Compliance & Security Often Forgotten w/ UCCompliance & Security Often Forgotten w/ UC
One of the big hurdles in deploying unified communications, especially where it includes Web-based technology (think Skype, Instant Messaging, even texting), is how to tie all of that rogue communication into your compliance and security policies. That's the topic of our Whiteboard Tutorial today.
October 2, 2009
One of the big hurdles in deploying unified communications, especially where it includes Web-based technology (think Skype, Instant Messaging, even texting), is how to tie all of that rogue communication into your compliance and security policies. That's the topic of our Whiteboard Tutorial today.You can watch the video below.
;
Michael begins by stating that just being compliant doesn't go far enough. That may well be, but his points about looking at your company's acceptable use policy are even more pressing because so many of these technologies are making their way in virally, or at the behest of a customer. If you don't have a policy in place, and you aren't training people, then compliance could be out the window, especially in some more stringent industries.
Fritz Nelson is an Executive Editor at information and the Executive Producer of TechWebTV. Fritz writes about startups and established companies alike, but likes to exploit multiple forms of media into his writing.
Follow Fritz Nelson and information on Twitter, Facebook, YouTube and LinkedIn:
Twitter @fnelson @information @IWpremium
Facebook Fritz Nelson Facebook Page information Facebook Page
YouTube TechWebTV
About the Author
You May Also Like