Please download our whitepapers which address important topics in depth.
The Surprising Power of Anonymity
How to enable people to be and contribute at their best.
Many executives believe that their organization has an “open culture”, a belief that is often shared by their employees. Yet employees and managers alike report that their people somehow close up and under-perform in meetings. This can impede sound decision-making and the drive for innovation. This paper argues that attempts to create openness without addressing the fundamental but underestimated challenges which individuals face in meetings are unlikely to work.
An effective way of managing and overcoming these challenges is the use of meeting productivity software which offers anonymity. The results are both positive and surprising. In hundreds of organizations around the world, in virtually all industries, anonymity has removed obstacles to disclosure and sources of prejudice, leading to a dramatic shift in trust,engagement and ultimately, productivity.
This security and information assurance addresses the information requirements of IT professionals who need to assess how MeetingSphere’s various deployment options fit in with their organization’s information and security policies and requirements.
Chapter 1 discusses MeetingSphere’s security impact classification. It focuses on potential breaches of confidentiality with data integrity and availability as important but secondary concerns. Chapter 2 gives a privacy assessment of MeetingSphere and explains that MeetingSphere holds only the bare minimum of personally identifyable information (PII) and how that information is protected. Chapter 3 discusses the customer’s deployment options from a security perspective. All deployments offer essentially the same functionally but differ greatly in accessibility (Isolated LAN, Intranet, Internet) or where and how the data is held (Cloud, customer’s data center or Portable Server appliance). Chapter 4 presents the security features and controls of the software and explains differences of the various product lines (deployment options). Appendix A “Security features and controls by product line” gives an overview of these differences. Chapter 5 details how MeetingSphere protects the confidentiality, integrity and availability of customer deployments in the cloud.