preview

Communication And Networking With Infosys

Decent Essays

Collaboration is used in every aspect of human life and can be interpreted in different ways, one might be the idea of people coming together to do a job through different tools. Using tools such as sign language, verbal communications telephone, or even the “batman signal,” today such tools are electronic messaging and networking with an internet connection (Collaboration Tools, 2015, p. 164). When Kellogg’s noticed employees using different applications, websites, and database systems to communicate with each other in the plant it become vital that they get a system that would work and cut much of the back and forth communication out with one site, making it easier and practical to collaborate with others (Collaboration Tools, 2015, p. …show more content…

A survey revealed that many companies have engaged security practices with SharePoint for it seems data is being shared across networks and applications and even beyond the boundaries of the system. Many workers do not know there are guidelines of who can access the data and what kind of data is stored on SharePoint. Many employees think since it is a company site it is well protected by a security defense, while other workers might share with business partners or contractors (Tim Wilson, 2009). If employees ae not cautious with the data any one can get access with a good hacker and might get critical information to blackmail the company for money or even sell to the highest bidder. A company just assumes that new and old workers know the rules for the use of company computers and websites used in collaboration systems. Although some policies differ from others they usually state the same. If one was a company official and asked to review and rewrite the corporate policy to avoid any breach of data the best place is to start at the internet itself. The first is to make a policy on the usage of company computer, internet, and email which should include, but not limited to use the internet responsibility and productively for company business, no personal business is allowed. The company owns any computer information received on company property (computer) and can be used for legal

Get Access