This page contains our most popular informational White Papers. All of the following white papers are available as PDFs and require the Adobe PDF Viewer. Go to the plug-ins link at the bottom of the page if you require the Acrobat Reader.
NEW! Information Governance & Collaboration in Financial Services
Collaboration and use of information has revolutionized how technology creates value for financial
services firms. However, a challenge for financial services organizations is to govern information and collaboration across a distributed and dynamic environment, raising a number of questions.This GRC 20/20 Strategy Perspective sponsored by HiSoftware looks to answer these questions and provide financial services entities with a clear strategy for information governance, risk management, and compliance. Download a copy.
NEW! Who's at Risk for a Data Privacy Breach?
The answer is everyone. Any company who collects, stores and/or collaborates customer, patient or employee data is at risk. Not convinced? We’ve put together an infographic that examines who is at risk for a data breach, how it happens, the cost implications and tips on how to reduce data privacy risk within your own organization. Download the Infographic
Protecting Enterprise Content in the Era of WikiLeaks
Given the media phenomenon of WikiLeaks and other incidents involving leaked documents and the exposure of sensitive information, enterprises are waking up to the risks of content security—both within their organization on enterprise social and collaborative sites, and on the Web. Do you truly understand the nature and composition of the digital content within your organization? Can you validate whether or not that content is in compliance with regulatory and other policy guidelines for privacy and confidentiality?
Download Protecting Enterprise Content in the Era of WikiLeaks to learn more.
Getting Your Compliance House in Order - What to Consider Before Compliance Automation Download 'Getting Your Compliance House in Order' to learn the 6 fundamental steps to avoid risk.
Michael Rasmussen of GRC 20/20 looks at how to tackle these issues from
the ground up to get your Governance, Risk and Compliance (GRC) house in
order in a complimentary white paper. This white paper examines why
organizations need to develop a strategic plan to manage GRC processes
and how to put one in place to ensure the success of policy enforcement
programs including compliance automation.
NEW! Guidance at a Glance: Web Accessibility
Do you know what where to start or how to improve your Web
accessibility? If you are not sure what to do, download our whitepaper
to help you kick start or improve your existing Web accessibility
program to meet compliance.
Download Guidance at a Glance: Web Accessibility
Four Steps to Readily Achievable Web Accessibility
In the absence of specific regulations for Web accessibility in the Americans with Disabilities Act (ADA), businesses are left without legal guidance on how to make their complex websites accessible. Some advocate for full compliance with WCAG 2.0 in all content while others argue that nothing is required at all. This white paper discusses the risks to businesses that do not employ Web accessibility citing recent lawsuits, and suggests some best practices for readily achievable Web accessibility that any business can employ.
Download Four Steps to Readily Achievable Web Accessibility
The Changing Legal Landscape of Web Accessibility in Higher Education
Universities face liability if their Web content is inaccessible under Section 504 and other laws. This
is further complicated by new laws and regulations that change some of
these obligations, but also the standards for what constitutes
“accessible” Web content. Colleges and universities also face the
increasing chance of liability due to disability rights organizations
filing more complaints and lawsuits based on these laws. The lawsuits
filed are also extending liability beyond the Web to include other new
technologies used in education. This white paper will provide guidance on the changing legal landscape
of Web accessibility in higher education.
Download The Changing Legal Landscape of Web Accessibility in Higher Education.
Content Management Systems (CMS) and WCAG 2.0: Conformance for Users with Disabilities
The last decade has shown how information technology (particularly the Internet) opens up new worlds for an ever-increasing number of people with disabilities. At the same time, Web accessibility standards have also evolved to keep pace. Version 2.0 of the Web Accessibility Content Guidelines (WCAG 2.0) – the most important and influential Web accessibility standard worldwide— provides a better accessibility experience for users with disabilities. But what does "conformance" to WCAG 2.0 mean for large and complex Web systems and how can organizations measure their success for huge sites against this benchmark?
Download the CMS and WCAG 2.0 Whitepaper.
The Web Accessibility Handbook: A guide to best practices for achieving Web accessibility
Microsoft and HiSoftware partnered to hold a series of European Dialogues on Practical Strategies for an Accessible Web. The goal throughout these dialogues was to not only understand the challenges for organization that looked to achieve Web accessibility, but to closely examine some of the solutions and strategies that are already being employed by organizations to accomplish their goals. As a result of the Dialogues a “How To” guide, the Web Accessibility Handbook, was created.
Download the Web Accessibility Handbook.
Analysis of Website Accessibility After National Federation of the Blind v. Target
The National Federation of the Blind sued the Target Corporation in 2006 for the alleged inaccessibility of its website. This litigation applied the Americans with Disabilities Act (ADA)—and state laws expanding the ADA—to a retailer’s website and quickly became a focal point for advocates and industry alike. As California represents a huge opportunity for almost every company doing business over the Internet, California’s Unruh Act and Disabled Persons Act provide a strong reason for all companies to make their websites accessible.
Download the NFB v Target White Paper for an in-depth analysis of the case and what it means for businesses.
NEW! Is Permissions Inheritance the Best Method for Governing SharePoint Access?
SharePoint is purchased for a number of reasons, but generally the primary purpose is to foster the collaboration and information sharing required in order to achieve these objectives. But opening up documents for sharing can open up a can of worms when it comes to security. This white paper will look at the issues around securing documents in the context of Microsoft's recommended inheritance model, which defines permissions and allows them to be inherited through all sites, lists, libraries, folders and items.
Read Is Permissions Inheritance the Best Method for Governing SharePoint Access? to learn more
NEW! The Do’s and Don’ts of Enterprise Collaboration: 22 Tips to Ensure Secure Collaboration
Collaboration is a critical part of business success and a key driver for increasing competitiveness and productivity. If you are using enterprise collaborative environments from SharePoint to file shares, or even social platforms, you do not want to find yourself in a position where you are scrambling to retrofit security measures after the mishandling of sensitive data, or worse a data breach. Read our Do’s and Don’ts of Enterprise Collaboration, a collection of 22 tips to ensure your organization practices secure collaboration.
10 SharePoint Mobile Collaboration Challenges
over 100 million SharePoint users worldwide, it is inevitable that
SharePoint content will appear on users’ mobile devices. This white paper outlines 10 mobile collaboration challenges
organizations face when accessing SharePoint on a mobile device. It also
provides insight and solutions for secure collaboration on the iPad and
other mobile devices.
Downland 10 SharePoint Mobile Collaboration Challenges
SharePoint Compliance & Security Go Hand in Hand as featured in KMWorld
Organizations using SharePoint have tremendous collaboration benefits.
But this collaborative environment also requires organizations and
individuals to be trusted with a vast amount of sensitive data:
customers’ personally identifiable information (PII), protected health
information (PHI) and confidential company content including
intellectual property (IP), human resource files, M&A, board
documents, customer lists or product strategies, just to name a few. Sure most organizations have governance and compliance strategies in place that dictate proper usage, but compliance policies only get you so far. Just like the song ‘Love and Marriage’ reminds us, you can’t have one without the other and so to it goes with SharePoint compliance and security.
Download Why SharePoint Compliance & Security Go Hand in Hand
The Top 10 SharePoint Security Challenges with Collaboration
Many companies have invested in SharePoint for managing their unstructured information and fostering enterprise collaboration. However, few have fully realized the potential efficiencies and productivities that SharePoint offers because of concerns about the security of the information stored in it. This white paper looks at the top 10 security challenges with SharePoint collaboration facing executives and IT managers today.
Download The Top 10 SharePoint Security Challenges with Collaboration Now.
Folders vs Metadata: 7 Questions to Assess the Best Method for SharePoint Security
Many companies have a hard time choosing whether to use folders or metadata for security and classification in SharePoint. The problem is that out-of-the-box neither folders nor metadata can achieve effective security and classification in SharePoint.This white paper outlines the seven most commonly asked questions on using folders versus metadata for SharePoint security. It provides insight and solutions for more secure and effective document security. Download Folders vs Metadata Now.
AIIM Survey: SharePoint Security – A Survey on Compliance with Recommendations for Improvement
The release of SharePoint 2010 saw a number of widely-reported and sorely-needed security tools and techniques added to the product suite, but the increasing numbers of security-related third party add-in components suggest that the new features do not go far enough. In this report we evaluate security needs and make recommendations for taking SharePoint to a higher level. Download the SharePoint Security Survey Now.
Microsoft SharePoint® Security: Part 2 - Evaluating a Content Security Solution
Microsoft SharePoint® Security: Part 2 provides insight into enforcing SharePoint policies and offers guidance on what to look for when evaluating a content security solution. Download SharePoint Security Part 2 Now.
Microsoft SharePoint Security: Part 1 - The Security, Compliance and Risk Case
With SharePoint serving as the ECM and collaboration tool of choice for enterprises, many do not recognize the risks until it is too late. Download ‘Microsoft SharePoint Security: The Security, Compliance and Risk Case’, part one of a two part series, to discover the content security, compliance and risk challenges in SharePoint and learn ways to ensure a secure platform without hindering collaboration.
Making SharePoint Safe for Sensitive Data
SharePoint promises to solve many of today’s ECM challenges. But concerns
persist about SharePoint's use for the management of private or
sensitive content. Download this complimentary White Paper and learn how to overcome these concerns and turn SharePoint into a security asset for your organization.
Best Practices in SharePoint Content Checklist: SharePoint Adoption and Security in 5 Easy Steps
As you deploy SharePoint® 2010, you have considered the technical aspects — but have you considered the content? How will it be migrated, accessed and secured while encouraging collaboration? Download our complimentary checklist outlining a simple 5 step content strategy aligned to every stage of your SharePoint 2010 deployment.
Risks and Rewards of SharePoint 2010: How a FTSE 100 Company Tackled the Intranet Challenge
Mark Morrell, former BT Intranet Manager and intranet expert, provides a first-hand look at some of the strategies for implementing SharePoint 2010 based on his own experiences.
Download a free PDF copy of the Risks and Rewards of SharePoint 2010 White Paper.
Ten Reasons to Automate Microsoft SharePoint® Content Compliance
With 100 million users worldwide and counting, Microsoft SharePoint® has provided vast collaboration and advanced content management opportunities for organizations. However, an unavoidable consequence is the explosion of unstructured content that collaboration produces. This content is published and lives on internal and external websites, extranets and social computing tools ranging from blogs to wikis to forums. This white paper addresses how organizations can ensure enforcement of policies by outlining the ten reasons to automate SharePoint content compliance.
Download a free PDF copy of the Ten Reasons to Automate Microsoft SharePoint® Content Compliance White Paper.
Gov 2.0: Promoting Inclusive, Open, and Transparent Government through Technology White Paper by Microsoft & HiSoftware
This white paper will explore how government agencies can meet their obligations to provide citizen centered government solutions while at the same time maintaining their statuary and regulatory compliance requirements using Microsoft SharePoint® and HiSoftware Compliance Sheriff®.
Download a free copy of the Gov 2.0 White Paper.
Website Content Quality Checklist: 16 Usability and Performance Questions to Ask Your Web Team
Site quality matters. In fact, a recent article indicates that it is costing companies millions of dollars in lost revenue for Internet businesses.* Site quality is multi-faceted, but at its core it is focused on a site that users can trust and visit repeatedly, as well as ensuring everything works in a way that meets a user’s expectations for speed, reliability and accessibility.
Download the ‘Website Content Quality Checklist’ to evaluate your website and promote a high-quality user experience.
Six Steps to Help Maximize Online Profits, Keep Pace with Accessibility
Needs and Meet Expectations for Site Quality and Privacy White Paper
In today’s technology-rich economic environment, the Internet has become the fastest-growing channel for sales, profit and building a positive brand image. But overlooking compliance as you craft your Web strategy may expose your organization to vulnerable legal fines and penalties, and result in the loss of valuable revenue opportunities by failing to reach a large community of potential customers. Monitoring your site to ensure it meets important compliance benchmarks for privacy, accessibility and site quality is a must for companies doing business on the Web.
Download a free copy of the Six Steps to Help Maximize Online Profits, Keep Pace with Accessibility Needs and Meet Expectations for Site Quality and Privacy White Paper.
Leveraging SharePoint for HIPAA Governed Data: 5 Conquerable Challenges to Meeting HIPAA Compliance in SharePoint
You know you need to be HIPAA compliant. However, achieving compliance,
while still allowing employees to collaborate in SharePoint, is not
easy. Healthcare organizations looking to leverage SharePoint for
collaboration often struggle with a number of issues trying to meet
compliance with the strict requirements set by HIPAA.
white paper to learn how to conquer the barriers to collaboration in
SharePoint. Discover how technology can help your organization safely
leverage SharePoint for the storage and collaboration of PHI and other
Download Leveraging SharePoint for HIPAA Governed Data
A New Prescription For Healthcare Providers To Secure
HIPAA Covered Data: Six Specific Steps Providers Can Take To Optimize
Collaboration Tools Such As Microsoft SharePoint®
In the emerging era of electronic health records (EHR), healthcare
entities now work with far more online collaboration tools, multiple
access points and mobile configurations that increase efficiency and the
quality of patient care. Yet these very advances present new challenges
in securing health information and making sure Protected Health
Information (PHI) is kept private and secure. This white paper presents
six specific steps that healthcare organizations can take to optimize
their collaboration platforms and reap the benefits, while minimizing
the risk of data breaches and HIPAA violations. Download Six Specific Steps Healthcare Providers Can Take To Optimize Collaboration Tools
Five Healthcare Content Compliance Challenges and How to Solve Them
how to implement a repeatable, practical, measurable and cost-effective
process for auditing and reporting on Protected Health Information
(PHI) and other sensitive corporate information across intranets,
public-facing websites, portals, document libraries and SharePoint
sites. Download Five Healthcare Content Compliance Challenges and How to Solve Them
SharePoint's 5 Most Wanted Governance Offenders: Plus 4 Ways to Stop Them in Their Tracks
We set out to find the top 5 governance offenders and the characters we uncovered might surprise you. This infographic exposes SharePoint’s Most Wanted characters, their sometimes risky behavior and annoying habits. It also offers 4 things you can do to stop them in their tracks, to ensure only the right people have access to the right content.
Download the Infographic
Managing Compliance Risk in SharePoint: A Step by Step Illustrated Guide
compliance is the ability to not only have a governance strategy in
place, but also be able to manage risk by identifying issues and
potential violations, and have a process in place for resolution and
fine tuning. This step-by-step illustrated guide lays out
each step; from defining your compliance strategy, to implementing
HiSoftware's suite of solutions for identifying and managing compliance
and security issues in SharePoint to help protect your organization.
Download Managing Compliance Risk in SharePoint: A Step by Step Illustrated Guide Who's at Risk for a Data Privacy Breach?
The answer is everyone. Any company who collects, stores and/or
collaborates customer, patient or employee data is at risk. Not
convinced? We’ve put together an infographic that examines who is at
risk for a data breach, how it happens, the cost implications and tips
on how to reduce data privacy risk within your own organization. Download the Infographic