Search all MERLOT
Click here to go to your profile
Select to go to your workspace
Click here to go to your Dashboard Report
Click here to go to your Content Builder
Click here to log out
Search Terms
Enter username
Enter password
Please give at least one keyword of at least three characters for the search to work with. The more keywords you give, the better the search will work for you.
select OK to launch help window
cancel help



Personal Collection Detail View


by Abhishek Pratap
Bookmark and Share

An organization's security policy is its basic plan to protect data, devices and its network. The key is to determine which data and devices are the most sensitive. Among other elements, security policies cover access rights of employees and outsiders, how to handle mobile workers, procedures for quickly terminating access rights of people who are fired or quit and security maintenance procedures such as updates and patches. Sharing documents is a must for businesses to be productive and to work together globally. There are many circumstances in which it is needed to share data providing specs and documentation to global outsourcers, collaborating with remote workers, partner and channel relations, communicating with customers, or creating shared repositories for Mergers and Acquisitions deals. It is important to consider the age-old tradeoff between security and ease of use or productivity – of the solution. A solution that is difficult to use is also difficult to encourage company-wide, subsequently achieving little security benefit from the investment. Likewise, if the deployment and maintenance is too time-consuming, the solution may fail. Another requirement is the safeguard from externalities i.e., how easy and seamless it is for third-party people and entities to replicate and use.

Authorized users only:

To add a link to a material not in the MERLOT collection, click here.