P2P and Functional Area shadow systems, aka, spreadware.

We need to insure that staff and faculty who have legitimate access to sensitive information are not both creating their own databases or spreadsheets on their local systems AND running P2P networking software. Here's how it burnt Pfzier: http://www.computerworld.com/action/article.do?command=viewArticleBasic&articleId=9024491
Ideally, we need a comprehensive security and reporting strategy that both protects sensitive information and allows functional offices to deliver services.

security, spreadware

This entry was posted in Management by ken. Bookmark the permalink.

About ken

Ken is the Director of MIS and Instructional Technology at Plymouth State University where he enjoys the opportunity to work with energetic, intelligent, motivated, competent and caring colleagues to advance the integration of technology into the institutional academic and administrative environments in the effort to promote a more informed citizenry.