• Complain

Michael R. Overly - E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets

Here you can read online Michael R. Overly - E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 1998, publisher: AMACOM, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets
  • Author:
  • Publisher:
    AMACOM
  • Genre:
  • Year:
    1998
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This text provides step-by-step guidelines for creating up-to-date, legally sound policies that explicitly define the rights and obligations of employees when using e-mail and the Internet.

Michael R. Overly: author's other books


Who wrote E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets? Find out the surname, the name of the author of the book and a list of all author's works by series.

E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Page iii e-policy How to Develop Computer E-policy and Internet - photo 1
Page iii
e-policy
How to Develop Computer,
E-policy, and Internet Guidelines
to Protect Your Company
and Its Assets
Michael R. Overly
AMACOM
AMERICAN MANAGEMENT ASSOCIATION
New York Atlanta Boston Chicago Kansas City San Francisco Washington, D.C.
Brussels Mexico City Tokyo Toronto

title:E-policy : How to Develop Computer, E-policy, and Internet Guidelines to Protect Your Company and Its Assets
author:Overly, Michael R.
publisher:AMACOM Books
isbn10 | asin:0814479960
print isbn13:9780814479964
ebook isbn13:9780585000480
language:English
subjectBusiness enterprises--Computer networks--Security measures, Computer security, Electronic mail systems--Security measures.
publication date:1999
lcc:HD30.38.O94 1999eb
ddc:658.4/78
subject:Business enterprises--Computer networks--Security measures, Computer security, Electronic mail systems--Security measures.
Page iv
This book is available at a special discount when ordered in bulk quantities. For information, contact Special Sales Department, AMACOM, a division of American Management Association, 1601 Broadway, New York, NY 10019.
This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional service. If legal advice or other expert assistance is required, the services of a competent professional person should be sought.
Library of Congress Cataloging-in-Publication Data
Overly, Michael R.
E-policy: how to develop computer, E-mail, and Internet
guidelines to protect your company and its assets / Michael R.
Overly.
p. cm.
Includes index.
ISBN 0-8144-7996-0
1. Business enterprisesComputer networksSecurity measures.
2. Computer security. 3. Electronic mail systemsSecurity
measures. I. Title.
HD30.38.094 1999
658.4'78dc21
98-26077
CIP
1999 Michael R. Overly
All rights reserved.
Printed in the United States of America.
This publication may not be reproduced, stored in a retrieval system, or transmitted in whole or in part, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of AMACOM, a division of American Management Association, 1601 Broadway, New York, NY 10019.
Printing number
10987654321
Page v
The law in this area changes rapidly and is subject to differing interpretations. It is up to the reader to review the current state of the law with a qualified attorney before relying on it. Neither the author or the publisher of this book makes any guarantees or warranties regarding the outcome of the uses to which the material is put. This book is sold with the understanding that the author and publisher are not engaged in rendering legal or professional service. If legal advice or other professional assistance is required, the services of a competent person should be sought. Purchasing this book does not create an attorney-client relationship.
Page vii
Contents
Foreword
ix
PART I
GETTING YOUR FEET WET
1
Introduction
3
Chapter I
E-mail: The Prime Mover
7
PART II
POTENTIAL CLAIMS BY EMPLOYEES
21
Chapter 2
Employee Privacy Rights: To Peek or Not to Peek, That Is the Question
23
Chapter 3
Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities?
31
Chapter 4
Discrimination and Harassment: Avoiding a Hostile Work Environment
36
PART III
POTENTIAL CLAIMS BY THIRD PERSONS
41
Chapter 5
Copyright: Think Before You Cut and Paste
43
Chapter 6
Defamation: Can I Say That?
49
Chapter 7
Spamming: Too Much of a Good Thing
54
PART IV
PROTECTING CORPORATE INFORMATION AND RESOURCES
57
Chapter 8
Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets
59
Chapter 9
Attorney-Client Communications Using E-mail: Are They Protected?
66
Chapter 10
Computer Security
71
Chapter 11
Preventing Waste of Computer Resources
82

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets»

Look at similar books to E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets»

Discussion, reviews of the book E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.