Search

1 to 10 of 19
Sort by

Blog Entry
Ensuring Compliance: Information Types Your Organization Should Be Concerned About

This is a guest post by Dana Simberkoff, AvePoint Vice President of Risk Management & Compliance...Previous posts: Assessing Risk: Is Your Compliance Plan up to the Test?

Matthew Bretzius's profile image

Blog Entry
Know the Requirements

In any case, it is obvious something is not right and places these organizations at risk not to mention creating unhappy customers. I am not sure why but if we can do mash-ups of cities, real estate and many other things, why is not possible to sell these tickets in the same manner as any other seat in the house- which is clearly a regulatory requirement

Bob Larrivee's profile image

Blog Entry
Are you doing enough to stop document leaks?

This puts information at risk and can result in the disclosure of strategic, financial or personal information. Unsafe document sharing can result in failures to meet contractual or regulatory obligations due to the loss of information entrusted by partners or other stakeholders

Peter Weger's profile image

Blog Entry
SharePoint 2013 BYOD Best Practices

Introduction (BYOD | MDM) Remote workers and internal or onsite workers empowered with “ bring your own device ” (BYOD) policies can push the boundaries of IT and the typical IT-driven culture. A lot of IT organizations are playing catch-up around governance and their...

Errin O'Connor's profile image

Blog Entry
Defining Compliance for Your Organization

This is a guest post by Dana Simberkoff, AvePoint Vice President of Risk Management & Compliance

Matthew Bretzius's profile image

Blog Entry
ECM and Records Management System Design Issues Impacting End-User Change

How much effort an end-user must output to store information must be justified by risk to the organization. For example, if the end-user is storing information which will pose a risk to the company if it is not managed correctly (e.g. regulatory related documents), then an end-user will better understand the need to put more effort into metadata entry. On the other hand, if there is little risk to the information being stored, then the end-user will not want to make the extra effort

James Santangelo's profile image

Blog Entry
Governance, Reporting and Compliance Considerations as SharePoint Becomes More Social

Most organizations go to great lengths to ensure only the right people have access to certain content, and that the content adheres to sometimes very strict industry and regulatory standards. Unfortunately, the leading social tools do not always comply with these strong governance, reporting and compliance standards, and organizations must take steps (sometimes very manual steps) to mitigate any risks. Historically, Microsoft has a strong record of mitigating security risks

Christian Buckley's profile image



Blog Entry
Ensuring Compliance as Part of an Infrastructure Optimization Initiative

This is a guest post by Dana Louise Simberkoff, Vice President of Risk Management and Compliance , AvePoint (Note: This is part of our series “Collaborate with Confidence&rdquo

Matthew Bretzius's profile image