When It's OK for Someone Other Than Account Holder to Gain Access

Susan Hall

In a guest opinion piece, Mark McClain, CEO and founder of SailPoint Technologies, discusses the evolution of identity-management tools toward business intelligence software for compliance.


He writes:

Business intelligence's success bodes well for identity intelligence, since it is based on the same principles. Business intelligence collects data from isolated application "silos" into a central repository, where analytic applications process it to reveal patterns and trends. Identity governance likewise centralizes user access information from critical applications, allowing managers to analyze it to identify risky employee populations, policy violations and inappropriate access.

Every organization should have a solid identity-management structure. Indiana University has uploaded to the Knowledge Network an FAQ outlining its policy addressing legitimate reasons why someone other than an account holder might access computers, electronic files, or data related to use of the university network. You'll find the university's electronic information and IT resources privacy policy here.


Indiana University has been generous in sharing its written policies with the Knowledge Network. You also can take a look at these:

Appropriate Use of Information Technology Resources Policy

Misuse and Abuse of Information Technology Resources Policy

Excessive Use of Information Technology Resources Policy

Add Comment      Leave a comment on this blog post

Post a comment





(Maximum characters: 1200). You have 1200 characters left.



Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.