The Business-Technology Weave:

acceptable use policy


June 26, 2013  11:57 AM

NSA, Surrveillance, and New Parameters for Business Liability Coverage



Posted by: David Scott
acceptable use policy, acceptable use training, securing data, security plans, security policies and plans

docThe National Security...

June 6, 2013  1:52 PM

Secret E-mail Accounts: How many does your organization have?



Posted by: David Scott
acceptable use policy, acceptable use training, content liability, content management policy, content security, e-mail, e-mail administration, e-mail breach, e-mail management, e-mail policy, e-mail security

EnvelopeRecent high-profile...


November 28, 2012  1:51 PM

Content: Business enlightenment, and knowing where we are



Posted by: David Scott
acceptable use policy, content management policy, content management system

We must realize that managing your organization’s content requires a strong, steady commitment on Business’ part, and it must in fact be Businesslead in getting this off the ground.  There must be understanding and sanction from the top.  There must be...


November 28, 2012  1:01 PM

Content: Getting it; using it; etc… Continued



Posted by: David Scott
acceptable use policy, content and systems management, content management policy

We mentioned policy last time:  Without a policy, your means of reporting on content will be less than comprehensive.  Therefore, we must develop a specific Content Management Policy that concentrates on three basic things:

     - Category of content (identifying it according...


September 2, 2012  8:47 AM

Losing Productivity? Points of diminishing return…



Posted by: David Scott
acceptable use policy, e-mail, e-mail administration, e-mail management, e-mail policy, security policies, social media

There’s seemingly no limit on time-wasting...


August 31, 2012  2:38 PM

Crucial Considerations when Going Mobile, Pt. IV – Security



Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training, acceptible use, access security, accounting, accrual of returns, AITP, AITP Columbus, allowable use, Association of Information Technology Professionals, Association of IT Professionals, backup and recovery, best business practice, best employee practice, best informaiton technology practice, best IT practice, best practice, best security practice, BIT, breach notification, breach notification rules, bring your own device, BTW, business adaptability, business agility, business alignment, business and IT policy, business and IT change, business and IT planning, business and IT solutions, business and social networking, business breach, business plans and policy, business progression, data breach, data management, enterprise resource planning, ERP, project planning, project plans, security awareness, security breach, Security Plan, security policy

Security is of prime concern in the mobile...


August 31, 2012  2:29 PM

Crucial Considerations when Going Mobile, Pt. II – Training



Posted by: David Scott
1 year plan, 5 year plan, acceptable use, acceptable use policy, acceptable use training

Most organizations already have a schedule of regularized training – both for core, mission-critial, applications as they undergo revision and update - and in accommodating new apps and business methods. Whether incorporating mobile as a formal addition to your business enablements, or in...


September 1, 2011  1:10 PM

Work Policies and Employee Compliance



Posted by: David Scott
acceptable use, acceptable use policy, acceptable use training, best business practice, best employee practice, business vulnerabilities, business vulnerability, computer security, computer use, computer vulnerabilities, computer vulnerability, content management, content management policy, content management training, employee handbook, human resources, security policy, security training, workplace compliance, workplace policies, workplace policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


May 19, 2011  12:05 PM

Yikes: Survey Says Distractions Cost Big $$$



Posted by: David Scott
acceptable use, acceptable use policy, e-mail policy, harmon.ie, mobile phone policy, uSamp, work distractions, workplace distractions

 

Many people get distracted at work.  No, seriously, they...


December 5, 2010  1:47 PM

Content, Content Management, and CM’s Delivery to Policy



Posted by: David Scott
acceptable use, acceptable use policy, CMS, content management, content management policy, content management system, HR, human resources, IT department

I was thinking of going into some explanation of Content Management Systems (CMS) for the small and medium (SMB) market.  However, I think this audience understands...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: