Make sure that a set of through guideline plans are set up before the IM programs are even installed on everyone’s computers. This not only ensures a lesser chance of confusion, but also helps narrow the focus of what the IM program is going to be used for.
The website IT Business Edge has set up a little pack of information about IM Security Policy for your company that can be downloaded free of charge here. To read the accompanying article that was written on April 27, 2009, please click here. Some of the items that are included in the ZIP file include an intro page, cover sheet and terms, and the IM security policy.
After the IM security policy is created, it might be best to hold a company meeting to explain the guidelines and the basic principles of the program. If that’s not an option, a company-wide e-mail or memo is probably the next best option.
]]>