SlideShare a Scribd company logo
Acceptable Use PoliciesBalancing Productivity and Compliance“Employees expect personal internet access at work. This raises security, productivity, HR, compliance, bandwidth and legal issues which cross multiple departmental boundaries”“Organizationsneed to create, implement and monitor an Acceptable Use Policy (AUP) which governs the use of company infrastructure and which is backed up by both effective tools, regular monitoring and comprehensive training”“This presentation discusses some of the background issues that affect the management of a balanced  AUP which employees understand and works with Risk Based Regulation”Knowledgeframee-safe business
Acceptable Use PoliciesBalancing Productivity and ComplianceAs society becomes increasingly connected so professional service firms have to adapt to, and take advantage of, the business benefits of online communication, connectivity and collaboration.EmailVOIPProfessionalServices FirmMobile PhoneWeb ConferencingInstant MessagingSocial Networking
Acceptable Use PoliciesBalancing Productivity and ComplianceClients are more demandingThis change is accelerating, its scope is broadening and its impact is global.Regulatory pressures are escalatingCompetition is fierce and recruitment is increasingly difficult
Society is hooked on all-pervasive, always-on connectivity. The boundaries between work, social and leisure time are becoming nonexistent.InternetMobile PhoneWeb ConferencingVOIPSocial NetworkingI.M.PDAsE-mail
The OrganizationProductivityFor most of us, not having online access would severely impact our productivity.For a growing percentage, full time, instant, multi-device connectivity is mission critical.ConnectednessConnectedness provides a huge competitive advantage particularly if governed by an ITC Acceptable Use Policy which is integrated into its business vision and strategy.
The OrganizationDemographicsAt the same time workplace demographics are changingExisting staff members are being replaced by a new generation of knowledge workersConnectednessThey have never known a world without the internet, Google, Facebook, YouTube, text messaging and camera phones, they are naturally collaborative and connected.
60%
The OrganizationDemographicsIn order to compete for this valuable talent base every organization has to offer an always on, connected, collaborative environment At the same time workplace demographics are changingConnectednessIt has to support the way in which the “everyone, everything, everywhere, connected” generation, live and work.
VOIPWeb ConferencingText MessagingIn today's environment workers use social networking sites and online communities for business communications60%60% use social networking sitesat work5%10%25%Whilst no one doubts that connectivity, communication and collaboration tools dramatically increase knowledge worker productivity there is the realisation that these same tools increase business risks for the employer.
These changes will have a profound effect not only will you have to understand and manage these new connectivity tools but also:Manage the behaviour of users
These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:Manage the behaviour of usersbalance security and network reliability
These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:Manage the behaviour of usersMaintain employee productivity and safetybalance security and network reliability
These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:Manage the behaviour of usersEnsure compliancewith regulatory rules and guidelines.Maintain employee productivity and safetybalance security and network reliability
The risks fall into two main categories: Reputational Damagefor example, the loss of client data, IP contravention,breach of data protection law, negative tweets & blogsHR IssuesIn particular the employees’ right to work within a secure, regulated and protected online environmenttogether with developing policies and strategies which help connected employees maintain a work/life balance.
“Organizationsneed to develop a strategy, driven by the business needs of the practice which balances increased regulation, enhanced security and improved productivity with the social and work needs of permanently connected employees.”
Both Lexcel V4 and Risk Based Regulation from the SRA impose additional monitoring and reporting burdens on law firms.LexcelV4SRA
Both Lexcel V4 and Risk Based Regulation from the SRA impose additional monitoring and reporting burdens on law firms.LexcelV4RegulatoryBurdenSRA
Both internal governance and exterior regulation impose additional monitoring and reporting burdens .InternalRegulatoryCostRegulatoryBurdenRegulation in particular appears to be moving away from the “yearly snapshot” approach to a continuous monitoring model with a form of credit scoring applied in real time.External
This impacts costs and possibly even ability to attract clients and recruit talent.There is, therefore, a direct link between a clearly written Acceptable Use Policy, continuous compliance monitoring and profit.
Being compliant is a business imperative. However monitoring and managing ongoing compliance together with reporting to regulators has the potential to take up valuable management time.e-safe business reconciles Acceptable Use with Lexcel V4 and Risk Based Regulation to provide a largely automated monitoring, managing and reporting environment which addresses the issues facing growing law firms adapting to the new regulatory environment.
Client Confidentiality
Data Security
Avoiding discriminationAUPE-safeMonitoring&ReportingStrategic Risks
Operational Risks
Regulatory Risks
Business Management
 Equality & Diversity
 Risk Based Regulatione-safe business reconciles the Acceptable Use Policy with Risk Based Regulation to provide a largely automated monitoring, managing and reporting environment which addresses the issues faced in addressing the ever expanding regulatory environment.
Lexcel/LSC/SRA01.Lexcel V4Strategic Risks
Operational Risks
Regulatory RisksLexcel V44A.4 e-mail policy4A-5 website use4A.6 internet useAUPE-safeMonitoring&ReportingThere is overlap between Lexcel, LSC and SRA rules and guidelines.e-safe business from eSafe Systems

More Related Content

PPT
Network GRC Delivery
PDF
The impact of mobile devices on information security
PPSX
Meraj Ahmad - Information security in a borderless world
PPTX
Top Risks of Enterprise Mobility
PDF
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
PDF
Unlocking High Fidelity Security
PDF
EMA Megatrends in Cyber-Security
PPT
Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...
Network GRC Delivery
The impact of mobile devices on information security
Meraj Ahmad - Information security in a borderless world
Top Risks of Enterprise Mobility
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
Unlocking High Fidelity Security
EMA Megatrends in Cyber-Security
Fortifying for the future: Insights from the 2014 IBM Chief Information Secur...

What's hot (20)

PDF
ultimate-guide-to-getting-started-with-appsec-veracode
PDF
Ultimate_Guide_to_getting_started_with_AppSec
PPTX
Wearables and Internet of Things (IoT) - MWC15
PDF
Pulse 2013 - How to run a successful BYOD initiative
PDF
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
PDF
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
PDF
CyberSecurity Update Slides
PPT
Security architecture rajagiri talk march 2011
PPTX
How will social media and other new technologies impact our industry the next...
PDF
State of Security McAfee Study
PPTX
Securing the Digital Economy: Reinventing the Internet for Trust
PDF
The advantages of Cloud Application Control
PDF
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
PDF
application-security-fallacies-and-realities-veracode
PDF
INFOGRAPHIC: The Evolution of Data Privacy
PDF
2014 Data Breach Industry Forecast
PDF
Mobile Device Management Service: Yamana
PDF
Best practices for mobile enterprise security and the importance of endpoint ...
PPTX
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
PPTX
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
ultimate-guide-to-getting-started-with-appsec-veracode
Ultimate_Guide_to_getting_started_with_AppSec
Wearables and Internet of Things (IoT) - MWC15
Pulse 2013 - How to run a successful BYOD initiative
#EPICFAIL: The biggest mistakes with mobile initiatives and how to avoid them
Perception Gaps in Cyber Resilience: What Are Your Blind Spots?
CyberSecurity Update Slides
Security architecture rajagiri talk march 2011
How will social media and other new technologies impact our industry the next...
State of Security McAfee Study
Securing the Digital Economy: Reinventing the Internet for Trust
The advantages of Cloud Application Control
Managing Cyber Risk: Are Companies Safeguarding Their Assets?
 
application-security-fallacies-and-realities-veracode
INFOGRAPHIC: The Evolution of Data Privacy
2014 Data Breach Industry Forecast
Mobile Device Management Service: Yamana
Best practices for mobile enterprise security and the importance of endpoint ...
Exploring Consumer Attitudes & Actions on Key Tech Policy Issues 2014
SolarWinds Federal Webinar: Government Cyber Security Survey: What you told us
Ad

Viewers also liked (16)

PDF
Komm 2.0
PPT
Protection for Single PCs
PPT
Audit PC content
PDF
Boses Ng Kabataan Competition Paper
PPT
大學生之於吃
PPTX
Presentation1
PDF
Free software
PDF
Präs baujournal
PPTX
Regio alueyhteistyömalli 2012
PDF
Lenguajes programacionalternativos
PPT
Llibre ksandra
PDF
Präs plank
ODP
C:\Fakepath\Impress
PDF
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802
PPTX
19271931 dove-final-presentation-1
PPTX
X ray diffraction
Komm 2.0
Protection for Single PCs
Audit PC content
Boses Ng Kabataan Competition Paper
大學生之於吃
Presentation1
Free software
Präs baujournal
Regio alueyhteistyömalli 2012
Lenguajes programacionalternativos
Llibre ksandra
Präs plank
C:\Fakepath\Impress
Hk yhdessäolon taidot ja toimivan ryhmäytymisen kor2802
19271931 dove-final-presentation-1
X ray diffraction
Ad

Similar to Va\\lue of e-safebusiness solutions (20)

PDF
CyberSecurityCompliance-Aug2016-V10 (002) final
PDF
IT Guide for Mobility: Making the case for Security leaders
PDF
Cyber Risk Quantification | Safe Security
PDF
Power your businesswith risk informed decisions
PDF
Selling Your Organization on Application Security
PDF
Integrating-Cyber-Security-for-Increased-Effectiveness
PDF
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
PDF
Responding to the Pandemic: Information Security and Technology Trends
PDF
Why Do We Need To Secure Web Applications.pdf
PDF
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
PDF
Top 6 Web Application Security Best Practices.pdf
PDF
ICT eGuide: Switching foundation technology for better cyber security
PDF
Risk & Compliance Outlook 2011
PPTX
HUMAN FACTOR AND IT/OT CORRELATION
PDF
S sdlc datasheet q1-2015 v fnl
PDF
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
PDF
Business Innovation and ICT Strategies Sriram Birudavolu
PDF
Level Up to a Seamless End-User Experience
PDF
A security requirement quality
PDF
CyberSecurityCompliance-Aug2016-V10 (002) final
IT Guide for Mobility: Making the case for Security leaders
Cyber Risk Quantification | Safe Security
Power your businesswith risk informed decisions
Selling Your Organization on Application Security
Integrating-Cyber-Security-for-Increased-Effectiveness
IT Security at the Speed of Business: Security Provisioning with Symantec Dat...
Responding to the Pandemic: Information Security and Technology Trends
Why Do We Need To Secure Web Applications.pdf
Business-Driven Identity and Access Governance: Why This New Approach Matters
 
Top 6 Web Application Security Best Practices.pdf
ICT eGuide: Switching foundation technology for better cyber security
Risk & Compliance Outlook 2011
HUMAN FACTOR AND IT/OT CORRELATION
S sdlc datasheet q1-2015 v fnl
Clearswift f5 information_visibility_reducing_business_risk_whitepaper
Business Innovation and ICT Strategies Sriram Birudavolu
Level Up to a Seamless End-User Experience
A security requirement quality

Va\\lue of e-safebusiness solutions

  • 1. Acceptable Use PoliciesBalancing Productivity and Compliance“Employees expect personal internet access at work. This raises security, productivity, HR, compliance, bandwidth and legal issues which cross multiple departmental boundaries”“Organizationsneed to create, implement and monitor an Acceptable Use Policy (AUP) which governs the use of company infrastructure and which is backed up by both effective tools, regular monitoring and comprehensive training”“This presentation discusses some of the background issues that affect the management of a balanced AUP which employees understand and works with Risk Based Regulation”Knowledgeframee-safe business
  • 2. Acceptable Use PoliciesBalancing Productivity and ComplianceAs society becomes increasingly connected so professional service firms have to adapt to, and take advantage of, the business benefits of online communication, connectivity and collaboration.EmailVOIPProfessionalServices FirmMobile PhoneWeb ConferencingInstant MessagingSocial Networking
  • 3. Acceptable Use PoliciesBalancing Productivity and ComplianceClients are more demandingThis change is accelerating, its scope is broadening and its impact is global.Regulatory pressures are escalatingCompetition is fierce and recruitment is increasingly difficult
  • 4. Society is hooked on all-pervasive, always-on connectivity. The boundaries between work, social and leisure time are becoming nonexistent.InternetMobile PhoneWeb ConferencingVOIPSocial NetworkingI.M.PDAsE-mail
  • 5. The OrganizationProductivityFor most of us, not having online access would severely impact our productivity.For a growing percentage, full time, instant, multi-device connectivity is mission critical.ConnectednessConnectedness provides a huge competitive advantage particularly if governed by an ITC Acceptable Use Policy which is integrated into its business vision and strategy.
  • 6. The OrganizationDemographicsAt the same time workplace demographics are changingExisting staff members are being replaced by a new generation of knowledge workersConnectednessThey have never known a world without the internet, Google, Facebook, YouTube, text messaging and camera phones, they are naturally collaborative and connected.
  • 7. 60%
  • 8. The OrganizationDemographicsIn order to compete for this valuable talent base every organization has to offer an always on, connected, collaborative environment At the same time workplace demographics are changingConnectednessIt has to support the way in which the “everyone, everything, everywhere, connected” generation, live and work.
  • 9. VOIPWeb ConferencingText MessagingIn today's environment workers use social networking sites and online communities for business communications60%60% use social networking sitesat work5%10%25%Whilst no one doubts that connectivity, communication and collaboration tools dramatically increase knowledge worker productivity there is the realisation that these same tools increase business risks for the employer.
  • 10. These changes will have a profound effect not only will you have to understand and manage these new connectivity tools but also:Manage the behaviour of users
  • 11. These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:Manage the behaviour of usersbalance security and network reliability
  • 12. These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:Manage the behaviour of usersMaintain employee productivity and safetybalance security and network reliability
  • 13. These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:Manage the behaviour of usersEnsure compliancewith regulatory rules and guidelines.Maintain employee productivity and safetybalance security and network reliability
  • 14. The risks fall into two main categories: Reputational Damagefor example, the loss of client data, IP contravention,breach of data protection law, negative tweets & blogsHR IssuesIn particular the employees’ right to work within a secure, regulated and protected online environmenttogether with developing policies and strategies which help connected employees maintain a work/life balance.
  • 15. “Organizationsneed to develop a strategy, driven by the business needs of the practice which balances increased regulation, enhanced security and improved productivity with the social and work needs of permanently connected employees.”
  • 16. Both Lexcel V4 and Risk Based Regulation from the SRA impose additional monitoring and reporting burdens on law firms.LexcelV4SRA
  • 17. Both Lexcel V4 and Risk Based Regulation from the SRA impose additional monitoring and reporting burdens on law firms.LexcelV4RegulatoryBurdenSRA
  • 18. Both internal governance and exterior regulation impose additional monitoring and reporting burdens .InternalRegulatoryCostRegulatoryBurdenRegulation in particular appears to be moving away from the “yearly snapshot” approach to a continuous monitoring model with a form of credit scoring applied in real time.External
  • 19. This impacts costs and possibly even ability to attract clients and recruit talent.There is, therefore, a direct link between a clearly written Acceptable Use Policy, continuous compliance monitoring and profit.
  • 20. Being compliant is a business imperative. However monitoring and managing ongoing compliance together with reporting to regulators has the potential to take up valuable management time.e-safe business reconciles Acceptable Use with Lexcel V4 and Risk Based Regulation to provide a largely automated monitoring, managing and reporting environment which addresses the issues facing growing law firms adapting to the new regulatory environment.
  • 27. Equality & Diversity
  • 28. Risk Based Regulatione-safe business reconciles the Acceptable Use Policy with Risk Based Regulation to provide a largely automated monitoring, managing and reporting environment which addresses the issues faced in addressing the ever expanding regulatory environment.
  • 31. Regulatory RisksLexcel V44A.4 e-mail policy4A-5 website use4A.6 internet useAUPE-safeMonitoring&ReportingThere is overlap between Lexcel, LSC and SRA rules and guidelines.e-safe business from eSafe Systems
  • 35. Equality & Diversity
  • 36. Risk Based RegulationLexcel V44A.4 e-mail policy4A-5 website use4A.6 internet useAUPE-safeMonitoring&ReportingSRARule 5.01(1)gRule 5.01(1)hRule 5.01(1)iThere is overlap between Lexcel, LSC and SRA rules and guidelines.The Acceptable Use Policy and e-safe business, work together to manage this relationship.e-safe business from eSafe Systems
  • 40. Equality & Diversity
  • 41. Risk Based RegulationLexcel V44A.4 e-mail policy4A-5 website use4A.6 internet useAUPE-safeMonitoring&ReportingLSCRule 3Rule 8Rule 9SRARule 5.01(1)gRule 5.01(1)hRule 5.01(1)i03.LSCClient Confidentiality
  • 44. E-safe business improves productivity, reduces risk and improves security by modifying user behaviour.
  • 45. E-safe business improves productivity, reduces risk and improves security by modifying user behaviour.User Monitoring – The User Monitoring Module monitors all information displayed on the workstation screen, within a Windows environment including:Applications
  • 46. Chat
  • 48. Email
  • 50. The Operating SystemE-safe business improves productivity, reduces risk and improves security by modifying user behaviour.Activity is compared with built in “Threat Libraries” which look for:Cyber bullying,
  • 54. Race,
  • 56. Sex,
  • 59. Bypassing firewalls & proxy avoidance,
  • 61. IP theft & copyright infringement.E-safe business improves productivity, reduces risk and improves security by modifying user behaviour.Image Control – Image Control intercepts images, before they are displayed on-screen and determines the images acceptability for display. This provides the greatest protection from accidental or deliberate access to inappropriate images.Image control can also block images introduced onto the network via USB or email.
  • 62. E-safe business improves productivity, reduces risk and improves security by modifying user behaviour.USB Device Management – USB device management controls the use of: memory sticks,
  • 65. mobile phones whenever an attempt is made to connect them to the network helping to prevent data theft and the introduction of viruses, worms and Trojans.
  • 66. e-safe business improves productivity, reduces risk and improves security by modifying user behaviour.Training – Deploying e-safe is not, in itself, sufficient to provide the level of control or changes in behaviour necessary to ensure your AUP is adhered to and ongoing regulatory compliance maintained and improved.It’s important that everyone in the organisation understands the reasons why e-safe business has been deployed and how non compliance with rules impacts reputation, costs and profit.e-safe provides comprehensive training showing how to introduce e-safe business and configure it to provide the level of protection you need.
  • 67. e-safe business can be installed onto your networkOr provided as a managed service from our UK based servers with fully qualified and accredited support