Have you ever heard that it’s best to never put anything in an email that you wouldn’t want your entire company to read? It’s a good rule to keep in mind when sending an email, an instant message, or a phone message over any network, even a secure network like the one you have at work.
Your data may be secure from hackers and others in the outside world, but who really owns the information in those messages? Does your company own the e-mails you sent your mother over your work e-mail account? Or do you? Or does your mom? The answer may depend on your company's electronic communications policy.
Chances are, your company is not even interested in the e-mail conversation between you and your mom. And who owns those communications is probably not an issue. But knowing your company’s electronic communications policy can help ensure you don’t run into any compliance issues and that your private data stays private.
If you’d like to find out more about ensuring data privacy on your network, check out the SolarWinds webcast, Three Strategies for Data Privacy Compliance: Securing Your Sensitive Data. The webcast features information on how one company uses the SolarWinds Log and Event Manager (LEM) to collect, analyze, and correlate event log data essential for data security and compliance.