Compliance

Office 365 Home

Measure twice, cut once — this wise adage explains the value of pausing and making sure you know the potential results of your decisions. With Office 365, there are so many different plans and options that it’s important to know what you gain (or lose) before you choose one.

Office 365: Encryption and control

[Note: this is partially an advertisement, but very informative text on general Office365, encryption and control. It shows the kind of a compliance required by high risk environments, achievable by using third party products and Office365 as a platform] Related

The best password policy? A simple sentence.

20 years of wrong effort.

Encryption: Best Practices

Encryption Everywhere: Best Practices Related

Data Protection Guide

Update: This text was compiled almost a year before GDPR was signed. But it cpontains teminology relevant in the GDPR. Overview Data protection laws exist to strike a balance between the rights of individuals to privacy and the ability of organisations to use data for the purposes of their business. The (UK) Data Protection Act …

How transparent is the overall Office 365 operation?

[:en] Can you really trust Office 365? How transparent is the overall Office 365 operation? Moving to a cloud service shouldn’t mean losing access to knowing what’s going on. With Office 365, it doesn’t. We aim to be transparent in our operations so you can monitor the state of your service, track issues and have the …

How is Office 365 Compliant?

Can you really trust Office 365? How is Office 365 Compliant? Office 365 is a global service and continuous compliance refers to Microsoft’s commitment to evolve the Office 365 controls and stay up to date with standards and regulations that apply to your industry and geography. We get lots of questions from our customers on controls …

How is privacy and security built in Office 365?

Can you really trust Office 365? How is privacy and security built in? Related

Can you really trust Office 365?

Can you really trust Office 365? How can users protect themselves? Prepared by Daniel John At DBJ.ORG we know security is a top priority of our customers and this is one that we are working on Office 365 is a security-hardened service, designed following the Microsoft Security Development Lifecycle. Microsoft bring together the best practices from …

Enterprise Content Management is not Information Governance

Enterprise Content Management is not Information Governance Quite a lot is written these days about information management and information governance. Analysts are predicting that effective information management and governance can be a game changer for enterprises. BUt. Doesn’t this sound a lot like Enterprise Content Management, or ECM?  Aren’t there already plenty of successful vendors, ECM installations, …