tailieunhanh - Designing a Microsoft SharePoint 2010 Infrastructure Vol 1 part 40

Designing a Microsoft SharePoint 2010 Infrastructure Vol 1 part 40. This course is intended for IT Professionals who use Microsoft SharePoint 2010 in a team-based, medium-sized to large environment. While they may have implemented a SharePoint deployment, they have limited experience in designing a SharePoint infrastructure. They likely work as a senior administrator who acts as a technical lead over a team of administrators. Members of this audience should have at least 6 months experience with SharePoint 2010. | Planning Social Computing 8-9 Privacy Considerations Balance availability of information and privacy Use site permissions readers editors and content managers Grant or revoke access to sites Enable or disable content ratings Provide guidelines for content sharing Use SharePoint policies to protect user profile information Key Points Privacy is a key planning point for organizations that intend to deploy social computing features. Users may have concerns that their personal data will be shared outside the organization or shared with inappropriate groups in the organization. SharePoint 2010 provides tools to help maintain the privacy of information in your social computing environment. Your approach to social computing must balance the availability of personal information and privacy. SharePoint 2010 provides personal and enterprise-level security settings that govern access to and visibility of data. Site owners including My Site owners can perform the following tasks Grant permissions for readers editors and content managers. Grant or revoke access to sites individually or by group or organizational role. Open and close comment threads. Enable or disable content ratings. Make only certain content viewable. MCT USE ONLY. STUDENT USE PROHIBITED 8-10 Designing a Microsoft SharePoint 2010 Infrastructure Enact other fine-grained controls to ensure that information does not spread further than policy permits. In terms of content individuals must determine what they feel is appropriate to share and what is not. You can help them by providing firm guidelines that apply to the nature of the content that they post. Enforcing these guidelines is a matter of management education and training not technology. The information in the user profile that is displayed on the user s My Site Web site is accessible to search services. It is also exposed in tags notes ratings and the user s activity feed. Your social computing plan should include how to assess the requirement for privacy