound Spam An Osterman Research Survey Report Published June 2010 SPONSORED BY! #$!#%&'()*(!!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

SURVEY REPORT SPON. Security Awareness Training Effectiveness Report. Results of a Survey of KnowBe4 Customers and Non-Customers. Published July 2013

SURVEY REPORT SPON. Security Awareness Training Effectiveness Report. Results of a Survey of KnowBe4 Customers and Non-Customers. Published July 2013 SURVEY REPORT Security Awareness Training Effectiveness Report Results of a Survey of An Osterman Research Survey Report sponsored by Published July 2013 SPON sponsored by Osterman Research, Inc. P.O.

More information

WHITEPAPER. The Companion Guide to FINRA/SEC Social Networking Compliance

WHITEPAPER. The Companion Guide to FINRA/SEC Social Networking Compliance WHITEPAPER The Companion Guide to FINRA/SEC Social Networking Compliance Overview Today financial firms generally fall in one of two camps when it comes to adopting social networking tools like Facebook,

More information

Microsoft Lync Server 2010 and the Unified Communications Market Key Considerations for Adoption, Deployment and Ongoing Management

Microsoft Lync Server 2010 and the Unified Communications Market Key Considerations for Adoption, Deployment and Ongoing Management y Microsoft Lync Server 2010 and the Unified Communications Market Key Considerations for Adoption, Deployment and Ongoing Management An Osterman Research White Paper Published October 2010 SPONSORED BY!

More information

Solving Key Management Problems in Lotus Notes/Domino Environments

Solving Key Management Problems in Lotus Notes/Domino Environments Solving Key Management Problems in Lotus Notes/Domino Environments An Osterman Research White Paper sponsored by Published April 2007 sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

WHITE PAPER SPON. A Cloud-Client Architecture Provides Increased Security at Lower Cost. Published January 2012 SPONSORED BY

WHITE PAPER SPON. A Cloud-Client Architecture Provides Increased Security at Lower Cost. Published January 2012 SPONSORED BY WHITE PAPER N A Cloud-Client Architecture Provides Increased Security at Lower Cost An Osterman Research White Paper Published January 2012 SPONSORED BY sponsored by! SPON sponsored by Osterman Research,

More information

WHITE PAPER SPON. What is the Total Value of Ownership for a Hosted PBX? Published September 2012. An Osterman Research White Paper.

WHITE PAPER SPON. What is the Total Value of Ownership for a Hosted PBX? Published September 2012. An Osterman Research White Paper. WHITE PAPER N What is the Total Value of An Osterman Research White Paper Published September 2012 sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

WHITE PAPER SPON. Email Encryption is an Essential Best Practice. Published August 2014 SPONSORED BY. An Osterman Research White Paper.

WHITE PAPER SPON. Email Encryption is an Essential Best Practice. Published August 2014 SPONSORED BY. An Osterman Research White Paper. WHITE PAPER N Email Encryption is an Essential An Osterman Research White Paper Published August 2014 SPONSORED BY sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

SURVEY REPORT PON SPON. Results of a Survey Conducted for Electric Cloud. Published January 2011. An Osterman Research Survey Report.

SURVEY REPORT PON SPON. Results of a Survey Conducted for Electric Cloud. Published January 2011. An Osterman Research Survey Report. SURVEY REPORT PON sponsored by Results of a Survey Conducted for Electric Cloud An Osterman Research Survey Report Published January 2011 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond,

More information

Professional. Compliance & Ethics. 19 The seven deadly sins of unethical organizations. 49 Anti-corruption and global supply chains

Professional. Compliance & Ethics. 19 The seven deadly sins of unethical organizations. 49 Anti-corruption and global supply chains Compliance & Ethics April 2014 Professional a publication of the society of corporate compliance and ethics www.corporatecompliance.org Meet Tyrell J. Campbell Investigator Pinnacle Investigations, Inc.

More information

Outbound Email and Data Loss Prevention in Today s Enterprise, 2010

Outbound Email and Data Loss Prevention in Today s Enterprise, 2010 Outbound Email and Data Loss Prevention in Today s Enterprise, 2010 Results from Proofpoint s seventh annual survey on outbound messaging and content security issues, fielded by Osterman Research during

More information

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security

More information

Focusing on Value-Added Services in a Hosted Messaging Environment

Focusing on Value-Added Services in a Hosted Messaging Environment Focusing on Value-Added Services in a Hosted Messaging Environment An Osterman Research White Paper Published July 2008 Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone:

More information

Skybox Security Survey: Next-Generation Firewall Management

Skybox Security Survey: Next-Generation Firewall Management Skybox Security Survey: Next-Generation Firewall Management November 2012 Worldwide Results Notice: This document contains a summary of the responses to a November 2012 survey of medium- to largesize organizations

More information

How To Choose Between Onpremises Or Cloud Based Email

How To Choose Between Onpremises Or Cloud Based Email WHITE PAPER Why the Cloud is Not Killing Off the On-Premises Email Market An Osterman Research White Paper Published April 2011 SPONSORED BY sponsored by SPON sponsored by Osterman Research, Inc. P.O.

More information

Current Email and Archiving Practices in the Enterprise an Osterman Research research summary

Current Email and Archiving Practices in the Enterprise an Osterman Research research summary Current Email and Archiving Practices in the Enterprise an Osterman Research research summary Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 Phone: +1 253 630 5839 Fax: +1 253

More information

The Benefits of Unified Communications

The Benefits of Unified Communications y The Benefits of Unified Communications for SMBs An Osterman Research White Paper Published February 2010 SPONSORED BY! #$!#%&'()*(!!!"#$!#%&'()*( Osterman Research, Inc. P.O. Box 1058 Black Diamond,

More information

WHITE PAPER SPON. A Comparison of Email and Collaboration Platforms. Published October 2012 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. A Comparison of Email and Collaboration Platforms. Published October 2012 SPONSORED BY. An Osterman Research White Paper WHITE PAPER N A Comparison of Email and An Osterman Research White Paper Published October 2012 SPONSORED BY sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

Information Governance for Social Business. Unleashing the Full Potential of Enterprise Social

Information Governance for Social Business. Unleashing the Full Potential of Enterprise Social Information Governance for Social Business Unleashing the Full Potential of Enterprise Social Executive Summary The Emergence Of Social Business Social business platforms have exploded onto the scene the

More information

Iowa County Government Social Media Use Policy

Iowa County Government Social Media Use Policy Iowa County Government Social Media Use Policy This policy outlines appropriate use of social media, as it relates to Iowa County, by employees and departments for official and personal use. This policy

More information

WHITE PAPER SPON. Best Practices for Social Media Management and Archiving. Published February 2014. An Osterman Research White Paper.

WHITE PAPER SPON. Best Practices for Social Media Management and Archiving. Published February 2014. An Osterman Research White Paper. WHITE PAPER N Best Practices for Social Media An Osterman Research White Paper Published February 2014 sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

Outbound Email Security and Content Compliance in Today s Enterprise, 2005

Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Results from a survey by Proofpoint, Inc. fielded by Forrester Consulting on outbound email content issues, May 2005 Proofpoint,

More information

A Review of MessageSolution Enterprise Email Archive and Enterprise File Archive

A Review of MessageSolution Enterprise Email Archive and Enterprise File Archive A Review of MessageSolution Enterprise Email Archive and Enterprise File Archive An Osterman Research Review Published September 2008 Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058

More information

GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE

GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE GENOA, a QOL HEALTHCARE COMPANY WEBSITE TERMS OF USE IF YOU HAVE A MEDICAL EMERGENCY, YOU ARE INSTRUCTED IMMEDIATELY TO CALL EMERGENCY PERSONNEL (911). DO NOT RELY ON THIS WEBSITE OR THE INFORMATION PROVIDED

More information

TERMS OF USE. Last Updated: October 8, 2015

TERMS OF USE. Last Updated: October 8, 2015 1666 K Street, N.W. Washington, DC 20006 Telephone: (202) 207-9100 Facsimile: (202) 862-8430 www.pcaobus.org TERMS OF USE Last Updated: October 8, 2015 This Terms of Use Agreement (this "Agreement") is

More information

WHITE PAPER SPON. Why Should You Encrypt Email and What Happens if You Don t? Published July 2013. An Osterman Research White Paper.

WHITE PAPER SPON. Why Should You Encrypt Email and What Happens if You Don t? Published July 2013. An Osterman Research White Paper. WHITE PAPER N An Osterman Research White Paper Published July 2013 sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 253 630 5839 Fax:

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE

GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE GENOA, a QoL HEALTHCARE COMPANY GENOA ONLINE SYSTEM TERMS OF USE By using the Genoa Online system (the System ), you acknowledge and accept the following terms of use: This document details the terms of

More information

WHITE PAPER. Why Third-Party Archiving is Still Necessary in Exchange 2010. An Osterman Research White Paper Published May 2012

WHITE PAPER. Why Third-Party Archiving is Still Necessary in Exchange 2010. An Osterman Research White Paper Published May 2012 WHITE PAPER Still Necessary in Exchange An Osterman Research White Paper Published May 2012 Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel: +1 253 630 5839 Fax: +1 253

More information

WHITE PAPER SPON. Managing SharePoint Growth: Strategies for Planning and Governance. Published October 2012. An Osterman Research White Paper

WHITE PAPER SPON. Managing SharePoint Growth: Strategies for Planning and Governance. Published October 2012. An Osterman Research White Paper WHITE PAPER N Managing Growth: An Osterman Research White Paper Published October 2012 sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel:

More information

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ).

This agreement applies to all users of Historica Canada websites and other social media tools ( social media tools or social media channels ). Social Media Terms of Use Social media is an integral part of Historica Canada s communications efforts, offering an additional model to engage with participants, colleagues, other stakeholders and the

More information

EXECUTIVE BRIEF SPON. Third-Party Archiving Solutions Are Still Needed in Exchange 2010 Environments. Published March 2012

EXECUTIVE BRIEF SPON. Third-Party Archiving Solutions Are Still Needed in Exchange 2010 Environments. Published March 2012 EXECUTIVE BRIEF Third-Party Archiving Solutions Are Still Needed in Exchange 2010 Environments An Osterman Research Executive Brief sponsored by Published March 2012 SPON sponsored by Osterman Research,

More information

Osterman Research Executive Summary

Osterman Research Executive Summary Osterman Research Executive Summary Much of what is transmitted through an email system or an instant messaging (IM) system constitutes a record, or a document that must be kept for a minimum period of

More information

Websites & Social Media. in the Professional Environment. A practical guide to navigating the world of social media

Websites & Social Media. in the Professional Environment. A practical guide to navigating the world of social media Websites & Social Media in the Professional Environment @ A practical guide to navigating the world of social media istockphoto.com/andrearoad Introduction Your Online Presence An online presence is essential

More information

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY

POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY NO. 3.14 September 8, 2015 TITLE: INTERNET AND EMAIL USE POLICY POLICY STATEMENT: Many of our employees have access to the internet as well as email capabilities. The County recognizes that these

More information

WHITE PAPER SPON. Business-Class File Sharing Best Practices SPONSORED BY. An Osterman Research White Paper. sponsored by.

WHITE PAPER SPON. Business-Class File Sharing Best Practices SPONSORED BY. An Osterman Research White Paper. sponsored by. WHITE PAPER N sponsored by Business-Class File Sharing An Osterman Research White Paper SPONSORED BY SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA Tel:

More information

How To Preserve Records In A Financial Institution

How To Preserve Records In A Financial Institution Proofpoint Enterprise Archive for SEC and FINRA Compliance The Leading Cloud Solution Designed for Broker-Dealers and Investment Advisors Proofpoint provides the most powerful, cost-effective solution

More information

WHITE PAPER PON SPON. Comparing the Cost of Alt-N MDaemon and Exchange. Published July 2013 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER PON SPON. Comparing the Cost of Alt-N MDaemon and Exchange. Published July 2013 SPONSORED BY. An Osterman Research White Paper WHITE PAPER PON MDaemon and An Osterman Research White Paper Published July 2013 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington 98010-1058 USA

More information

YouTube is a video-sharing website on which users can upload, share and view videos.

YouTube is a video-sharing website on which users can upload, share and view videos. The Township of Centre Wellington s Social Media Policy December, 2015 Thousands of elected officials in all orders of government are using social media tools such as Twitter, Facebook and YouTube, to

More information

RGS WEBSITE AND SOCIAL MEDIA POLICY. RGS (Regional Government Services Authority) established its first Internet Website Policy in 2015.

RGS WEBSITE AND SOCIAL MEDIA POLICY. RGS (Regional Government Services Authority) established its first Internet Website Policy in 2015. RGS WEBSITE AND SOCIAL MEDIA POLICY RGS (Regional Government Services Authority) established its first Internet Website Policy in 2015. JPA Website Policy 1. Purpose. The purpose of this Policy is to establish

More information

WHITE PAPER. Opportunities & Challenges of Social Media in the Workplace

WHITE PAPER. Opportunities & Challenges of Social Media in the Workplace WHITE PAPER Opportunities & Challenges of Social Media in the Workplace Customers no longer want to be talked at. Instead, they are looking for organizations to listen, to appropriately engage, and to

More information

THE STATE BAR OF CALIFORNIA STANDING COMMITTEE ON PROFESSIONAL RESPONSIBILITY AND CONDUCT FORMAL OPINION NO. 2012-186

THE STATE BAR OF CALIFORNIA STANDING COMMITTEE ON PROFESSIONAL RESPONSIBILITY AND CONDUCT FORMAL OPINION NO. 2012-186 THE STATE BAR OF CALIFORNIA STANDING COMMITTEE ON PROFESSIONAL RESPONSIBILITY AND CONDUCT FORMAL OPINION NO. 2012-186 ISSUE: DIGEST: AUTHORITIES INTERPRETED: Under what circumstances would an attorney

More information

Solving.PST Management Problems in Microsoft Exchange Environments

Solving.PST Management Problems in Microsoft Exchange Environments Solving.PST Management Problems in Microsoft Exchange Environments An Osterman Research White Paper sponsored by Published April 2007 sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

Social Networking and Data Protection

Social Networking and Data Protection SOLUTION BRIEF SECURE SOCIAL NETWORKING Helping to Secure Social Networking with CA Data Protection 2 SOLUTION BRIEF: SECURE SOCIAL NETWORKING ca.com Executive Summary Challenge Just when organizations

More information

Social Media in the Workplace - 5 Reasons Not to Use It

Social Media in the Workplace - 5 Reasons Not to Use It WHITE PAPER N sponsored by sponsored by An Osterman Research White Paper Published April 2012 sponsored by sponsored by SPON sponsored by sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058

More information

Social Media In the Workplace

Social Media In the Workplace Social Media In the Workplace By Randy Green and John Michael Ekblad 306 West Church Street, Champaign, IL 61820 (217)352-1800 Overview: Social Media What is it? Risks Presented Properly Regulating Employee

More information

Privilege Gone Wild: The State of Privileged Account Management in 2015

Privilege Gone Wild: The State of Privileged Account Management in 2015 Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...

More information

WHITE PAPER SPON. What is the Total Value of Ownership for a Hosted PBX? Published September 2012 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. What is the Total Value of Ownership for a Hosted PBX? Published September 2012 SPONSORED BY. An Osterman Research White Paper WHITE PAPER N What is the Total Value of An Osterman Research White Paper Published September 2012 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

Covered California. Terms and Conditions of Use

Covered California. Terms and Conditions of Use Terms and Conditions of Use Contents: Purpose Of This Agreement Privacy Policy Modification Of This Agreement Permission To Act On Your Behalf How We Identify You Registration Additional Terms For Products

More information

Village of Hastings-on-Hudson Electronic Policy. Internal and External Email Policies and Procedures

Village of Hastings-on-Hudson Electronic Policy. Internal and External Email Policies and Procedures Village of Hastings-on-Hudson Electronic Policy Internal and External Email Policies and Procedures Effective February 2012 1 1. Table of Contents 1. General Policies... 3 1.1 Establishment and upkeep

More information

BYOD File Sharing Go Private Cloud to Mitigate Data Risks

BYOD File Sharing Go Private Cloud to Mitigate Data Risks AN ACCELLION WHITE PAPER BYOD File Sharing Go Private Cloud to Mitigate Data Risks Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto, CA

More information

Outbound Email and Data Loss Prevention in Today s Enterprise, 2009

Outbound Email and Data Loss Prevention in Today s Enterprise, 2009 Outbound Email and Data Loss Prevention in Today s Enterprise, 2009 Results from Proofpoint s sixth annual survey on outbound messaging and content security issues, fielded by Osterman Research, July,

More information

Regulatory Notice 10-06

Regulatory Notice 10-06 Regulatory Notice 10-06 Social Media Web Sites Guidance on Blogs and Social Networking Web Sites Executive Summary Americans are increasingly using social media Web sites, such as blogs and social networking

More information

WHITE PAPER SPON. Three Steps to Get Started With Email DLP. Published July 2013 SPONSORED BY. An Osterman Research White Paper.

WHITE PAPER SPON. Three Steps to Get Started With Email DLP. Published July 2013 SPONSORED BY. An Osterman Research White Paper. WHITE PAPER N Three Steps to Get Started With An Osterman Research White Paper Published July 2013 SPONSORED BY sponsored by SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington

More information

Web Protection for Your Business, Customers and Data

Web Protection for Your Business, Customers and Data WHITE PAPER: WEB PROTECTION FOR YOUR BUSINESS, CUSTOMERS............ AND.... DATA........................ Web Protection for Your Business, Customers and Data Who should read this paper For security decision

More information

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer

Terms & Conditions. In this section you can find: - Website usage terms and conditions 1, 2, 3. - Website disclaimer 1 Terms & Conditions In this section you can find: - Website usage terms and conditions 1, 2, 3 - Website disclaimer -Acceptable internet use policy 1,2,3,4 - Acceptable email use policy 1, 2 - Copyright

More information

ACCEPTABLE USE POLICY

ACCEPTABLE USE POLICY ACCEPTABLE USE POLICY F. Paul Greene Harter Secrest & Emery LLP 1600 Bausch & Lomb Place Rochester, NY 14604 585-231-1435 fgreene@hselaw.com 2016 HARTER SECREST & EMERY LLP THE FOLLOWING TEMPLATE WAS DESIGNED

More information

Agent Social Media Policy

Agent Social Media Policy Agent Social Media Policy Addendum to the Agent Advertising Guidelines November 2013 For agent use only. not to be used for consumer solicitation purposes. Addendum to Agent Advertising Guidelines Agent/Producer

More information

WHITE PAPER. FINRA Compliance Guide: Enterprise Social Networks

WHITE PAPER. FINRA Compliance Guide: Enterprise Social Networks WHITE PAPER FINRA Compliance Guide: Enterprise Social Networks WHITE PAPER FINRA Compliance Guide: Enterprise Social Networks 2 Table of Contents Executive Summary...3 Social Networking Does Not Occur

More information

Reining in the Effects of Uncontrolled Change

Reining in the Effects of Uncontrolled Change WHITE PAPER Reining in the Effects of Uncontrolled Change The value of IT service management in addressing security, compliance, and operational effectiveness In IT management, as in business as a whole,

More information

Legal Considerations for E-mail Archiving Why implementing an effective e-mail archiving solution can help reduce legal risk

Legal Considerations for E-mail Archiving Why implementing an effective e-mail archiving solution can help reduce legal risk Legal Considerations for E-mail Archiving Why implementing an effective e-mail archiving solution can help reduce legal risk Written by: Quest Software, Inc. Executive Summary Copyright Quest Software,

More information

WHITE PAPER SPON. Why the Cloud is Not Killing Off the On-Premises Email Market. Published April 2011 SPONSORED BY. An Osterman Research White Paper

WHITE PAPER SPON. Why the Cloud is Not Killing Off the On-Premises Email Market. Published April 2011 SPONSORED BY. An Osterman Research White Paper WHITE PAPER Why the Cloud is Not Killing Off the On-Premises Email Market An Osterman Research White Paper Published April 2011 SPONSORED BY SPON sponsored by sponsored by Osterman Research, Inc. P.O.

More information

Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up.

Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up. TERMS OF SERVICE: Online Back-Up, Off-Site Back-Up, Restore Service of Back-Up. The following Terms and Conditions are applicable to all individual users / corporate clients who use, sign-up and pay-for

More information

Human Resources Policies and Procedures

Human Resources Policies and Procedures SUBJECT: Social Media and Internet Policy PURPOSE The AppleOne Group of Companies ( AppleOne ) recognizes the fast-changing landscape of the Internet which has increased the popularity of social media

More information

WHITE PAPER. Taking a Strategic Approach to Unified Communications: Best of Breed vs. Single Vendor Solutions SPON. Published February 2013

WHITE PAPER. Taking a Strategic Approach to Unified Communications: Best of Breed vs. Single Vendor Solutions SPON. Published February 2013 WHITE PAPER sponsored by Unified Communications: Best of Breed vs. Single Vendor An Osterman Research White Paper Published February 2013 SPON sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond,

More information

[Example] Social Media Acceptable Use Policy

[Example] Social Media Acceptable Use Policy [Example] Social Media Acceptable Use Policy Overview The [agency] recognises that there are legitimate business and personal reasons for using social media at work or using corporate computing resources.

More information

GUIDE Compliance Guide. Ensure Social Media Compliance Across Your Organization

GUIDE Compliance Guide. Ensure Social Media Compliance Across Your Organization GUIDE Compliance Guide Ensure Social Media Compliance Across Your Organization Compliance Guide Ensure Social Media Compliance Across Your Organization Introduction The business rewards of participating

More information

Policy for Social Media Usage in Catawba County

Policy for Social Media Usage in Catawba County Policy for Social Media Usage in Catawba County Adopted March 1, 2010 Revised September 7,2010 1. PURPOSE The role of technology in the 21 st century workplace is constantly expanding and now includes

More information

Social Media in Business: Friend or Foe?

Social Media in Business: Friend or Foe? Social Media in Business: Friend or Foe? Susan Morton Marsh Risk Consulting Reputational Risk & Crisis Management Leadership, Knowledge, Solutions Worldwide. Agenda Social Media Defined What is it, who

More information

Terms of Use The Human Face of Big Data Website

Terms of Use The Human Face of Big Data Website Terms of Use The Human Face of Big Data Website Effective Date: September 12 th, 2012 Welcome to The Human Face of Big Data, a project of Against All Odds Productions ( AAOP ). The Human Face of Big Data

More information

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES

APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS INFRASTRUCTURE RESOURCES APPROPRIATE USE OF INFORMATION TECHNOLOGY SYSTEMS (INCLUDING INTERNET & E-MAIL) EMC CORPORATE POLICY COPYRIGHT 2007 EMC CORPORATION. ALL RIGHTS RESERVED. NO PORTION OF THIS MATERIAL MAY BE REPRODUCED,

More information

Privilege Gone Wild: The State of Privileged Account Management in 2015

Privilege Gone Wild: The State of Privileged Account Management in 2015 Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...

More information