SlideShare a Scribd company logo
1 of 1
Download to read offline
IM COMPLIANCE REGULATIONS
WITH CORPORATE
EVOLVING
& WHY COMPANIES USE THEM
FEATURES & BENEFITS OF CORPORATE IM
• Real-time Communication
• More immediate, less time consuming than email
• Less disruptive than phone
• Allows group collaboration, replacing long email chains
• Detects presence
• Can send files and attach/preserve with the converastion msp
• Saves server space (over email)
• Easy to implement – few barriers to entry or use
• Available on multiple devices - desktop/mobile/tablet
THE EVOLUTION OF CORPORATE IM USAGE
Worldwide IM accounts are expected to grow from over 3.4 billion
in 2013 to over 4.4 billion by year-end 2017, representing an
average growth rate of about 7%.
One in three IM users now utilize IM as much or more than e-mail,
and many predict that IM usage will outstrip e-mail usage within
the next few years.
85%
More than 85% of all businesses and organizations now
make use of IM.
20-25% report improvement in productivity.
TWO CORPORATE VENDORS
• Integration across MS IT Suite (coexist plan)
• Can deploy for IM/Presence and ad-hoc
web-conferencing then expand later to VOIP Network
• IM/Presence
• Can use strictly as a soft phone, or strictly as IM/P,
or both
• Cloud and On-Premise solutions offered
• Can provide IM/P to inter/intra domain federations with other
enterprise systems
• Lync Skype federation allows users to IM/P & talk
between the two • Integration into other Collaboration products such as WebEx,
Calendar, and MS Office
• Can easily escalate communications from IM/P to
voice to video to WebEx meeting
GENERAL IM CONVERSATION REGULATIONS
30% of companies using IM have a
way of tracking and archiving these
communications
40% of companies polled do not have
a system of keeping the history or a
searchable archive in-house
IM is often overlooked as a crucial
piece of information management
30% 40%
!
Simply blocking all IM or P2P services would place these businesses at a competitive disadvantage in the marketplace. The preferred
solution is to allow properly controlled use of these services.
AvailabilityConfidentiality Integrity
Excess litigation costs Loss of customer
confidence
Loss of intellectual
property
The top three information governance failure risks
Maintain, protect, and
assess compliance issues
Establish and
implement controls
Identify and remediate
vulnerabilities and deviations
Provide reporting
that can prove your
organization's compliance
At the heart of most regulations is the intention of protecting the
information that impacts a corporation's stakeholders
These laws can be distilled down to their essential goals
INDUSTRY SPECIFIC REGULATIONS
Regulated industries are required to preserve and keep accessible and expanding volume of records across endless systems used for
internal communications and customers.
Financial Services - FINRA
Requires that all instant messages
be retained and retrievable
Government – Freedom of
Information Acts
Requires that agencies produce
copies of instant messages upon
requests
General Business
Requires you to produce records
within a reasonable time frame
upon receipt of a subpoena or
other valid request
WHAT DOES IT TRULY TAKE TO BE COMPLIANT MPS WITH THESE MANDATES?
DOES SIMPLY STORING RECORDS IN A DATABASE MAKE YOU COMPLIANT? NO!
Compliant!
Audit Trail
Prove your records are
complete and unmodified
Digital Signatures
Verify the integrity
of your records
Compatibility with third-party
compliance products
Integrate your IM compliance
solution to one platform for
UC compliance
Access/Security
Manage identities and
authenticate users
Delegation of Duties
Assign administrative and
end-user rights/roles to your records
Legal Hold/Litigation Hold
Save your records indefinitely,
overriding other controls
Compliance Warning Message
Alert users that their instant
messages will be stored; trigger
alerts/controls when security
or compliance is breached
!
As you can see, compliance requires much
more than just storage. It is critical that you
research your options before settling on a free
or low cost solution. The true cost of the wrong
solution can be enormous.
For more information
about ISI’s IM Compliance:
WWW.ISI-INFO.COM
© Copyright 2015 ISI Telemanagement Solutions, Inc. 1051 Perimeter Dr, Ste 200 Schaumburg, IL 60173

More Related Content

What's hot

Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Corporation
 
Ciepd board 25.5.10 item 3c privacy t kirkham
Ciepd board 25.5.10 item 3c privacy t kirkham Ciepd board 25.5.10 item 3c privacy t kirkham
Ciepd board 25.5.10 item 3c privacy t kirkham stuartwood555
 
The Next Disruptive Technology
The Next Disruptive TechnologyThe Next Disruptive Technology
The Next Disruptive TechnologyRachelMullett
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
McAfee EMM vs. Good Competitive Reviews
McAfee EMM vs. Good Competitive ReviewsMcAfee EMM vs. Good Competitive Reviews
McAfee EMM vs. Good Competitive ReviewsSholeh Gregory
 
Visitor management system
Visitor management systemVisitor management system
Visitor management systemmikeecholscyber
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce appsSymantec
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 
Appsian remote access_infographic
Appsian remote access_infographicAppsian remote access_infographic
Appsian remote access_infographicAppsian
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical ChallengesRam Dutt Shukla
 
2006 10 12email101106
2006 10 12email1011062006 10 12email101106
2006 10 12email101106ddiicdd
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloudkairostech
 

What's hot (15)

Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk Attitudes
 
iBMACS Brochure
iBMACS BrochureiBMACS Brochure
iBMACS Brochure
 
Ciepd board 25.5.10 item 3c privacy t kirkham
Ciepd board 25.5.10 item 3c privacy t kirkham Ciepd board 25.5.10 item 3c privacy t kirkham
Ciepd board 25.5.10 item 3c privacy t kirkham
 
The Next Disruptive Technology
The Next Disruptive TechnologyThe Next Disruptive Technology
The Next Disruptive Technology
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
McAfee EMM vs. Good Competitive Reviews
McAfee EMM vs. Good Competitive ReviewsMcAfee EMM vs. Good Competitive Reviews
McAfee EMM vs. Good Competitive Reviews
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Appsian remote access_infographic
Appsian remote access_infographicAppsian remote access_infographic
Appsian remote access_infographic
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 
2006 10 12email101106
2006 10 12email1011062006 10 12email101106
2006 10 12email101106
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 

Similar to Evolving with Corporate IM Compliance Regulations

The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docxarnoldmeredith47041
 
Securing Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of UsersSecuring Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of UsersJon Gatrell
 
Risk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEERisk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEECanon Business CEE
 
08. icv sastanak (microsoft) nikola office 2013
08. icv sastanak (microsoft) nikola office 201308. icv sastanak (microsoft) nikola office 2013
08. icv sastanak (microsoft) nikola office 2013Menadžment Centar Beograd
 
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 201308. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013Menadžment Centar Beograd
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...Mithi SkyConnect
 
Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...Smarsh
 
Risk and compliance is a Business Strength
Risk and compliance is a Business Strength Risk and compliance is a Business Strength
Risk and compliance is a Business Strength Canon Belgium
 
OpenText SIE Integration Slideshare
OpenText SIE Integration SlideshareOpenText SIE Integration Slideshare
OpenText SIE Integration SlideshareOpenText
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 
The UC Journey - Seven Steps to a Unified User Experience
The UC Journey - Seven Steps to a Unified User ExperienceThe UC Journey - Seven Steps to a Unified User Experience
The UC Journey - Seven Steps to a Unified User ExperienceWainhouse Research
 
E-business application in the Supermarket sector
E-business application in the Supermarket sectorE-business application in the Supermarket sector
E-business application in the Supermarket sectorManish Ragoobeer
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationOpenText Information Exchange
 
Bab 8 (managing it services delivery)
Bab 8 (managing it services delivery)Bab 8 (managing it services delivery)
Bab 8 (managing it services delivery)Siti Mustiani
 

Similar to Evolving with Corporate IM Compliance Regulations (20)

The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
 
Securing Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of UsersSecuring Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of Users
 
Risk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEERisk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEE
 
08. icv sastanak (microsoft) nikola office 2013
08. icv sastanak (microsoft) nikola office 201308. icv sastanak (microsoft) nikola office 2013
08. icv sastanak (microsoft) nikola office 2013
 
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 201308. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Gov civilworkshop
Gov civilworkshopGov civilworkshop
Gov civilworkshop
 
India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...
 
Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...
 
Risk and compliance is a Business Strength
Risk and compliance is a Business Strength Risk and compliance is a Business Strength
Risk and compliance is a Business Strength
 
OpenText SIE Integration Slideshare
OpenText SIE Integration SlideshareOpenText SIE Integration Slideshare
OpenText SIE Integration Slideshare
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
The UC Journey - Seven Steps to a Unified User Experience
The UC Journey - Seven Steps to a Unified User ExperienceThe UC Journey - Seven Steps to a Unified User Experience
The UC Journey - Seven Steps to a Unified User Experience
 
Optimising The Use Of IT
Optimising The Use Of IT Optimising The Use Of IT
Optimising The Use Of IT
 
E-business application in the Supermarket sector
E-business application in the Supermarket sectorE-business application in the Supermarket sector
E-business application in the Supermarket sector
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the Organization
 
Unit4 ch1
Unit4 ch1Unit4 ch1
Unit4 ch1
 
Bab 8 (managing it services delivery)
Bab 8 (managing it services delivery)Bab 8 (managing it services delivery)
Bab 8 (managing it services delivery)
 

Recently uploaded

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 

Recently uploaded (20)

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 

Evolving with Corporate IM Compliance Regulations

  • 1. IM COMPLIANCE REGULATIONS WITH CORPORATE EVOLVING & WHY COMPANIES USE THEM FEATURES & BENEFITS OF CORPORATE IM • Real-time Communication • More immediate, less time consuming than email • Less disruptive than phone • Allows group collaboration, replacing long email chains • Detects presence • Can send files and attach/preserve with the converastion msp • Saves server space (over email) • Easy to implement – few barriers to entry or use • Available on multiple devices - desktop/mobile/tablet THE EVOLUTION OF CORPORATE IM USAGE Worldwide IM accounts are expected to grow from over 3.4 billion in 2013 to over 4.4 billion by year-end 2017, representing an average growth rate of about 7%. One in three IM users now utilize IM as much or more than e-mail, and many predict that IM usage will outstrip e-mail usage within the next few years. 85% More than 85% of all businesses and organizations now make use of IM. 20-25% report improvement in productivity. TWO CORPORATE VENDORS • Integration across MS IT Suite (coexist plan) • Can deploy for IM/Presence and ad-hoc web-conferencing then expand later to VOIP Network • IM/Presence • Can use strictly as a soft phone, or strictly as IM/P, or both • Cloud and On-Premise solutions offered • Can provide IM/P to inter/intra domain federations with other enterprise systems • Lync Skype federation allows users to IM/P & talk between the two • Integration into other Collaboration products such as WebEx, Calendar, and MS Office • Can easily escalate communications from IM/P to voice to video to WebEx meeting GENERAL IM CONVERSATION REGULATIONS 30% of companies using IM have a way of tracking and archiving these communications 40% of companies polled do not have a system of keeping the history or a searchable archive in-house IM is often overlooked as a crucial piece of information management 30% 40% ! Simply blocking all IM or P2P services would place these businesses at a competitive disadvantage in the marketplace. The preferred solution is to allow properly controlled use of these services. AvailabilityConfidentiality Integrity Excess litigation costs Loss of customer confidence Loss of intellectual property The top three information governance failure risks Maintain, protect, and assess compliance issues Establish and implement controls Identify and remediate vulnerabilities and deviations Provide reporting that can prove your organization's compliance At the heart of most regulations is the intention of protecting the information that impacts a corporation's stakeholders These laws can be distilled down to their essential goals INDUSTRY SPECIFIC REGULATIONS Regulated industries are required to preserve and keep accessible and expanding volume of records across endless systems used for internal communications and customers. Financial Services - FINRA Requires that all instant messages be retained and retrievable Government – Freedom of Information Acts Requires that agencies produce copies of instant messages upon requests General Business Requires you to produce records within a reasonable time frame upon receipt of a subpoena or other valid request WHAT DOES IT TRULY TAKE TO BE COMPLIANT MPS WITH THESE MANDATES? DOES SIMPLY STORING RECORDS IN A DATABASE MAKE YOU COMPLIANT? NO! Compliant! Audit Trail Prove your records are complete and unmodified Digital Signatures Verify the integrity of your records Compatibility with third-party compliance products Integrate your IM compliance solution to one platform for UC compliance Access/Security Manage identities and authenticate users Delegation of Duties Assign administrative and end-user rights/roles to your records Legal Hold/Litigation Hold Save your records indefinitely, overriding other controls Compliance Warning Message Alert users that their instant messages will be stored; trigger alerts/controls when security or compliance is breached ! As you can see, compliance requires much more than just storage. It is critical that you research your options before settling on a free or low cost solution. The true cost of the wrong solution can be enormous. For more information about ISI’s IM Compliance: WWW.ISI-INFO.COM © Copyright 2015 ISI Telemanagement Solutions, Inc. 1051 Perimeter Dr, Ste 200 Schaumburg, IL 60173