Managing in the New Business Reality
|
|
|
- Caroline Edwards
- 9 years ago
- Views:
Transcription
1 Industry Watch A Summary of Findings from the AIIM International and Kahn Consulting, Inc. Policies and Practices Survey Managing in the New Business Reality Authored by Randolph A. Kahn, ESQ. and Barclay T. Blair at for
2 Managing in the New Business Reality A Summary of Findings from the AIIM International and Kahn Consulting, Inc. Policies and Practices Survey By Randolph A. Kahn, ESQ. and Barclay T. Blair What Is Industry Watch? The AIIM Industry Watch is a summary of industry trends based on survey data that is collected from the AIIM community of end-users. A valid sample of responses received within the allotted time are then analyzed by AIIM and the consultant. A report of those findings is assembled into this concise paper providing a snapshot of an industry at the time of the survey. The survey and corresponding Industry Watch is an occasional series. Survey topics are focused and will vary each time. Charts of the raw data will appear in the Appendix of each paper by: AIIM International Kahn Consulting, Inc. ISBN No part of this publication may be reproduced without prior written permission of the publisher or author. Published in the United States of America. Published by AIIM International 1100 Wayne Avenue, Suite 1100 Silver Spring, MD US Tel: /
3 Executive Summary is an indispensable part of today s business process. However, there is a growing policy vacuum in organizations when it comes to managing and controlling the use of information technology. Although a vast majority of organizations use and other electronic communication technologies for real business every day, too many organizations are failing to implement policies designed to ensure that the technology is used properly and that digital information is properly retained. At the same time, Sarbanes-Oxley and the increased perception that has important legal and compliance implications are having an effect on management, with a majority of organizations planning to increase the security of their systems and implement new policies to address the new realities. Key Findings Despite spam, increasing volume, and security worries, s popularity continues. One hundred percent of organizations use for business purposes, and 74% view as a productivity tool with clear benefits to their organization. Real business use. Organizations are aggressively adopting for highly-sensitive and valuable business processes and transactions, with 93% using to answer inquiries from customers, with 84% using it to discuss business strategy, 71% to negotiate contracts, 69% to exchange invoices and payment information, and 44% to file with official bodies. Policy vacuum. Organizations are adopting new technologies to do business, with a majority using (100%), mobile messaging (59%), wireless PDAs (81%), online discussion forums (71%), and peer-to-peer (P2P) file sharing (51%). However, a majority of organizations are failing to create policies to control and manage these technologies. For example, only 22% of organizations have formal written policies for P2P file sharing. In transition. Organizations have paid attention to Sarbanes- Oxley and the high-profile media coverage of business failures, litigation, and corporate malfeasance, in which played a starring role. A majority of organizations are making or planning to make changes to the way they manage as a result, by creating new policies (68%) and taking action to improve security (64%). Retention Inattention. Despite increased awareness of the need to properly manage and store messages, a majority of organizations are failing to provide written guidance to employees. Sixty percent have NO formal policy governing retention. A majority of companies do not even tell employees where, how, or by whom messages should be retained. About the Survey 1 Policies and Practices: An Industry Study was jointly conducted in Q by AIIM International and Kahn Consulting, Inc. This report provides a summary of key findings from the survey. Over 1,000 respondents from a wide variety of industries across the U.S. participated in the survey. Respondents were quite evenly distributed among major industries, with significant representation from Manufacturing and Engineering (12%); Banking, Finance, and Insurance (16%); and Government and Public Service (24%). 2 The survey also had a good mix of respondents from small and large organizations, with about half of the survey respondents belonging to organizations with less than 1,000 employees and the other half from organizations with more than 1,000 employees. The pool of survey 1 This Study should be cited as: Policies and Practices: An Industry Study Conducted by AIIM International and Kahn Consulting, Inc., Throughout this document, the term organizations is used to refer to all private, public, non-commercial, and other entities conducting business AIIM International and Kahn Consulting, Inc. 3
4 respondents is sufficiently broad and deep to provide statistically significant and useful insights. The business world has changed. While the use of and other electronic communications technologies is seemingly growing, a rash of high-profile business failures, corporate malfeasance, litigation, and new laws and regulations, such as the Sarbanes-Oxley Act, have placed a renewed emphasis on good management controls and organizational accountability. Anecdotally, the increasing frequency of a starring role for in lawsuits and investigations over the past few years had led the survey s authors to believe that there may be a gap in the way that technology is being managed (a suspicion that is largely confirmed by the result of the survey). As such, the survey was designed to gather information on how and other electronic communications technologies are being used by organizations today. More specifically, it sought to explore how policies and practices are being used (or not being used) as a management control are they being used, what issues are they addressing, and where are they failing. It also sought information on how is being used today, and with what frequency. Finally, the survey sought to find out if organizations today are changing the way that they use and why. Continues to Transform Business Resp to litigation Filing official docs Invoices Customer Inq Resp to regulators Confidential info Oper/prod strategies HR issues Contracts 23% 38% 44% 56% 64% 69% 71% 84% 93% Source: Managing in the New Business Reality, AIIM International and Kahn Consulting, Inc., 2003 The Survey should remove any lingering doubt that and other electronic communications technologies have profoundly changed the way that we do business today. isn t about the company picnic anymore. In fact, 100% of organizations surveyed indicated that they use for business purposes. has played a part in many high-profile lawsuits and investigations, scores of employees have been terminated, and a myriad of other ills have been attached to . Despite this, organizations not only continue to rely on , but also seem to be expanding use to activities with real business, legal, and compliance implications AIIM International and Kahn Consulting, Inc.
5 Recently passed laws like the federal E-SIGN Act and the state-level Uniform Electronic Transactions Act that encourage the use of electronic documents and signatures may be having some affect, as 71% of organizations now use to negotiate contracts and agreements, and 69% use it to exchange invoices, statements, and payment information. Nearly all organizations (93%) use as a tool for communicating with customers. The use of for sensitive business process indicates a comfort with the digital medium. And, it is not just companies that feel this comfort regulators and government agencies seem to increasingly be on board too. The Survey shows that 38% of organizations use to respond to regulators, and 44% use it to file with official bodies. plays a big role both inside and outside organizations. A majority of them use to discuss human resource (HR) issues (56%), to discuss operational or product strategies (84%), and to exchange confidential or sensitive information (65%). The bottom line is that is used every day in our organizations for real business purposes. The Survey also indicates that, while organizations are increasingly comfortable with doing business in the electronic world, many have not invested in the hardware and software that supports proper management and retention of digital information. For example, only 35% of organizations have a separate back-end system specifically used for retaining messages, and a minority use records management (23%), document management (34%), or management and archiving software (40%). Properly capturing and retaining and other types of important digital information is clearly more challenging without a supportive technology environment. Similarly, although organizations are clearly using to transmit sensitive information with privacy, confidentiality, and trade secret implications, less than half have invested in encryption technology. This suggests that for many organizations, comfort with using for important business processes is likely more the result of familiarity with the technology than investment in security. Many organizations have had their false sense of security shattered when unprotected messages have ended up in the wrong hands and trade secrets have been lost, or customer s privacy has been violated, for example. The Policy Vacuum P to P FTP Newsgroups Voice mail Int/Ext disc forums Wireless/PDA Laptops Text messaging IM Source: Managing in the New Business Reality, AIIM International and Kahn Consulting, Inc., 2003 Allow Use Have Policy 2003 AIIM International and Kahn Consulting, Inc. 5
6 Information technology is clearly transforming business today. Fully 100% of organizations surveyed are using to conduct business. As expected, nearly every organization uses laptop computers and voic (both 98%), but organizations are also using a surprising variety of less common technologies including Instant Messaging (IM), message boards, and Peer-to-Peer (P2P) file sharing for business purposes. However, while most organizations surveyed are allowing employees to use these technologies, many are failing to ensure that they have adequate management controls and security precautions in place. For example, even though 59% of organizations allow employees to use newsgroups for business, only 17% of organizations provide formal written policies for their use. It s much the same story with wireless-enabled handheld devices such as Personal Digital Assistants (PDAs) and Tablet PCs, where 81% of organizations allow their use, but only 28% have formal written policies. P2P file sharing is no better, with less than half of organizations that allow its use providing employees with written guidelines, despite recent cases where companies have become embroiled in copyright disputes over music files shared over the corporate network. Instant Messaging (IM) is graduating from a chat tool for teenagers to an enterprise messaging tool with real business uses and real legal implications. Forty-six percent of organizations use it for business, but less than half of those have a formal policy this despite new rules from regulators like the National Association of Securities Dealers that require IM messages to be retained like any other business correspondence. The disconnect between the use of these technologies and the lack of rules to regulate their use is problematic. Failure to provide rules creates security risks and retention issues, and may allow technology to be used in a way that does not promote business interests. Some of this policy vacuum can be attributed to the lag time that seems to occur between a technology s adoption and the creation of a policy. In other cases, the cause is not so clear. For example, the fact that text messaging or -enabled mobile phones may be relatively new to many organizations may partly explain why only 21% of organizations have a written policy even though a majority of them (59%) allow its use. However, it is hard to apply the same logic to newsgroups (59% use/17% policy) or file transfer protocol (FTP) (82% use/35% policy) since both are mature technologies that have been in widespread use for many years. In many organizations, the answer may be as simple (yet potentially dangerous) that they have never had a problem with the technology, so they haven t felt the need to create the control. A passive approach to policy-making can be dangerous, as the business world learned over the past decade or so as evolved to become the commonplace tool it is today. In the nascent days of use, organizations took a passive approach to management that forced them to react to problems, after the fact, by drafting policies, training, auditing, monitoring, and retraining and occasionally firing violators just to get use under control. was rolled out across the business world without enough consideration of what could go wrong, and the liability that lay within the system. Indeed, much that could go wrong did go wrong. Consequently organizations were forced to legislate better behavior through policy or other means. Now, while employees still violate policies (and a few employees likely always will) the majority of organizations (80%) have prohibited use policies, at a minimum, that tell the workforce how to deal with all kinds of conduct that could get the employees and the organization in serious trouble AIIM International and Kahn Consulting, Inc.
7 Pay Attention to Retention Content of determines whether or not that constitutes an official record. If so, it is to be retained outside of the system. If it is not a record, it should be deleted. There is no way there can be one retention period for all messages. Survey Respondent #14 Each user pretty much determines this individually. I do it for my department, since I m the department head. Survey Respondent #39 I drafted an use and an retention policy two years ago, and I m still waiting for upper management s review! Survey Respondent #175 Most organizations have clearly got the message that they need to guide employees on the proper way to use the system. For example, 70% of organizations tell their employees what to expect in terms of the privacy of at work, 80% dictate acceptable use of the system, and 73% provide guidelines on content. Maybe the countless highprofile lawsuits involving pornography and inappropriate content are finally starting to have an effect. On the other hand, even though a majority of organizations are making changes to they way is managed because of its increasing legal importance (due to Sarbanes-Oxley, lawsuits, and so on), 60% have NO formal policy governing its retention; 54% do not even tell employees where, how, or by whom messages should be retained. It is little wonder that the nearly two-thirds of survey respondents felt that their organization needed new policies and more retention and storage training. And, even when organizations do retain messages, only 37% retain messages according to their content. As the respondent quotes above help to illustrate, the remaining organizations use a hodge-podge of techniques, with 31% keeping indefinitely, and 26% retaining it less than 120 days. Sixty-seven percent use maximum mailbox sizes as a method of creating a de facto retention limitation. While use has eclipsed telephone use in many businesses, the replacement of one technology with the other does not mean that they can be handled with the same ease. , unlike phone calls, is memorialized in a form that sometimes makes it tough to manage. And yet, it is clear from the Survey, substantive business relationships are now formed via , and important documents and evidence may only reside in form. Losing the means losing your ability to defend your organization s legal position. Where are the rules that make sure the company has evidence of its business dealings and can defend itself in the context of litigation, audit, or investigation? Those rules are not drafted with the necessary regularity. A Transition Period Many organizations are in a period of transition in the way that they manage and use and related technologies. Organizations have paid attention to Sarbanes-Oxley and the high-profile media coverage of business failures and corporate malfeasance (such as Andersen/Enron), with 40% citing these as the reason they are making (or planning to make) changes in the way is retained and managed. Others cite lawsuits, business losses, viruses, system downtime, or other damage directly experienced by the organization as the reason for change (30%). Finally, fully 47% cite the increasing volume of in their organization as a reason that practices need to change. The kinds of changes that organizations are making vary. The good news is that a majority of organizations (68%) see the creation of new policies as the most important change they can make to address the realities of their operating and business environment. Also, a majority (64%) has taken action (or plan to) to make their systems more secure. Beyond that, there seems to be some confusion amongst 2003 AIIM International and Kahn Consulting, Inc. 7
8 organizations as to where their management problems exactly lie. For example, while some say they need to retain more messages (25%), an even greater number believe they need to retain fewer messages (31%). Similarly, while some believe the path forward is to retain for longer periods. Clearly, training should play a big role during transition periods like this. A majority of organizations believe that training will help their organizations, and 46% of organizations have offered training on policy issues during the last year which reflects the majority belief that employees could benefit from more mail retention and storage training (67%). Despite Problems, Still Viewed Positively Despite some concerns about security, volume, and spam, the vast majority of organizations still view in a positive light. In fact, 74% view as a productivity tool with clear benefits to their organization. Less than 1% of organizations viewed as a tool that wastes time and causes more harm that good. This is true even though users are spending a significant portion of their day dealing with . Sixty-five percent of users spend at least a quarter of their working day on writing, reading, or otherwise dealing with , and 25% of users spend more than half. It s little wonder users are spending so much of their day on , as 83% receive at least 20 message per day, with 26% receiving 60 or more. This is not to say that use is totally problem free. users are fed up with spam (and the tools used to deal with it in some cases), with over 15% of respondents commenting on unwanted messages. One respondent noted our spam filtering hinders as much as it helps, and another that spamming is such a productivity eater. Conclusion ranks up there as one of the most significant technologies that has transformed the way we work, play, and structure our day. Ubiquity in use, however, does not mean we are managing and other communications technologies in the best ways possible. , like all sorts of other communication technologies, burst into use in business and grew almost unfettered until we realized that harnessing the technology meant serious management of a wide variety of new issues. With use came comfort with the new technology. With comfort came new, more significant uses of the technology. Today real business of all types is routinely done in . But, organizations have not evolved far enough, fast enough in they way they control and manage use AIIM International and Kahn Consulting, Inc.
9 About The Authors Randolph Kahn is the coauthor of the recently published book Rules and an internationally recognized authority on the legal, compliance, and policy issues of information technology and information management, and trusted advisor and consultant to Fortune 500 companies, governmental agencies, and court systems. As founder and principal of Kahn Consulting, Inc., ( Mr. Kahn leads a team of information management, regulatory, compliance, technology, and policy professionals who serve as consultants and advisors to major institutions around the globe. Mr. Kahn, conducts numerous seminars and training programs for thousands of participants at corporate and government institutions and member organizations each year. He teaches Legal Issues in Records and Information Management at George Washington University and has authored dozens of published works. Barclay T. Blair leads the Technology Consulting operations for Kahn Consulting. Mr. Blair has a broad information technology background, with extensive expertise in the technology and policy considerations of information management, information security, public key infrastructure, XML, online transactions, and related topics. He is a Rapporteur within the Information Security Committee of the American Bar Association (ABA), and an editor of the ABA s PKI Assessment Guidelines, published in 2003 after more than five years of drafting. Mr. Blair has authored and edited dozens of publication and has spoken internationally about information technology and security matters. About AIIM International AIIM International is the global authority on enterprise content management (ECM). ECM technologies, tools and methods used to capture, manage, store, preserve, and deliver information to support business processes. AIIM promotes the understanding, adoption, and use of ECM technologies through education, networking, marketing, research, standards, and advocacy programs. As a neutral and unbiased source of information, AIIM is uniquely positioned as a 501(c) 6 non-profit association dedicated to growing the Enterprise Content Management Industry through its: Market Education: Expand the global market for ECM solutions. Provide educational programs and information services that help users make informed and effective technology decisions and help suppliers better understand user needs and requirements. Networking: Through chapters, programs, and the Web, create opportunities that expand the global base of users seeking ECM solutions and allow our user, supplier, and channel members to engage and connect with one another. Industry Advocacy: Through our own efforts and strategic partnerships, become the global voice of the ECM industry in key standards organizations, with the media, and with government decision-makers. The AIIM community has a variety of opportunities for you. Visit us on our Web site at AIIM International and Kahn Consulting, Inc. 9
KAHN CONSULTING INC.
A Summary of Findings from User Research on Compliance and Information Management Authored by John F. Mancini President, AIIM International The Emperor s New Clothes: The Current State of Information Management
Outbound Email Security and Content Compliance in Today s Enterprise, 2005
Outbound Email Security and Content Compliance in Today s Enterprise, 2005 Results from a survey by Proofpoint, Inc. fielded by Forrester Consulting on outbound email content issues, May 2005 Proofpoint,
Industry Watch. I m From ECM, You re From BPM
Industry Watch A Summary of Survey Findings on End User Perceptions of the Connections between Enterprise Content Management (ECM) and Business Process Management (BPM)Technologies I m From ECM, You re
The Risk-Cost Retention Model: Randolph A. Kahn, Esq. At the Core
The Risk-Cost Retention Model: A New Approach to Records Retention Bringing all stakeholders to the table to discuss the risk and cost involved in retention decisions allows a company to create the best
E-Commerce compliance and the Four C's of Business
Compliance: It s Real, It s Relevant, and It s More Than Just Records AIIM Industry Watch Survey Prepared by John F. Mancini, President, AIIM 2006 1100 Wayne Avenue Suite 1100 Silver Spring, MD 20910 301-587-8202
Integrated email archiving: streamlining compliance and discovery through content and business process management
Make better decisions, faster March 2008 Integrated email archiving: streamlining compliance and discovery through content and business process management 2 Table of Contents Executive summary.........
GUIDE TO ACHIEVING EMAIL COMPLIANCE a South African perspective
GUIDE TO ACHIEVING EMAIL COMPLIANCE a South African perspective Abstract This document highlights some of the South African rules and regulations that require the effective management of email. It looks
Smart Policies for Workplace Technologies Email, Blogs, Cell Phones & More
Smart Policies for Workplace Technologies Email, Blogs, Cell Phones & More By Lisa Guerin, J.D. Nolo, 2011, ISBN:1-4133-1326-0 Price $26.95, pp. 225 pages Reviewed by Nina T. Dow Journal of High Technology
A 123Together.com White Paper. Microsoft Exchange Server: To Outsource Or Not To Outsource The affordable way to bring Exchange to your company.
Microsoft Exchange Server: To Outsource Or Not To Outsource The affordable way to bring Exchange to your company. Table of Contents Introduc on... 3 Microso Exchange Server Delivers Value Your Company
Netskope Cloud Report. Report Highlights. cloud report. Three of the top 10 cloud apps are Storage, and enterprises use an average of 26 such apps
cloud report JAN 2014 Netskope Cloud Report In the second Netskope Cloud Report, we ve compiled the most interesting trends on cloud app adoption and usage based on aggregated, anonymized data from the
Electronic And Digital Signatures
Electronic And Digital Signatures Summary The advent of e-government and e-services is changing the way we do business. Traditionally, we created records on paper and we authenticated a record by signing
22 Questions You Should Ask Your Computer Consultant
22 Questions You Should Ask Your Computer Consultant BEFORE HIRING THEM TO SUPPORT YOUR NETWORK Stuart J. Bryan I-M TECHNOLOGY, LLC 131 PROVIDENCE STREET, TAFTVILLE, CT 06380 22 Questions You Should Ask
ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT
ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL COMMERCE ACT By John S. Stolz and John D. Cromie 2001 American Bar Association. Reprinted with permission On October 1, 2000, the United States took a substantial
Student use of the Internet Systems is governed by this Policy, OCS regulations, policies and guidelines, and applicable law.
OCS Internet Acceptable Use and Safety Policy for Students The Opportunity Charter School ( OCS or the School ) provides access to OCS s Internet Systems for its students for educational purposes, in conformance
Business Intelligence & Data Warehouse Consulting
Transforming Raw Data into Business Results In the rapid pace of today's business environment, businesses must be able to adapt to changing customer needs and quickly refocus resources to meet market demand.
Archiving and The Federal Rules of Civil Procedure: Understanding the Issues
Archiving and The Federal Rules of Civil Procedure: Understanding the Issues An ArcMail Technology Research Paper ArcMail Technology, Inc. 401 Edwards Street, Suite 1620 Shreveport, Louisiana 71101 www.arcmailtech.com
Organizational Policy
Approved by: City Manager/General Managers Report No.: n/a Effective: January 1, 2004 Reviewed: July 25, 2012 Amended: July 25, 2012 Next Review: July 25, 2013 Note: Purpose: on The purpose of this policy
This paper looks at current order-to-pay challenges. ECM for Order-to-Pay. Maximize Operational Excellence
J A N U A R Y 2 0 1 4 ECM for Order-to-Pay Maximize Operational Excellence This paper looks at current order-to-pay challenges and trends; what organizations should consider in an order-to-pay solution;
The IBM data governance blueprint: Leveraging best practices and proven technologies
May 2007 The IBM data governance blueprint: Leveraging best practices and proven technologies Page 2 Introduction In the past few years, dozens of high-profile incidents involving process failures and
WHITE PAPER BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION CYBER COVERAGES
BREACH, PRIVACY, AND CYBER COVERAGES: FACT AND FICTION IDT911 1 DEFINITIONS 1. Cyber Programs - Focuses on services and systems related to technology and their use in business. Risks addressed include
How Effectively Are Companies Using Business Analytics? DecisionPath Consulting Research October 2010
How Effectively Are Companies Using Business Analytics? DecisionPath Consulting Research October 2010 Thought-Leading Consultants in: Business Analytics Business Performance Management Business Intelligence
A Look at the Varied Responsibilities of Internal Auditors. internal auditing: All in a days work
ALL IN A DAY S WORK A Look at the Varied Responsibilities of Internal Auditors internal auditing: All in a days work The Institute of Internal Auditors Achieving Objectives For the most part, companies
Records Management: Seven Best Practices for Staying Ahead of the Curve
Records Management: Seven Best Practices for Staying Ahead of the Curve 2014 Table of Contents Introduction... 3 Obtain Executive Support... 3 Define A Records Management Approach... 4 Create A Clear Policy
File Sync And Share And The Future Of Work
A Forrester Consulting Thought Leadership Paper Commissioned By Dropbox March 2014 File Sync And Share And The Future Of Work Table Of Contents Executive Summary...1 Workers Are Embracing Sync And Share
State of Montana E-Mail Guidelines
State of Montana E-Mail Guidelines A Management Guide for the Retention of E-Mail Records for Montana State Government Published by the: Montana State Records Committee Helena, Montana September 2006 Based,
Enterprise Content Management. A White Paper. SoluSoft, Inc.
Enterprise Content Management A White Paper by SoluSoft, Inc. Copyright SoluSoft 2012 Page 1 9/14/2012 Date Created: 9/14/2012 Version 1.0 Author: Mike Anthony Contributors: Reviewed by: Date Revised Revision
DIOCESE OF DALLAS. Computer Internet Policy
DIOCESE OF DALLAS Computer Internet Policy October 2012 Page 1 ROMAN CATHOLIC DIOCESE OF DALLAS COMPUTER SYSTEMS AND INTERNET USE POLICY Summary Definitions: 1. The term Communication(s) Assets as used
Solving Key Management Problems in Lotus Notes/Domino Environments
Solving Key Management Problems in Lotus Notes/Domino Environments An Osterman Research White Paper sponsored by Published April 2007 sponsored by Osterman Research, Inc. P.O. Box 1058 Black Diamond, Washington
SMALL BUSINESS OWNERS and THE CANADIAN LEGAL SYSTEM
SMALL BUSINESS OWNERS and THE CANADIAN LEGAL SYSTEM Understanding small business experience and attitudes toward legal disputes Helping small business owners understand and protect themselves from unexpected
PROTECTING YOUR DIGITAL LIFE
PROTECTING YOUR DIGITAL LIFE Table of Contents What is a Digital Life?... 1 Missing: Five Years of Photos... 2 Are Your Files Safe?... 3 Everyday Risks... 4 Real People, Real Loss... 5 Forgot to Back Up?
EMAIL ARCHIVING. What it is, what it isn t, and how it can improve your business operations
EMAIL ARCHIVING What it is, what it isn t, and how it can improve your business operations OVERVIEW: Why businesses are turning to email archiving As your business grows, communication between you and
WHITEPAPER. The Death of the Traditional ECM System. SharePoint and Office365 with Gimmal can Enable the Modern Productivity Platform
1 WHITEPAPER SharePoint and Office365 with Gimmal can Enable the Modern Productivity Platform 1 Table of Contents 1.1 Overview... 3 1.2 What are the Challenges?... 3 1.3 The Ideal The Modern Productivity
By writing to: Cougar Wireless, Attention: Customer Service, 4526 S. Regal St., Suite A, Spokane, WA., 99224
COUGAR WIRELESS ACCEPTABLE USE POLICY I. INTRODUCTION Cougar Wireless and its various affiliates and subsidiaries (collectively we, us, our ) are committed to being responsible network citizens. To assist
All Users of DCRI Computing Equipment and Network Resources
July 21, 2015 MEMORANDUM To: From Subject: All Users of DCRI Computing Equipment and Network Resources Eric Peterson, MD, MPH, Director, DCRI Secure System Usage The purpose of this memorandum is to inform
Blowing the Whistle on Accounting Fraud: The Sarbanes-Oxley Whistleblower Protections Act At A Glance
Blowing the Whistle on Accounting Fraud: The Sarbanes-Oxley Whistleblower Protections Act At A Glance A White Paper for Finance Professionals by David J. Marshall and Nicole J. Williams 1 Katz, Marshall
MEASURING SMB CUSTOMER OUTCOMES: THE DELL MANAGED SERVICES ADVANTAGE
MEASURING SMB CUSTOMER OUTCOMES: THE DELL MANAGED SERVICES ADVANTAGE Sanjeev Aggarwal, Partner Laurie McCabe, Partner Sponsored by Dell CONTENTS Introduction...3 Section 1: SMB Business and IT Challenges...3
Human Resources Policy and Procedure Manual
Procedure: maintains a computer network and either purchases software for use in the network or develops proprietary software systems for Company use. Company employees are generally authorized to use
Legal and Ethical Issues in Computer Security
Legal and Ethical Issues in Computer Security Prepared By: Rusul M. Kanona Supervised By: Dr. Lo a i A.Tawalbeh Arab Academy for Banking & Financial Sciences (AABFS) Fall 2007 :Objectives for this session
The Disconnect Between Legal and IT Teams
WHEPAPER The Disconnect Between and Teams Examples of what each side doesn t know #2 in a series of 4 whitepapers. Circulate this document to,, and company management. It can be used to start a dialog,
Computer Security Log Files as Evidence
Product Evaluation: ArcSight ESM www.kahnconsultinginc.com Computer Security Log Files as Evidence An Evaluation of ArcSight ESM I. Executive Summar y It is the opinion of Kahn Consulting, Inc., that ArcSight
Real World Strategies for Migrating and Decommissioning Legacy Applications
Real World Strategies for Migrating and Decommissioning Legacy Applications Final Draft 2014 Sponsored by: Copyright 2014 Contoural, Inc. Introduction Historically, companies have invested millions of
Understanding Your Ethics & Code of Conduct Training Requirements. May 29, 2008
Understanding Your Ethics & Code of Conduct Training Requirements May 29, 2008 Shanti Atkins, Esq. President & CEO of ELT. Specialist in online ethics and legal compliance training. Advises clients across
SUSTAINABILITY & EMPLOYEE ENGAGEMENT
SUSTAINABILITY & EMPLOYEE ENGAGEMENT The State of The Art By John Davies VP Senior Analyst, GreenBiz September 2014 Finding Common Ground with HR Sustainability professionals usually think of their challenges
How To Choose and Use a Risk Management Consultant
How To Choose and Use a Risk Management Consultant A WHITE PAPER FOR ORGANIZATIONS CONSIDERING THE SERVICES OF A RISK MANAGEMENT CONSULTANT Warren, McVeigh & Griffin, Inc. R I S K M A N A G E M E N T C
Mobilize SharePoint Securely: Top 5 Enterprise Requirements
AN ACCELLION WHITE PAPER Mobilize SharePoint Securely: Top 5 Enterprise Requirements Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto,
GETTING YOUR BUSINESS STARTED ON THE INTERNET
GETTING YOUR BUSINESS STARTED ON THE INTERNET The Internet presents a new frontier with unlimited potential. The purpose of this Guide is to ensure that legal issues are properly considered to provide
Read this guide and you ll discover:
BUSINESS ADVISOR REPORT Provided as an educational service by: Rick Reynolds, General Manager Read this guide and you ll discover: What remote, offsite, or managed backups are, and why EVERY business should
Revised: 6-04, 8-09, 1-12 REGULATION #5420
Adopted: 9-03 PORTAGE PUBLIC SCHOOLS Revised: 6-04, 8-09, 1-12 REGULATION #5420 SUBJECT: Electronic Communications, Internet Safety & Acceptable Use Agreement All PPS electronic information resources are
Embedded Network Solutions Australia Pty Ltd (ENSA) INTERNET ACCEPTABLE USE POLICY
T: 1300 00 ENSA (3672) F: 03 9421 6109 (ENSA) INTERNET ACCEPTABLE USE POLICY 1 ABOUT THIS POLICY... 2 2 GENERAL... 2 3 ILLEGAL ACTIVITY... 2 4 SECURITY... 2 5 RISKS OF THE INTERNET... 3 6 CONTENT PUBLISHING...
Troy Cablevision, Inc. Subscriber Privacy Policy
Troy Cablevision, Inc. Subscriber Privacy Policy Troy Cablevision, Inc. ( Troy Cable ) is committed to protecting and securely maintaining our customers privacy. The following privacy policy applies to
Key Steps Before Talking to Venture Capitalists
Key Steps Before Talking to Venture Capitalists Some entrepreneurs may not be familiar with raising institutional capital to grow their businesses. Expansion plans beyond common organic growth are typically
A SENSIBLE GUIDE TO LATENCY MANAGEMENT
A SENSIBLE GUIDE TO LATENCY MANAGEMENT By Wayne Rash Wayne Rash has been writing technical articles about computers and networking since the mid-1970s. He is a former columnist for Byte Magazine, a former
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT
MEMORANDUM INFORMATION TECHNOLOGY SERVICES DEPARTMENT TO: John Phillips, City Manager Number: 04-020 SUBJECT: Computer Network, Internet and E-Mail Access Policy Date: 9/903 Attached is copy of the Information
Data Management in the Cloud Era
In This Paper In cloud environments, using multiple point products for data management often results in diminishing returns Single-vendor solutions enable enterprises to leverage their cloud investments
retained in a form that accurately reflects the information in the contract or other record,
AL 2004 9 O OCC ADVISORY LETTER Comptroller of the Currency Administrator of National Banks Subject: Electronic Record Keeping TO: Chief Executive Officers of All National Banks, Federal Branches and Agencies,
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students
Reynoldsburg City Schools Computer and Technology Acceptable Use Policy Staff, Volunteers and Students AUP Sections 1. Acceptable Use 2. Privileges 3. Internet Access 4. Procedures & Caveats 5. Netiquette
Acceptable Use of ICT Policy For Staff
Policy Document Acceptable Use of ICT Policy For Staff Acceptable Use of ICT Policy For Staff Policy Implementation Date Review Date and Frequency January 2012 Every two Years Rev 1: 26 January 2014 Policy
Information Security Plan effective March 1, 2010
Information Security Plan effective March 1, 2010 Section Coverage pages I. Objective 1 II. Purpose 1 III. Action Plans 1 IV. Action Steps 1-5 Internal threats 3 External threats 3-4 Addenda A. Document
YOUR MONEY, YOUR GOALS. A financial empowerment toolkit for Social Services programs
YOUR MONEY, YOUR GOALS A financial empowerment toolkit for Social Services programs Consumer Financial Protection Bureau April 2015 Table of contents MODULE 1: Introduction to the toolkit...1 An introduction
INSTANT MESSAGING SECURITY
INSTANT MESSAGING SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part
E-invoices. What they are. Different types. Best practices for implementation. R E A D S O F T W H I T E P A P E R
R E A D S O F T W H I T E P A P E R E-invoices What they are. Different types. Best practices for implementation. This whitepaper describes different types of e-invoices, discusses what the differences
COMPUTER, INTERNET, & EMAIL USE POLICY
COMPUTER, INTERNET, & EMAIL USE POLICY SECTION ONE. PURPOSE A. To remain competitive, better serve our Students and provide our employees with the best tools to do their jobs, Jersey City Global Charter
ESG Report. Data Protection Strategies for SMBs. By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group.
By Heidi Biggar Storage Analyst, Data Protection Enterprise Strategy Group April, 2007 Copyright 2007. The Enterprise Strategy Group, Inc. All Rights Reserved. Table of Contents ESG Report Table of Contents...
Introduction to VoIP for Small and Medium Sized Businesses
Introduction to VoIP for Small and Medium Sized Businesses Understanding the Options and Opportunities April 17th, 2007 Notice Copyright 2009 Metaswitch Networks. All rights reserved. Other brands and
IT Security Management 100 Success Secrets
IT Security Management 100 Success Secrets 100 Most Asked Questions: The Missing IT Security Management Control, Plan, Implementation, Evaluation and Maintenance Guide Lance Batten IT Security Management
IT Roles in Loss Prevention. Presented by: Ann Ostrander, Director of Loss Prevention Kirkland & Ellis LLP
IT Roles in Loss Prevention Presented by: Ann Ostrander, Director of Loss Prevention Kirkland & Ellis LLP What is Loss Prevention (Risk Management)? Mitigate risk Protect the Firm s assets Departments
File-Sharing in the Legal Industry Survey uncovers disconnect between security fears and the everyday practices that can leave firms open to breaches
File-Sharing in the Legal Industry Survey uncovers disconnect between security fears and the everyday practices that can leave firms open to breaches Business of Law Insights Report About the Survey The
INTRODUCTION. Ryan White, Vice President of Business Development, DTI Integrated Business Solutions
DEVELOPING AN ENTERPRISE VISION FOR CONTENT MANAGEMENT Ryan White, Vice President of Business Development, DTI Integrated Business Solutions EXECUTIVE OVERVIEW The amount of content organizations create,
E-Mail Security. on your terms SOFTSCAN
E-Mail Security on your terms SOFTSCAN With fraudulent and offensive emails delivered in vast quantities to businesses every day a foolproof email security system is essential. Setting the standards SoftScan
plantemoran.com What School Personnel Administrators Need to know
plantemoran.com Data Security and Privacy What School Personnel Administrators Need to know Tomorrow s Headline Let s hope not District posts confidential data online (Tech News, May 18, 2007) In one of
