Cisco Spark Compliance
Organisations using Cisco Spark need access to the content stored in their spaces for compliance and governance purposes..
Compliance that works on encrypted content (Spring 2017)Organizations using Cisco Spark need access to the content stored in their spaces for compliance and governance purposes.
The Cisco Spark compliance module is a distributed component in the Cisco Spark security architecture that sits in the security realm along with the Key Management Server (KMS). The Cisco Spark compliance module works with the encrypted content in the Cisco Spark Platform and produces a clear-text feed of activities and content to enable monitoring and extraction into a separate company-owned repository.
The search and extraction console for eDiscovery is the first tool in the Cisco Spark compliance portfolio to use the Cisco Spark compliance module to provide ad-hoc access to data.
Extraction console for eDiscovery and auditing (Spring 2017)Cisco Spark compliance administrators with sufficient access privileges can query Cisco Spark for content in the spaces they own and download the results in the form of a JSON or CSV file. Results can be imported into Microsoft Excel or full eDiscovery software for further processing.
The Cisco Spark compliance console supports search based on space ID, email ID, date, keywords, or a combination of attributes.
The resulting space activity details and content, including text messages and file names, sizes, types, and URLs , are consolidated in the form of a CSV or JSON file. Files (pictures, Microsoft Office documents, PDFs, etc.) are also attached in original format.
Organization-wide retention policy (Spring 2017)
n the Cisco Cloud Collaboration Management portal (CCM), Cisco Spark administrators can define how long content is stored in all the spaces owned by the organization. Cisco Spark will delete messages and files when their timestamps match the retention limit. The default for this setting is “indefinitely”.
Users can view the retention policy of spaces in which they are participating, by accessing the information icon.
Mobile device management (Spring 2017)Mobile devices running Cisco Spark can be further secured by requiring that the PIN device be configured. This is an organization-wide admin setting. This is in addition to all Cisco Spark content being encrypted at-rest in the device.
Administrators can force the Cisco Spark browser session to time out when accessing Cisco Spark outside of the company’s intranet. This offers protection against users leaving browser sessions open inadvertently in public places.