The Business-Technology Weave:

acceptable use policy

September 30, 2010  9:38 AM

Budget Cuts Impacting Cybersecurity

Posted by: David Scott
acceptable use, acceptable use policy, business plans, business policy, business security, CISO, content management, cyber security, cybersecurity, data breach, data theft, Deloitte, IT plans, IT security, NASCIO


It’s being reported that state budgets, increasingly in the red, are impacting cybersecurity – and not in a good way, as you may have...

September 10, 2010  12:27 PM

Check Your Acceptable Use Policy – Is This Missing?

Posted by: David Scott
acceptable use, acceptable use policy, business policy, business security, computer security, inappropriate use, IT policy, IT security, unacceptable use

In reviewing some Acceptable Use policies, I’ve noticed the usual cautions about adherence to authorized access, the caveats about protecting your ID...

July 12, 2010  9:17 AM

Business Communication in the Electronic Age

Posted by: David Scott
acceptable use policy, business communication, communications policy, corporate communication policy, e-mail, electronic communication, wireless communication


Communication has suffered in the...

June 24, 2010  1:49 PM

Enterprise IT: Users Re-define “Workaround” in Using Unsupported and Disallowed Devices, Apps

Posted by: David Scott
acceptable use policy, business security, cisco, disaster recovery, InsightExpress, IT security, security policy

 On June 24th, Cisco released survey results regarding use of social networking sites and the use of personal devices in the workplace.  (Conducted by InsightExpress).

  Bookmark and Share     0 Comments     RSS Feed     Email a friend

June 20, 2010  1:24 PM

Social Networking and the Workplace

Posted by: David Scott
acceptable use policy, bebo, business security, business-technology weave, content management, facebook, friendster, hi5, IT security, myspace, social networking, social networks

  Increasingly I see articles about “young” employees lobbying managers and senior executives about using social networking sites for work-related activity. These sites generally comprise (perhaps compromise?) a mash of party pics, all manner of stream-of-consciousness...

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: