Unterhaltungselektronik im Büro

Stellen Sie die Spielregeln klar

27.06.2008
Von Carrie  Matthews

That was then. Students now have input in forming these policies, so the specifics get socialized among the user community before a policy debuts. This way there are no surprises. "A policy that is a surprise won ´t get followed", says Dominick.

Balance policy strictness

Given the confidentiality restrictions around patients medical data at the John C. Lincoln Health Network, Israel employs a high level of strictness in his usage policies for consumer IT.

Jay Dominick, CIO University of North Carolina – Charlotte: "At the university it can take six month or a year to reach consensus. In 2000, when Napster hit university networks it took almoust two years."
Jay Dominick, CIO University of North Carolina – Charlotte: "At the university it can take six month or a year to reach consensus. In 2000, when Napster hit university networks it took almoust two years."

At Kennametal, a $ 2 billion industrial manufacturer, there ´s more leeway. IT works closely with end-users to find suitable workarounds to its strict policies, says Raj Datt, VP and CIO of Global Information Technology. An example is a request for YouTube functionality by the sales staff. "Our sales team came to us asking for functionality so they could show potential clients current pricing and inventory-products from a video perspective. We responded by enabling BlackberryBlackberry access to our ERPERP for realtime customer data", says Datt. Working with users to create a viable alternative has helped change their view of Kennametal IT from that of a cost center to a value-driven organization. "If we don ´t give them an alternative, then they would just bypass IT", Datt says. Alles zu Blackberry auf CIO.de Alles zu ERP auf CIO.de

Automate enforcement

Technology tools are a good way to enforce consumer IT procedures and take control of your security land-scape. Israel uses automation tools from Lumension (to prevent users from connecting an iPod to the system before prior authorization) and Pointesec (to force encryption for all removable media). "I have a love-hate relationship with thumb drives. We are moving to mandatory encryption where the saved data is encrypted and the thumb drive itself is encrypted with biometrics", says Israel.

Once a mobile device is configured to access the ERP system at Kennametal, an automatic security solution is deployed that includes password-protection and the ability for Datt ´s team to remotely lock or wipe the data if a device is lost. Datt also has policies around device procurement and only supports certain features of some devices. For example, although there is a GPS capability in the 900 Blackberrys deployed throughout Kennametal, it is not activated for use at the server level at this time.

Zur Startseite