Drafting Social Computing Guidelines

I was working on social computing guidelines. I have several examples from IBM, Intel, and others. Its interesting but not surprising that they take a company-centric approach.

Equally important is for employees not to use their company resources for personal business. Maybe it falls under a privacy policy I have yet to find, but there should be wording that protects employees when using corporate resources.

My team and I are building a remote access infrastructure that proves as useful for work as for personal time. Here’s the thinking:

If we build an infrastructure for work only it will assume employer-owned equipment. However, if we build an infrastructure for Bring-Your-Own-Device (BYOD) then we can accommodate both personal and professional on the same device. Such a binary system demands either modifying every device to allow both personal and professional or build a corporate infrastructure to accommodate both.

Why try to accommodate both?

In many corporate environments its increasingly hard to keep new technologies at bay. I like IT staying ahead of the curve, implementing technologies and configurations that account for the broadest audience.

How does that work?

If you’re company has a BYOD program or one that has personal devices, build an infrastructure that encourages connecting to the corporate infrastructure.

Pro Business:

  • Having as many devices that might connect into your network connect through that network as often as possible helps mitigate the risk of malware introduction.
  • As such, malware and antivirus and software versions can be enforced on the devices
  • It encourages users to use the security measures, making them more likely to use them in a work environment

Pro User:

  • Wherever you log in and via whatever device (within IT’s capabilities) your communications will have the benefit of enterprise-level encryption and security
  • If IT implements optimization/acceleration, making use of that over the VPN client
  • Access to work resources when needed

This site uses Akismet to reduce spam. Learn how your comment data is processed.

To respond on your own website, enter the URL of your response which should contain a link to this post's permalink URL. Your response will then appear (possibly after moderation) on this page. Want to update or remove your response? Update or delete your post and re-enter your post's URL again. (Learn More)