You are on page 1of 3

Comparison of Intranet – Sharepoint - Yammer

Public Intranet (Insight) ALL Possible distinction between legal entities (OLU, MES, OBS, etc.) Every (of the defined company) has access by default Company Top down by “information coaches”, limited interactivity Highly structured All (text, pictures, movies, forms, calendars, etc.) More static high permanence Top down distribution of information in a structured way to help you deal with the organization as a whole Collaborative platform (Sharepoint) Restricted community Potential for ALL Potential for external access Enterprise Social Network (Yammer) All who were invited and registered Including consultants External networks (ie. Happy Yammer users) Communities, teams, projects People & Groups By all members of a community but By ALL who want most of the time only by active Bottom-up, highly interactive members Structured but flexible, progressive Little structure (except topics and groups) Emerging All Text + links + files, pictures, movies Static and changing Daily, short term medium permanance Short permanence Sharing of information around Idea generation – collaboration specific topics enabling emerging cooperation, co-creation in a Get to know what lives in the structured way mindset of the people of the organization

Public type Info sharing Information structure Media type Stickiness of info Purpose

There is no remark on Data Privacy for neither TM and Customer data (“For internal use only” does not cover this and to respect the ‘Need to know’ principle. We could add a word about passwords in our guidelines 3. as a general rule there should be a clear rule stipulating that both TM & Customer personal data cannot be published or referred to). it is an external service you do not control (like LinkedIn Alumni Groups. 4. limiting potential data leakage and avoiding that leavers can still access the site (see also next point about leavers). so we could restrict the access to users that are logged on (via VPN or via the Office network). The guidelines document itself does not seem to cover all security concerns. airports. Has the security posture of the service been assessed? 5. “Strong password”. by definition it’s a document that suggests a certain behavior and conduct. I don’t understand the expectation b. We are linked to the functionalities of Yammer ii.). i. 2. Is there a policy regarding the acceptable use of Enterprise social media? a. 1. By definition. etc. The use of yammer was already started and cannot be stopped as such by M*. I notice when creating a profile that a password of 6 characters is enough. eg. but does not enforce it.Audit issues 1. hotels) for access to this service. 1. Yammer offers the possibility to restrict the access to certain IP Addresses. So we rely on the security of private networks (at home. Which specific access restrictions have been put in place / requested from Yammer? I’ve done the test by disconnecting my VPN and noticed that it’s possible to log on from a private internet connection to the site and access my profile. The guidelines document does not cover this in my opinion: it’s not a security guideline and even if it would be. This policy should have been prepared and published before opening up the service. but does not specify or make a reference to the M* Security policy – for example. .

The only way is to delete the account manually. home computer. Claim your network to choose an admin” As I understand email can join.  There is no possibility to limit access as an administrator with the free license.mobistar. What about leavers? Is there a synchronization foreseen between the Yammer network and our Active Directory (AD Sync)? The following text (shown on my Yammer profile) is worrying: “This is the verified network for mail. smartphone and tablet 6. Only those with a confirmed @mail. This network does not have an admin. it’s the role of the admin to ensure this . very strongly advise to keep it as it is because the strong point of Yammer is to be easily accessible through the business pc.mobistar. I very.

f° .&     @ – ° ¾ n¯ °¾ €  ¾°¾ ¯n f¾ nn°n °¾  – #°–½f¾¾ #    ¾°¾½ n€¯f f  €  °n  .& n½n € f¯½ °n  °n f°–f½€ ff½f¾¾ €nffn ¾¾ °–    J f °  €°n°f ¾€f¯¯    J n f f f ½f¾¾ ¾°– ° ¾    @  ¾° ¯f°ff9fn€°  @.aV`__aW_   ¾  f½n –f °– fnn ½f  ¾ €° ½¾ ¾nf¯ f" f  @ – ° ¾ n¯ °  ¾°n ¾°¯½°° #¾°f¾ n– ° f°   °€    €°°#¾f n¯ °f¾–– ¾¾fn f° ff° n° n    ¾° °€n      °#° ¾f°   ½ nf°  @¾½n¾ f  °½ ½f f° ½ ¾  € ½ °°–½ ¾ n     €°° ¾f°  °f¾ n  °n°% ° °¯°½¾  n % @ ¾ €f¯¯ f¾f f  ¾f f° nf°° ¾½½ f¾¾n .

¾¯  ff%#° °f¾ °#  ¾°n ¾f°  ¾½ n #-  °#½°n½ f¾f– ° f   ¾  fn f ¾½f°–f @. .

¾¯ ½ ¾°f ffnf°° ½ ¾   €  %     f¾ ¾ n½¾ € ¾ n  °f¾¾ ¾¾ "    Jn¾½ n€nfnn ¾¾ ¾n°¾f  °½°½fn $  ¾ €¯f¯¯ " #  °   ¾  ¾n°° n°–¯I9-f° °n f#¾½¾¾  –°€¯f½f ° ° n°° n° ¾ f° fnn ¾¾ ¯½€   ° ¾ n€½f ° ¾%f¯ f½¾  ¾%€fnn ¾¾¾¾ n f¯¯ €€ ¾ ½¾¾   ¾n fnn ¾¾n f°9  ¾¾ ¾ ¾ n  ¾n fnn ¾¾¾ ¾ff –– °%fI9-f €€n ° %  ¯°–½ °f ff ff– f° f °–f f ¾nf°¾fnn ¾¾ ¾ %¾ f¾° ½°f  f ¾%  .

7 -0  394809.7 -002.3.431720/2./23  ¾° ¾f°  #¾  € f ¯° °¾ ¾n°° n°  O @  ¾°½¾¾ ¯fnn ¾¾f¾f°f ¯°¾f € n °¾ @ °f¾    fnn°¯f°f   .24:73094794.0 .4480. 24-89.0710/309471472..343 %830947/408349..3.O    ¾°–f ¾  ½f¾¾ nf¾  ¾°–½°€f¯¯ ¾  f¾fnn ¾¾  –  ¾° ¾¾½n  ¯ n¯½  ¾¯f½° f° f      Jff  f ¾"¾  f¾°n°f°€ ¾ °  ° f¯¯ ° f° n  n%°n%"@ €°–  %¾°°¯f¯¯ ½€ %¾°–  %8890... 24-89./23 .