E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets /

Saved in:
Bibliographic Details
Author / Creator:Overly, Michael R.
Imprint:New York : AMACOM, c1999.
Description:x, 146 p. ; 24 cm.
Language:English
Subject:
Format: Print Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/3357593
Hidden Bibliographic Details
ISBN:0814479960 (pbk.)
Notes:Includes indexes.
Table of Contents:
  • Pt. I. Getting Your Feet Wet. Ch. 1. E-mail: The Prime Mover
  • Pt. II. Potential Claims by Employees. Ch. 2. Employee Privacy Rights: To Peek or Not to Peek, That is the Question. Ch. 3. Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities? Ch. 4. Discrimination and Harassment: Avoiding a Hostile Work Environment
  • Pt. III. Potential Claims by Third Persons. Ch. 5. Copyright: Think Before You Cut and Paste. Ch. 6. Defamation: Can I Say That? Ch. 7. Spamming: Too Much of a Good Thing
  • Pt. IV. Protecting Corporate Information and Resources. Ch. 8. Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets. Ch. 9. Attorney-Client Communications Using E-mail: Are They Protected? Ch. 10. Computer Security. Ch. 11. Preventing Waste of Computer Resources
  • Pt. V. Putting It All Together: Constructing An E-Mail and Computer Use Policy. Ch. 12. Six Essentials for Every Good Policy. Ch. 13. Ensuring Employee Compliance with Policies: Education, Education, Education ... App. A. Example Policies
  • App. B. Selected Laws and Regulations.