Michael R. Overly - E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets
Here you can read online Michael R. Overly - E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 1998, publisher: AMACOM, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
Book:
E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets
E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
This text provides step-by-step guidelines for creating up-to-date, legally sound policies that explicitly define the rights and obligations of employees when using e-mail and the Internet.
Michael R. Overly: author's other books
Who wrote E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets? Find out the surname, the name of the author of the book and a list of all author's works by series.
E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets — read online for free the complete book (whole text) full work
Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.
How to Develop Computer, E-policy, and Internet Guidelines to Protect Your Company and Its Assets
Michael R. Overly
AMACOM AMERICAN MANAGEMENT ASSOCIATION New York Atlanta Boston Chicago Kansas City San Francisco Washington, D.C. Brussels Mexico City Tokyo Toronto
title
:
E-policy : How to Develop Computer, E-policy, and Internet Guidelines to Protect Your Company and Its Assets
author
:
Overly, Michael R.
publisher
:
AMACOM Books
isbn10 | asin
:
0814479960
print isbn13
:
9780814479964
ebook isbn13
:
9780585000480
language
:
English
subject
Business enterprises--Computer networks--Security measures, Computer security, Electronic mail systems--Security measures.
publication date
:
1999
lcc
:
HD30.38.O94 1999eb
ddc
:
658.4/78
subject
:
Business enterprises--Computer networks--Security measures, Computer security, Electronic mail systems--Security measures.
Page iv
This book is available at a special discount when ordered in bulk quantities. For information, contact Special Sales Department, AMACOM, a division of American Management Association, 1601 Broadway, New York, NY 10019.
This publication is designed to provide accurate and authoritative information in regard to the subject matter covered. It is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional service. If legal advice or other expert assistance is required, the services of a competent professional person should be sought.
Library of Congress Cataloging-in-Publication Data
Overly, Michael R. E-policy: how to develop computer, E-mail, and Internet guidelines to protect your company and its assets / Michael R. Overly. p. cm. Includes index. ISBN 0-8144-7996-0 1. Business enterprisesComputer networksSecurity measures. 2. Computer security. 3. Electronic mail systemsSecurity measures. I. Title. HD30.38.094 1999 658.4'78dc21 98-26077 CIP
1999 Michael R. Overly All rights reserved. Printed in the United States of America.
This publication may not be reproduced, stored in a retrieval system, or transmitted in whole or in part, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of AMACOM, a division of American Management Association, 1601 Broadway, New York, NY 10019.
Printing number 10987654321
Page v
The law in this area changes rapidly and is subject to differing interpretations. It is up to the reader to review the current state of the law with a qualified attorney before relying on it. Neither the author or the publisher of this book makes any guarantees or warranties regarding the outcome of the uses to which the material is put. This book is sold with the understanding that the author and publisher are not engaged in rendering legal or professional service. If legal advice or other professional assistance is required, the services of a competent person should be sought. Purchasing this book does not create an attorney-client relationship.
Page vii
Contents
Foreword
ix
PART I
GETTING YOUR FEET WET
1
Introduction
3
Chapter I
E-mail: The Prime Mover
7
PART II
POTENTIAL CLAIMS BY EMPLOYEES
21
Chapter 2
Employee Privacy Rights: To Peek or Not to Peek, That Is the Question
23
Chapter 3
Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities?
31
Chapter 4
Discrimination and Harassment: Avoiding a Hostile Work Environment
36
PART III
POTENTIAL CLAIMS BY THIRD PERSONS
41
Chapter 5
Copyright: Think Before You Cut and Paste
43
Chapter 6
Defamation: Can I Say That?
49
Chapter 7
Spamming: Too Much of a Good Thing
54
PART IV
PROTECTING CORPORATE INFORMATION AND RESOURCES
57
Chapter 8
Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets
59
Chapter 9
Attorney-Client Communications Using E-mail: Are They Protected?
Similar books «E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets»
Look at similar books to E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.
Reviews about «E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets»
Discussion, reviews of the book E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.