Monday, January 7, 2013

CRM Security

CRM Security, privacy, and data security concerns

One function of CRM is to collect information about clients. It is important to consider the customers' need for privacy and data security. Close attention should be paid to relevant laws and regulations. Vendors may need to reassure clients that their data not be shared with third parties without prior consent, and that illegal access can be prevented.
A large challenge faced by developers and users is found in striking a balance between ease of use in the CRM interface and suitable and acceptable security measures and features. Corporations investing in CRM software do so expecting a relative ease of use while also requiring that customer and other sensitive data remain secure. This balance can be difficult, as many believe that improvements in security come at the expense of system usability#
Research and study show the importance of designing and developing technology that balances a positive user interface with security features that meet industry and corporate standards A 2002 study shows, however, that security and usability can coexist harmoniously. In many ways, a secure CRM system can become more usable.#
Researchers have argued that, in most cases, security breaches are the result of user-error (such as unintentionally downloading and executing a computer virus). In these events, the computer system acted as it should in identifying a file and then, following the user’s orders to execute the file, exposed the computer and network to a harmful virus. Researchers argue that a more usable system creates less confusion and lessens the amount of potentially harmful errors, in turn creating a more secure and stable CRM system.
Technical writers can play a large role in developing content management systems that are secure and easy to use. A series of 2008 research shows that CRM systems, among others, need to be more open to flexibility of technical writers, allowing these professionals to become content builders. These professionals can then gather information and use it at their preference, developing a system that allows users to easily access desired information and is secure and trusted by its users.

No comments:

Post a Comment