Files vs Piles

Written by Cynthia Kyriazis


I recently read an article that had some interesting but not surprising statistics. Harte-Hanks published a survey in December, 2001 which reported that 96% of businesspeople interviewed were frustrated by their companies' information management. It's no wonder. An IDC white paper published in August, 2001 told us employees can spend up to two and half hours a day looking for information.

It's about retrieval

The truth ofrepparttar matter is that information in large organizations is stored in huge electronic databases and archival files. However, a great deal of it is also found inrepparttar 140737 individual employee's workspace…on their desktop, in their file cabinets and in their heads. Coopers and Lybrand estimates U.S. Executives spend one hour a day just looking for misplaced files. But as I tell my clients, it's all about finding files, not just storing them. Canrepparttar 140738 information you are looking for be retrieved quickly? If needed, can it be found whenrepparttar 140739 employee is absent from work? What ifrepparttar 140740 employee leavesrepparttar 140741 company...doesrepparttar 140742 ability to find information leave also?

Systems torepparttar 140743 rescue

Takingrepparttar 140744 time to create a workable filing system works torepparttar 140745 advantage of an organization. They become strategically prepared forrepparttar 140746 future and can maintain a competitive edge. However, development, management and maintenance of a filing system atrepparttar 140747 individual desktop level seems to be a hurdle for most. The truth is that it doesn't have to be difficult…it just takes focus and time. A well thought-out filing system simply provides a user-friendly structure or path. Better yet,repparttar 140748 same key elements for developing a paper files can be used for digital files as well. The rewards include increased personal performance, productivity and reduced stress levels. If employees tookrepparttar 140749 time to begin developing a customized, workable system, their retrieval problems would be greatly diminished. And so would that ofrepparttar 140750 organization.

Protect Your Computer System With A Comprehensive Security Policy

Written by Cavyl Stewart


The most difficult part of creating a Security Policy for your business is determining what, exactly, to include in it. Never heard of a Security Policy before? You’re not alone. But whether you arerepparttar only employee in your company or you have a small staff working for you, you need to learn what a Security Policy is, and then you need to create one.

In muchrepparttar 140668 same way that a personnel policy informs employees of things like vacation time accrual, performance review schedule and other personnel-related issues, a Security Policy informs your employees ofrepparttar 140669 steps that are necessary to keep your company’s network and computers secure. The policy is your company’s rules and regulations that are enforceable, under law if necessary, if breached.

A Security Policy will include rules and formal procedures that are clearly written and laid out. But most importantly,repparttar 140670 information contained must be easy for employees of all levels to understand.

And just as it is with young children,repparttar 140671 content of your Security Policy must be enforceable, and it must be enforced consistently. Saying in writing that something is not allowed, then allowing it to happen during regular work hours sends mixed messages to your employees. They won’t know what really is right or wrong, which will defeatrepparttar 140672 whole point of your Security Policy. Inconsistent implementation also leaves you open to legal liability.

Like any good policy, your Security Policy should be regularly updated to reflect today’s rapidly-changing business environment. Most ofrepparttar 140673 time, you will berepparttar 140674 person making these changes. However, if your company is growing and adding staff, this may not always berepparttar 140675 case. Make surerepparttar 140676 person responsible for updating your company’s Security Policy has guidelines and boundaries, and most of all, make sure you read and approve any changes made by someone else.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use