TECH DIGITAL RESOURCE LIBRARY

Brainloop

Brainloop provides a secure online workspace for secure filing, editing and distribution of highly confidential documents within the corporate network, and beyond. Contents are protected from unauthorized access, and all actions are documented by a tamper-proof audit trail.

Our Website: http://www.brainloop.com


Latest Content From Brainloop

Whitepaper: Managing Information Risk in the Extended Enterprise: Why Corporate Compliance and IT Security Must Join Forces

by BrainloopJan 01, 2012

It's no secret: end users take huge security risks in order to get their jobs done. One of the biggest sources of information risk companies face is collaboration with externals. Companies can't operate without sharing sensitive information with strategic partners, regulatory authorities, board members, consultants, acquisition partners, contractors and legions of other individuals outside the corporate network.

But without a safe means to do so, how do employees share sensitive documents? Too often, by sending email attachments or by signing up for online collaboration portals without regard to data protection, access control, service level, or security certification.

How does business take advantage of the wealth of benefits that online document collaboration promises, while avoiding the compromise of confidentiality, integrity, and availability of critical business information?

This white paper by Michael Rasmussen, J.D., CCEP, OCEG Fellow, describes the risks introduced by current document sharing practices, and how compliance and IT security must work together to mitigate information risk while improving their organizations' efficiency and competitiveness.


Whitepaper: Security Policy: Five Keys to User Compliance

by BrainloopJan 01, 2012

Business users are a key part of a company's security, and even the most conscientious employees can introduce serious breaches of security policy. IT can do everything in its power to secure the company's confidential documents - provide first-class security infrastructure, develop reasonable security policies and engage in extensive communication and training - yet still people fail to comply. The solution is to provide security that helps people do their jobs more efficiently, thereby inducing users to follow best security practices without even knowing it.


Whitepaper: Enterprise Information Management Security Options

by BrainloopJan 01, 2012

As organizations increasingly participate in a collaborative economy, sharing documents becomes ever more crucial. Documents travel farther and wider than ever before due to expanding corporate ecosystems and increasingly virtualized business networks encompassing more partners, joint ventures, and collaborative projects. While transactions such as M&A and technology licensing have long wrestled with the problem of securing documents traveling outside the company, now a host of business and collaborative processes face the same problems.


Whitepaper: 10 Questions to Identify Compliance Risks

by BrainloopJan 01, 2012

Corporate and regulatory compliance policies have forced companies to ensure that information flows are documented, auditable, and highly secure. Yet in order to conduct their business, companies must share sensitive information outside the firewall, introducing serious potential information risk. How can companies enforce security policy and cost-effectively meet compliance objectives when documents must be shared with partners, investors, board members, bidders and others outside the enterprise?

This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help you identify potential compliance risks in your company. The 10 different scenarios illustrate smart, cost-effective strategies for SOX, PII, and HIPPA compliance issues where information must be kept confidential.

The key compliance issues discussed include:

� Providing confidential or sensitive information to external auditors, compliance bodies and other external users

� Tracking spreadsheet approval and changes

� Managing and protecting highly confidential and sensitive information

� Addressing different levels of security required for specific types of information


Whitepaper: Document Security Compliance: Managing Information Risk in the Extended Enterprise

by BrainloopOct 25, 2010

This white paper is authored by Michael Rasmussen of Corporate Integrity and examines how the distributed nature of working with confidential documents in any kind of collaborative setting, whether inside or outside the organization between employees, auditors, or vendor suppliers, poses a serious security risk. Traditional IT security tools cannot protect documents outside the firewall. Intellectual property, trade secrets, financial, and legal papers, customer lists and other highly sensitive data must be managed under a set of controls that include authentication, audit tracking, e-mail control, and role-based access control.


Whitepaper: Ten Questions to Identify Compliance Risks When Sharing Information

by BrainloopSep 07, 2010

Corporate and regulatory compliance policies have forced companies to ensure that information flows are documented, auditable, and highly secure. Yet in order to conduct their business, companies must share sensitive information outside the firewall, introducing serious potential information risk. How can companies enforce security policy and cost-effectively meet compliance objectives when documents must be shared with partners, investors, board members, and others outside the enterprise?

This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help identify compliance risks in your company. The 10 scenarios illustrate smart, cost-effective strategies for SOX, PII, HIPPA and security policy issues.