An IT Bill of Rights for End Users

Share  
1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12
Previous Next

Click through for an IT Bill of Right for end users that IT organizations should seriously think about ratifying, as identified by Unisys.

Topics : IBM Looks to Redefine Industry Standard Servers, APC, Brocade, Citrix Systems, Data Center

While not everyone in IT agrees that end users should have any inalienable rights, the fact remains that through the consumerization of IT, end users are rebelling against what they perceive to be totalitarian IT regimes.

If that continues at the current rate, not only will that rift become harder to heal, but the role the IT department plays inside the organization could be recast in a way that sharply reduces its relevance. In order to prevent that from happening, the folks at Unisys have come up with an IT Bill of Rights for end users that IT organizations should seriously think about ratifying. It won’t be easy, especially when it comes to security and compliance issues. But the days when the IT organization could just say “no” and expect every user to fall in line are now clearly behind us, giving rise to the need for a new compact between IT and the people they are supposed to serve.

 

More Slideshows

CloudPassageSecurityCloudDeployment0x Top Five Considerations for a Secure Cloud Configuration

Starting a cloud server workload without proper configuration is like putting out a beacon alerting hackers to an easy mark. ...  More >>

GlobalscapeDowntimeRisk0x Five Ways to Minimize the Risk of System Downtime

On the surface, losing access to core systems, including email servers and backend processors, is frustrating and cripples employee productivity. Unfortunately, that's not the worst of it. ...  More >>

Security36-290x195 Five Burning Security Issues in Cloud Computing

As companies accelerate their adoption of cloud technologies – like infrastructure as a service (IaaS) or software as a service (SaaS) – the need for solutions that provide secure access and reliable operations in the cloud increases in importance. ...  More >>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.