This is a guest post by Dana Simberkoff, AvePoint Vice President of Risk Management & Compliance...Previous posts: Assessing Risk: Is Your Compliance Plan up to the Test?
In any case, it is obvious something is not right and places these organizations at risk not to mention creating unhappy customers. I am not sure why but if we can do mash-ups of cities, real estate and many other things, why is not possible to sell these tickets in the same manner as any other seat in the house- which is clearly a regulatory requirement
This puts information at risk and can result in the disclosure of strategic, financial or personal information. Unsafe document sharing can result in failures to meet contractual or regulatory obligations due to the loss of information entrusted by partners or other stakeholders
Introduction (BYOD | MDM) Remote workers and internal or onsite workers empowered with “ bring your own device ” (BYOD) policies can push the boundaries of IT and the typical IT-driven culture. A lot of IT organizations are playing catch-up around governance and their...
This is a guest post by Dana Simberkoff, AvePoint Vice President of Risk Management & Compliance
How much effort an end-user must output to store information must be justified by risk to the organization. For example, if the end-user is storing information which will pose a risk to the company if it is not managed correctly (e.g. regulatory related documents), then an end-user will better understand the need to put more effort into metadata entry. On the other hand, if there is little risk to the information being stored, then the end-user will not want to make the extra effort
Most organizations go to great lengths to ensure only the right people have access to certain content, and that the content adheres to sometimes very strict industry and regulatory standards. Unfortunately, the leading social tools do not always comply with these strong governance, reporting and compliance standards, and organizations must take steps (sometimes very manual steps) to mitigate any risks. Historically, Microsoft has a strong record of mitigating security risks
Manage information risk and ensure compliance with business requirements. 2
This is a guest post by Dana Simberkoff, Vice President, Risk Management & Compliance, AvePoint...With this great reward, however, comes great risk
This is a guest post by Dana Louise Simberkoff, Vice President of Risk Management and Compliance , AvePoint (Note: This is part of our series “Collaborate with Confidence&rdquo