IT managers, CIOs and business owners must be realistic about the information their enterprises generate and store, including being realistic about the risk potential that duplicated and mobile data represents. It is not that the enterprise should be afraid of allowing mobility and providing remote access solutions, but it is essential that the enterprise control the use of these solutions and how they use or interact with business data. Without a strictly enforced policy of usage and control for all devices, services and solutions “touching” business data, any legal disaster planning falls short
Preparing for Disasters of the Legal Kind
Posted by joaniemann9 under TechnologyFrom http://coopermann.com 3976 days ago
Who Voted for this Story
Subscribe
“Rachel: Great to hear! Thanks for your kind words! :)
All the Best,
Martin...”
“Thank you, Martin. That's a fantastic motto... and I couldn't agree more!...”
“Lisa: Good to hear! Thanks for your response....”
“For sure, I know I did years ago when I was working for others....”
“Lisa: I wonder if they potential employee is doing a background check on...”
Comments