By Michael R. Overly
This article offers step by step directions for growing updated, legally sound guidelines that explicitly outline the rights and tasks of staff while utilizing email and the web.
Read Online or Download E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets PDF
Best human resources & personnel management books
From an the world over revered specialist on administration issues comes this totally revised 10th anniversary version of his vintage textbook.
Potency in studying bargains a street map of the best how one can use the 3 basic communique of teaching: visuals, written textual content, and audio. despite the way you are offering your education materials—in the study room, in print, by means of synchronous or asynchronous media—the book’s tools are simply utilized on your lesson shows, handouts, reference courses, or e-learning displays.
Approximately all managers dream of being inspiring leaders who elicit the main from their humans. yet whereas they could comprehend the abilities had to deal with their groups, only a few know the way to place their wisdom into perform. Now, any supervisor can get unheard of effects and make a major contribution to the association.
Solution the questions that come up whilst managers and employees have to comply with surprising management roles and principles in flattened organizational types. top if you are now not the Boss offers a conceptual framework so you might practice while assessing your personal companies and paintings. The e-book discusses the underlying principles worthwhile for a shift from a tradition of hierarchies to 1 of relationships and the institution of intrapreneurial and holistic paintings environments.
- Measuring and Maximizing Training Impact: Bridging the Gap between Training and Business Results
- Get Weird! 101 Innovative Ways to Make Your Company a Great Place to Work
- The Talent Advantage: How to Attract and Retain the Best and the Brightest
- Change, Conflict and Community: Challenging Thought and Action (The HR Series)
- Evaluating human resources programs : a 6-phase approach for optimizing performance
Extra info for E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets
3 Page 32 Although an employer may not generally prohibit all organizing activities by employees, it may restrict the times and locations in which its facilities are used for organizing. In particular, employees do not have a statutory right to use their employer's computer system for any reason-personal or labor-organizational-other than to assist them in carrying out work-related duties. 4 For example, E. I. , allegedly had permitted employees to use e-mail for a wide variety of purposes, including personal use, that had nothing to do with the company's business.
10 One of the motivating forces for the amendment was a 1985 Congressional study that graphically described potential threats that new technology posed to citizen's civil liberties. Congress passed the ECPA in part to address deficiencies in individual privacy protections. It remains unclear how the ECPA applies to computer networks operated by private businesses. However, the ECPA is likely to apply if the business's private network has the ability to send and receive messages over external networks such Page 26 as the Internet.
2 million to settle a sexual harassment lawsuit brought by a large group of women who alleged, among other things, that a subsidiary of Chevron permitted its internal e-mail system to be used for transmit- Page 13 ting sexually offensive messages. " Ease of Misaddressing Because e-mail is typically addressed by selecting the recipient's name from an online directory, it is very easy to click on the wrong name and send the message to an unintended person. This is a particular problem when you are sending a message to multiple recipients, and it may not be obvious that you included an incorrect name in the "To:" field of the e-mail.
E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets by Michael R. Overly