Corporate and regulatory compliance policies have forced companies to ensure that information flows are documented, auditable, and highly secure. Yet in order to conduct their business, companies must share sensitive information outside the firewall, introducing serious potential information risk. This white paper poses ten questions to help indentify compliance risks and explores mitigation strategies and best practices suitable for each scenario.
Related Items
Enterprise Information Security Options for 2012
pdf Trends in Online Collaboration: When Security, Compliance and Productivity Collide