SlideShare a Scribd company logo
1 of 1
Download to read offline
IM COMPLIANCE REGULATIONS
WITH CORPORATE
EVOLVING
& WHY COMPANIES USE THEM
FEATURES & BENEFITS OF CORPORATE IM
• Real-time Communication
• More immediate, less time consuming than email
• Less disruptive than phone
• Allows group collaboration, replacing long email chains
• Detects presence
• Can send files and attach/preserve with the converastion msp
• Saves server space (over email)
• Easy to implement – few barriers to entry or use
• Available on multiple devices - desktop/mobile/tablet
THE EVOLUTION OF CORPORATE IM USAGE
Worldwide IM accounts are expected to grow from over 3.4 billion
in 2013 to over 4.4 billion by year-end 2017, representing an
average growth rate of about 7%.
One in three IM users now utilize IM as much or more than e-mail,
and many predict that IM usage will outstrip e-mail usage within
the next few years.
85%
More than 85% of all businesses and organizations now
make use of IM.
20-25% report improvement in productivity.
TWO CORPORATE VENDORS
• Integration across MS IT Suite (coexist plan)
• Can deploy for IM/Presence and ad-hoc
web-conferencing then expand later to VOIP Network
• IM/Presence
• Can use strictly as a soft phone, or strictly as IM/P,
or both
• Cloud and On-Premise solutions offered
• Can provide IM/P to inter/intra domain federations with other
enterprise systems
• Lync Skype federation allows users to IM/P & talk
between the two • Integration into other Collaboration products such as WebEx,
Calendar, and MS Office
• Can easily escalate communications from IM/P to
voice to video to WebEx meeting
GENERAL IM CONVERSATION REGULATIONS
30% of companies using IM have a
way of tracking and archiving these
communications
40% of companies polled do not have
a system of keeping the history or a
searchable archive in-house
IM is often overlooked as a crucial
piece of information management
30% 40%
!
Simply blocking all IM or P2P services would place these businesses at a competitive disadvantage in the marketplace. The preferred
solution is to allow properly controlled use of these services.
AvailabilityConfidentiality Integrity
Excess litigation costs Loss of customer
confidence
Loss of intellectual
property
The top three information governance failure risks
Maintain, protect, and
assess compliance issues
Establish and
implement controls
Identify and remediate
vulnerabilities and deviations
Provide reporting
that can prove your
organization's compliance
At the heart of most regulations is the intention of protecting the
information that impacts a corporation's stakeholders
These laws can be distilled down to their essential goals
INDUSTRY SPECIFIC REGULATIONS
Regulated industries are required to preserve and keep accessible and expanding volume of records across endless systems used for
internal communications and customers.
Financial Services - FINRA
Requires that all instant messages
be retained and retrievable
Government – Freedom of
Information Acts
Requires that agencies produce
copies of instant messages upon
requests
General Business
Requires you to produce records
within a reasonable time frame
upon receipt of a subpoena or
other valid request
WHAT DOES IT TRULY TAKE TO BE COMPLIANT MPS WITH THESE MANDATES?
DOES SIMPLY STORING RECORDS IN A DATABASE MAKE YOU COMPLIANT? NO!
Compliant!
Audit Trail
Prove your records are
complete and unmodified
Digital Signatures
Verify the integrity
of your records
Compatibility with third-party
compliance products
Integrate your IM compliance
solution to one platform for
UC compliance
Access/Security
Manage identities and
authenticate users
Delegation of Duties
Assign administrative and
end-user rights/roles to your records
Legal Hold/Litigation Hold
Save your records indefinitely,
overriding other controls
Compliance Warning Message
Alert users that their instant
messages will be stored; trigger
alerts/controls when security
or compliance is breached
!
As you can see, compliance requires much
more than just storage. It is critical that you
research your options before settling on a free
or low cost solution. The true cost of the wrong
solution can be enormous.
For more information
about ISI’s IM Compliance:
WWW.ISI-INFO.COM
© Copyright 2015 ISI Telemanagement Solutions, Inc. 1051 Perimeter Dr, Ste 200 Schaumburg, IL 60173

More Related Content

What's hot

Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Corporation
 
Ciepd board 25.5.10 item 3c privacy t kirkham
Ciepd board 25.5.10 item 3c privacy t kirkham Ciepd board 25.5.10 item 3c privacy t kirkham
Ciepd board 25.5.10 item 3c privacy t kirkham stuartwood555
 
The Next Disruptive Technology
The Next Disruptive TechnologyThe Next Disruptive Technology
The Next Disruptive TechnologyRachelMullett
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
McAfee EMM vs. Good Competitive Reviews
McAfee EMM vs. Good Competitive ReviewsMcAfee EMM vs. Good Competitive Reviews
McAfee EMM vs. Good Competitive ReviewsSholeh Gregory
 
Visitor management system
Visitor management systemVisitor management system
Visitor management systemmikeecholscyber
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise MobilitySymantec
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce appsSymantec
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challengesVineet Dubey
 
Appsian remote access_infographic
Appsian remote access_infographicAppsian remote access_infographic
Appsian remote access_infographicAppsian
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical ChallengesRam Dutt Shukla
 
2006 10 12email101106
2006 10 12email1011062006 10 12email101106
2006 10 12email101106ddiicdd
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloudkairostech
 

What's hot (15)

Courion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk AttitudesCourion Survey Findings: Access Risk Attitudes
Courion Survey Findings: Access Risk Attitudes
 
iBMACS Brochure
iBMACS BrochureiBMACS Brochure
iBMACS Brochure
 
Ciepd board 25.5.10 item 3c privacy t kirkham
Ciepd board 25.5.10 item 3c privacy t kirkham Ciepd board 25.5.10 item 3c privacy t kirkham
Ciepd board 25.5.10 item 3c privacy t kirkham
 
The Next Disruptive Technology
The Next Disruptive TechnologyThe Next Disruptive Technology
The Next Disruptive Technology
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
McAfee EMM vs. Good Competitive Reviews
McAfee EMM vs. Good Competitive ReviewsMcAfee EMM vs. Good Competitive Reviews
McAfee EMM vs. Good Competitive Reviews
 
Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)Guard Era Security Overview Preso (Draft)
Guard Era Security Overview Preso (Draft)
 
Visitor management system
Visitor management systemVisitor management system
Visitor management system
 
Top Risks of Enterprise Mobility
Top Risks of Enterprise MobilityTop Risks of Enterprise Mobility
Top Risks of Enterprise Mobility
 
Symantec Mobility Suite -Workforce apps
 Symantec Mobility Suite -Workforce apps Symantec Mobility Suite -Workforce apps
Symantec Mobility Suite -Workforce apps
 
security and ethical challenges
security and ethical challengessecurity and ethical challenges
security and ethical challenges
 
Appsian remote access_infographic
Appsian remote access_infographicAppsian remote access_infographic
Appsian remote access_infographic
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 
2006 10 12email101106
2006 10 12email1011062006 10 12email101106
2006 10 12email101106
 
9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud9 Things You Need to Know Before Moving to the Cloud
9 Things You Need to Know Before Moving to the Cloud
 

Similar to Evolving with Corporate IM Compliance Regulations

The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docxarnoldmeredith47041
 
Securing Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of UsersSecuring Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of UsersJon Gatrell
 
Risk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEERisk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEECanon Business CEE
 
08. icv sastanak (microsoft) nikola office 2013
08. icv sastanak (microsoft) nikola office 201308. icv sastanak (microsoft) nikola office 2013
08. icv sastanak (microsoft) nikola office 2013Menadžment Centar Beograd
 
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 201308. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013Menadžment Centar Beograd
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...Mithi SkyConnect
 
Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...Smarsh
 
Risk and compliance is a Business Strength
Risk and compliance is a Business Strength Risk and compliance is a Business Strength
Risk and compliance is a Business Strength Canon Belgium
 
OpenText SIE Integration Slideshare
OpenText SIE Integration SlideshareOpenText SIE Integration Slideshare
OpenText SIE Integration SlideshareOpenText
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityRobert Kleinschmidt
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 
The UC Journey - Seven Steps to a Unified User Experience
The UC Journey - Seven Steps to a Unified User ExperienceThe UC Journey - Seven Steps to a Unified User Experience
The UC Journey - Seven Steps to a Unified User ExperienceWainhouse Research
 
E-business application in the Supermarket sector
E-business application in the Supermarket sectorE-business application in the Supermarket sector
E-business application in the Supermarket sectorManish Ragoobeer
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationOpenText Information Exchange
 
Bab 8 (managing it services delivery)
Bab 8 (managing it services delivery)Bab 8 (managing it services delivery)
Bab 8 (managing it services delivery)Siti Mustiani
 

Similar to Evolving with Corporate IM Compliance Regulations (20)

The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
 
Securing Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of UsersSecuring Business: Strategic Enablement of Users
Securing Business: Strategic Enablement of Users
 
Risk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEERisk and compliance as a business strengh - Canon CEE
Risk and compliance as a business strengh - Canon CEE
 
08. icv sastanak (microsoft) nikola office 2013
08. icv sastanak (microsoft) nikola office 201308. icv sastanak (microsoft) nikola office 2013
08. icv sastanak (microsoft) nikola office 2013
 
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 201308. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
08. ICV sastanak (Microsoft) Nikola Šoškić OFFICE 2013
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Gov civilworkshop
Gov civilworkshopGov civilworkshop
Gov civilworkshop
 
India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...India’s Largest Municipal Corporation improves citizen service using a zero d...
India’s Largest Municipal Corporation improves citizen service using a zero d...
 
Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...Smarsh Archiving for Financial Services: Retaining and supervising electronic...
Smarsh Archiving for Financial Services: Retaining and supervising electronic...
 
Risk and compliance is a Business Strength
Risk and compliance is a Business Strength Risk and compliance is a Business Strength
Risk and compliance is a Business Strength
 
OpenText SIE Integration Slideshare
OpenText SIE Integration SlideshareOpenText SIE Integration Slideshare
OpenText SIE Integration Slideshare
 
Good for Enterprise by GMS Mobility
Good for Enterprise by GMS MobilityGood for Enterprise by GMS Mobility
Good for Enterprise by GMS Mobility
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
The UC Journey - Seven Steps to a Unified User Experience
The UC Journey - Seven Steps to a Unified User ExperienceThe UC Journey - Seven Steps to a Unified User Experience
The UC Journey - Seven Steps to a Unified User Experience
 
Optimising The Use Of IT
Optimising The Use Of IT Optimising The Use Of IT
Optimising The Use Of IT
 
E-business application in the Supermarket sector
E-business application in the Supermarket sectorE-business application in the Supermarket sector
E-business application in the Supermarket sector
 
FaceTime Web 2.0
FaceTime Web 2.0FaceTime Web 2.0
FaceTime Web 2.0
 
Securing Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the OrganizationSecuring Fax and Document Workflow: Driving Compliance in the Organization
Securing Fax and Document Workflow: Driving Compliance in the Organization
 
Unit4 ch1
Unit4 ch1Unit4 ch1
Unit4 ch1
 
Bab 8 (managing it services delivery)
Bab 8 (managing it services delivery)Bab 8 (managing it services delivery)
Bab 8 (managing it services delivery)
 

Recently uploaded

Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 

Recently uploaded (20)

Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 

Evolving with Corporate IM Compliance Regulations

  • 1. IM COMPLIANCE REGULATIONS WITH CORPORATE EVOLVING & WHY COMPANIES USE THEM FEATURES & BENEFITS OF CORPORATE IM • Real-time Communication • More immediate, less time consuming than email • Less disruptive than phone • Allows group collaboration, replacing long email chains • Detects presence • Can send files and attach/preserve with the converastion msp • Saves server space (over email) • Easy to implement – few barriers to entry or use • Available on multiple devices - desktop/mobile/tablet THE EVOLUTION OF CORPORATE IM USAGE Worldwide IM accounts are expected to grow from over 3.4 billion in 2013 to over 4.4 billion by year-end 2017, representing an average growth rate of about 7%. One in three IM users now utilize IM as much or more than e-mail, and many predict that IM usage will outstrip e-mail usage within the next few years. 85% More than 85% of all businesses and organizations now make use of IM. 20-25% report improvement in productivity. TWO CORPORATE VENDORS • Integration across MS IT Suite (coexist plan) • Can deploy for IM/Presence and ad-hoc web-conferencing then expand later to VOIP Network • IM/Presence • Can use strictly as a soft phone, or strictly as IM/P, or both • Cloud and On-Premise solutions offered • Can provide IM/P to inter/intra domain federations with other enterprise systems • Lync Skype federation allows users to IM/P & talk between the two • Integration into other Collaboration products such as WebEx, Calendar, and MS Office • Can easily escalate communications from IM/P to voice to video to WebEx meeting GENERAL IM CONVERSATION REGULATIONS 30% of companies using IM have a way of tracking and archiving these communications 40% of companies polled do not have a system of keeping the history or a searchable archive in-house IM is often overlooked as a crucial piece of information management 30% 40% ! Simply blocking all IM or P2P services would place these businesses at a competitive disadvantage in the marketplace. The preferred solution is to allow properly controlled use of these services. AvailabilityConfidentiality Integrity Excess litigation costs Loss of customer confidence Loss of intellectual property The top three information governance failure risks Maintain, protect, and assess compliance issues Establish and implement controls Identify and remediate vulnerabilities and deviations Provide reporting that can prove your organization's compliance At the heart of most regulations is the intention of protecting the information that impacts a corporation's stakeholders These laws can be distilled down to their essential goals INDUSTRY SPECIFIC REGULATIONS Regulated industries are required to preserve and keep accessible and expanding volume of records across endless systems used for internal communications and customers. Financial Services - FINRA Requires that all instant messages be retained and retrievable Government – Freedom of Information Acts Requires that agencies produce copies of instant messages upon requests General Business Requires you to produce records within a reasonable time frame upon receipt of a subpoena or other valid request WHAT DOES IT TRULY TAKE TO BE COMPLIANT MPS WITH THESE MANDATES? DOES SIMPLY STORING RECORDS IN A DATABASE MAKE YOU COMPLIANT? NO! Compliant! Audit Trail Prove your records are complete and unmodified Digital Signatures Verify the integrity of your records Compatibility with third-party compliance products Integrate your IM compliance solution to one platform for UC compliance Access/Security Manage identities and authenticate users Delegation of Duties Assign administrative and end-user rights/roles to your records Legal Hold/Litigation Hold Save your records indefinitely, overriding other controls Compliance Warning Message Alert users that their instant messages will be stored; trigger alerts/controls when security or compliance is breached ! As you can see, compliance requires much more than just storage. It is critical that you research your options before settling on a free or low cost solution. The true cost of the wrong solution can be enormous. For more information about ISI’s IM Compliance: WWW.ISI-INFO.COM © Copyright 2015 ISI Telemanagement Solutions, Inc. 1051 Perimeter Dr, Ste 200 Schaumburg, IL 60173