31
Acceptable Use Policies Balancing Productivity and Compliance Employees expect personal internet access at work. This raises security, productivity, HR, compliance, bandwidth and legal issues which cross multiple departmental boundaries” “Organizations need to create, implement and monitor an Acceptable Use Policy (AUP) which governs the use of company infrastructure and which is backed up by both effective tools, regular monitoring and comprehensive training” This presentation discusses some of the background issues that affect the management of a balanced AUP which employees understand and works with Risk Based Regulation” Knowledgeframe e-safe business

Va\\lue of e-safebusiness solutions

Embed Size (px)

DESCRIPTION

Acceptable Use and GRC provision in UK Legal Firms

Citation preview

Page 1: Va\\lue of e-safebusiness solutions

Acceptable Use PoliciesBalancing Productivity and Compliance

“Employees expect personal internet access at work. This raises security, productivity, HR, compliance, bandwidth and legal issues which cross multiple departmental boundaries”

“Organizations need to create, implement and monitor an Acceptable Use Policy (AUP) which governs the use of company infrastructure and which is backed up by both effective tools, regular monitoring and comprehensive training”

“This presentation discusses some of the background issues that affect the management of a balanced AUP which employees understand and works with Risk Based Regulation” Knowledgeframe

e-safe business

Page 2: Va\\lue of e-safebusiness solutions

Email

Mobile Phone

Social Networking

Web Conferencing

Instant Messaging

ProfessionalServices

Firm

VOIP

As society becomes increasingly connected so professional service firms have to adapt to, and take advantage of, the business benefits of online communication, connectivity and collaboration.

Acceptable Use PoliciesBalancing Productivity and Compliance

Page 3: Va\\lue of e-safebusiness solutions

This change is accelerating, its scope is broadening and its impact is global.

Competition is fierce and recruitment is increasingly difficult

Regulatory pressures are escalating

Clients are more demanding

Acceptable Use PoliciesBalancing Productivity and Compliance

Page 4: Va\\lue of e-safebusiness solutions

Society is hooked on all-pervasive, always-on connectivity. The boundaries between work, social and leisure time are becoming nonexistent.

Web Conferencing

Social Networking

PDAs

E-mail

Internet

Mobile Phone

VOIP

I.M.

Page 5: Va\\lue of e-safebusiness solutions

The Organization

For most of us, not having online access would severely impact our productivity.

For a growing percentage, full time, instant, multi-device connectivity is mission critical.

Connectedness

Connectedness provides a huge competitive advantage particularly if governed by an ITC Acceptable Use Policy which is integrated into its business vision and strategy.

Page 6: Va\\lue of e-safebusiness solutions

The Organization

At the same time workplace demographics are changing

Existing staff members are being replaced by a new generation of knowledge workers

Connectedness

They have never known a world without the internet, Google, Facebook, YouTube, text messaging and camera phones, they are naturally collaborative and connected.

Page 7: Va\\lue of e-safebusiness solutions

60%

Page 8: Va\\lue of e-safebusiness solutions

The Organization

At the same time workplace demographics are changing

In order to compete for this valuable talent base every organization has to offer an always on, connected, collaborative environment

Connectedness

It has to support the way in which the “everyone, everything, everywhere, connected” generation, live and work.

Page 9: Va\\lue of e-safebusiness solutions

10%

5%

60%

25%VOIP

Web ConferencingText Messaging

60% use social networking sitesat work

In today's environment workers use social networking sites and online communities for business communications

Whilst no one doubts that connectivity, communication and collaboration tools dramatically increase knowledge worker productivity there is the realisation that these same tools increase business risks for the employer.

Page 10: Va\\lue of e-safebusiness solutions

Manage the behaviour of users

These changes will have a profound effect not only will you have to understand and manage these new connectivity tools but also:

Page 11: Va\\lue of e-safebusiness solutions

balance security and network reliability

These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:

Manage the behaviour of users

Page 12: Va\\lue of e-safebusiness solutions

Maintain employee productivity and safety

These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:

balance security and network reliability

Manage the behaviour of users

Page 13: Va\\lue of e-safebusiness solutions

Ensure compliancewith regulatory rules and guidelines.

These changes will have a profound effect on firms, not only will they have to understand and manage these new connectivity tools but they will have to:

Maintain employee productivity and safety

balance security and network reliability

Manage the behaviour of users

Page 14: Va\\lue of e-safebusiness solutions

The risks fall into two main categories:

• Reputational Damage

for example, the loss of client data, IP contravention,breach of data protection law, negative tweets & blogs

• HR Issues

In particular the employees’ right to work within a secure, regulated and protected online environmenttogether with developing policies and strategies which help connected employees maintain a work/life balance.

Page 15: Va\\lue of e-safebusiness solutions

“Organizations need to develop a strategy, driven by the business needs of the practice which balances increased regulation, enhanced security and improved productivity with the social and work needs of permanently

connected employees. ”

Page 16: Va\\lue of e-safebusiness solutions

LexcelV4

LexcelV4

SRASRA

Both Lexcel V4 and Risk Based Regulation from the SRA impose additional monitoring and reporting burdens on law firms.

Page 17: Va\\lue of e-safebusiness solutions

LexcelV4

LexcelV4

RegulatoryBurden

RegulatoryBurden

SRASRA

Both Lexcel V4 and Risk Based Regulation from the SRA impose additional monitoring and reporting burdens on law firms.

Page 18: Va\\lue of e-safebusiness solutions

InternalInternal

RegulatoryCost

RegulatoryCost

RegulatoryBurden

RegulatoryBurden

ExternalExternal

Both internal governance and exterior regulation impose additional monitoring and reporting burdens .

Regulation in particular appears to be moving away from the “yearly snapshot” approach to a continuous monitoring model with a form of credit scoring applied in real time.

Page 19: Va\\lue of e-safebusiness solutions

This impacts costs and possibly even ability to attract clients and recruit talent.There is, therefore, a direct link between a clearly written Acceptable Use Policy, continuous compliance monitoring and profit.

Page 20: Va\\lue of e-safebusiness solutions

Being compliant is a business imperative.

However monitoring and managing ongoing compliance together with reporting to regulators has the potential to take up valuable management time.

e-safe business reconciles Acceptable Use with Lexcel V4 and Risk Based Regulation to provide a largely automated monitoring, managing and reporting environment which addresses the issues facing growing law firms adapting to the new regulatory environment.

Page 21: Va\\lue of e-safebusiness solutions

AUPE-safe

Monitoring&

Reporting

• Strategic Risks• Operational Risks• Regulatory Risks

• Business

Management• Equality &

Diversity• Risk Based

Regulation

• Client Confidentiality • Data Security• Avoiding discrimination

e-safe business reconciles the Acceptable Use Policy with Risk Based Regulation to provide a largely automated monitoring, managing and reporting environment which addresses the issues faced in addressing the ever expanding regulatory environment.

Page 22: Va\\lue of e-safebusiness solutions

Lexcel/LSC/SRA

AUPE-safe

Monitoring&

Reporting

01.Lexcel V4• Strategic Risks• Operational Risks• Regulatory Risks

Lexcel V44A.4 e-mail policy4A-5 website use4A.6 internet use

There is overlap between Lexcel, LSC and SRA rules and guidelines.

e-safe business from eSafe Systems

Page 23: Va\\lue of e-safebusiness solutions

Lexcel/LSC/SRA

AUPE-safe

Monitoring&

Reporting

01.Lexcel V4• Strategic Risks• Operational Risks• Regulatory Risks

02.SRA• Business

Management• Equality & Diversity• Risk Based

Regulation

Lexcel V44A.4 e-mail policy4A-5 website use4A.6 internet use

SRA Rule 5.01(1)gRule 5.01(1)hRule 5.01(1)i

There is overlap between Lexcel, LSC and SRA rules and guidelines.

The Acceptable Use Policy and e-safe business, work together to manage this relationship.

e-safe business from eSafe Systems

Page 24: Va\\lue of e-safebusiness solutions

Lexcel/LSC/SRA

AUPE-safe

Monitoring&

Reporting

01.Lexcel V4• Strategic Risks• Operational Risks• Regulatory Risks

02.SRA• Business

Management• Equality & Diversity• Risk Based

Regulation

03.LSC• Client Confidentiality • Data Security• Avoiding discrimination

Lexcel V44A.4 e-mail policy4A-5 website use4A.6 internet use

SRA Rule 5.01(1)gRule 5.01(1)hRule 5.01(1)i

LSC Rule 3Rule 8Rule 9

e-safe business from eSafe Systems

Page 25: Va\\lue of e-safebusiness solutions

E-safe business improves productivity, reduces risk and improves security by modifying user behaviour.

Page 26: Va\\lue of e-safebusiness solutions

E-safe business improves productivity, reduces risk and improves security by modifying user behaviour.

User Monitoring – The User Monitoring Module monitors all information displayed on the workstation screen, within a Windows environment including:

• Applications• Chat• Internet Browsing• Email• Instant Messaging • The Operating System

Page 27: Va\\lue of e-safebusiness solutions

E-safe business improves productivity, reduces risk and improves security by modifying user behaviour.

Activity is compared with built in “Threat Libraries” which look for:

• Cyber bullying, • Cyber slacking, • Predatory behaviour, • Drugs, • Race, • Hatred, • Sex, • Dating, • Hacking, • Bypassing firewalls & proxy avoidance,• Propaganda, • IP theft & copyright infringement.

Page 28: Va\\lue of e-safebusiness solutions

E-safe business improves productivity, reduces risk and improves security by modifying user behaviour.

Image Control – Image Control intercepts images, before they are displayed on-screen and determines the images acceptability for display.

This provides the greatest protection from accidental or deliberate access to inappropriate images.

Image control can also block images introduced onto the network via USB or email.

Page 29: Va\\lue of e-safebusiness solutions

E-safe business improves productivity, reduces risk and improves security by modifying user behaviour.

USB Device Management – USB device management controls the use of: • memory sticks, • digital cameras, • MP3 players and • mobile phones

whenever an attempt is made to connect them to the network helping to prevent data theft and the introduction of viruses, worms and Trojans.

Page 30: Va\\lue of e-safebusiness solutions

e-safe business improves productivity, reduces risk and improves security by modifying user behaviour.

Training – Deploying e-safe is not, in itself, sufficient to provide the level of control or changes in behaviour necessary to ensure your AUP is adhered to and ongoing regulatory compliance maintained and improved.

It’s important that everyone in the organisation understands the reasons why e-safe business has been deployed and how non compliance with rules impacts reputation, costs and profit.

e-safe provides comprehensive training showing how to introduce e-safe business and configure it to provide the level of protection you need.

Page 31: Va\\lue of e-safebusiness solutions

e-safe business can be installed onto your network

Or provided as a managed service from our UK based servers with fully qualified and accredited support