Keeping Your Collaboration Data Private

When choosing a new collaboration solution to deploy at scale, there are great many things to consider from features to cost, but are some service owners overlooking data privacy?

These are our top considerations for service owners, to ensure they protect the private data of their company, and a hybrid remote workforce while collaborating and communicating.

 

Set out your requirements

It is always good practice when beginning your search for a new platform or solution provider, to create a checklist of your requirements. Try to look ahead as much as possible and allow for future changes in the way that the platform will be used by your staff.

Consider what kind of data will be shared across your collaboration or video platform. Will it contain sensitive company information, or private contact information of your clients and partners?

From there, you can arm yourself with a list of security and privacy requirements as you begin looking at solutions.

 

Where does your data go?

Most collaboration platforms and solutions providers promise (and deliver) good standards of data privacy and security. But it always pays to do some extra research into how data is encrypted and where it is stored.

Communication data, by its very nature, has to move from one location to another. You may determine that all data should reside locally, within your own servers and devices so its important to understand fully how your solution will be deployed and how much control you will have over your data.

When considering a collaboration or video service, ask the provider to give details on:

  • Where is data is stored, both at rest and in transit?
  • What kind of encryption is used?
  • Is data encrypted end-to-end?
  • What security accreditations does your solution provider hold?
  • If the data is stored in a third-party data centre, what are their security accreditations?
  • Is the platform GDPR compliant?
  • How will your solution be deployed?

This will give you a good set of metrics to compare the relative security capabilities of providers and help you select the best option.

Finally, It’s always prudent to have a contingency so it is wise to ensure your provider has a robust recovery plan.

;