E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets /
Saved in:
Author / Creator: | Overly, Michael R. |
---|---|
Imprint: | New York : AMACOM, c1999. |
Description: | x, 146 p. ; 24 cm. |
Language: | English |
Subject: | |
Format: | Print Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/3357593 |
Table of Contents:
- Pt. I. Getting Your Feet Wet. Ch. 1. E-mail: The Prime Mover
- Pt. II. Potential Claims by Employees. Ch. 2. Employee Privacy Rights: To Peek or Not to Peek, That is the Question. Ch. 3. Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities? Ch. 4. Discrimination and Harassment: Avoiding a Hostile Work Environment
- Pt. III. Potential Claims by Third Persons. Ch. 5. Copyright: Think Before You Cut and Paste. Ch. 6. Defamation: Can I Say That? Ch. 7. Spamming: Too Much of a Good Thing
- Pt. IV. Protecting Corporate Information and Resources. Ch. 8. Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets. Ch. 9. Attorney-Client Communications Using E-mail: Are They Protected? Ch. 10. Computer Security. Ch. 11. Preventing Waste of Computer Resources
- Pt. V. Putting It All Together: Constructing An E-Mail and Computer Use Policy. Ch. 12. Six Essentials for Every Good Policy. Ch. 13. Ensuring Employee Compliance with Policies: Education, Education, Education ... App. A. Example Policies
- App. B. Selected Laws and Regulations.