IT managers, CIOs and business owners must be realistic about the information their enterprises generate and store, including being realistic about the risk potential that duplicated and mobile data represents. It is not that the enterprise should be afraid of allowing mobility and providing remote access solutions, but it is essential that the enterprise control the use of these solutions and how they use or interact with business data. Without a strictly enforced policy of usage and control for all devices, services and solutions “touching” business data, any legal disaster planning falls short
Preparing for Disasters of the Legal Kind
Posted by joaniemann9 under TechnologyFrom http://coopermann.com 4173 days ago
Who Voted for this Story
Subscribe
Comments