Download PDF by Michael R. Overly: E-Policy: How to Develop Computer, E-mail, and Internet

By Michael R. Overly

ISBN-10: 0585000484

ISBN-13: 9780585000480

ISBN-10: 0814479960

ISBN-13: 9780814479964

This article offers step by step directions for growing updated, legally sound guidelines that explicitly outline the rights and tasks of staff while utilizing email and the web.

Show description

Read Online or Download E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets PDF

Best human resources & personnel management books

A Handbook of Human Resource Management Practice by Michael Armstrong, Stephen Taylor PDF

From an the world over revered specialist on administration issues comes this totally revised 10th anniversary version of his vintage textbook.

Efficiency in Learning: Evidence-Based Guidelines to Manage by Ruth C. Clark, Frank Nguyen, John Sweller PDF

Potency in studying bargains a street map of the best how one can use the 3 basic communique of teaching: visuals, written textual content, and audio. despite the way you are offering your education materials—in the study room, in print, by means of synchronous or asynchronous media—the book’s tools are simply utilized on your lesson shows, handouts, reference courses, or e-learning displays.

Becoming an extraordinary manager : the 5 essentials for - download pdf or read online

Approximately all managers dream of being inspiring leaders who elicit the main from their humans. yet whereas they could comprehend the abilities had to deal with their groups, only a few know the way to place their wisdom into perform. Now, any supervisor can get unheard of effects and make a major contribution to the association.

Get Leading When You're Not the Boss: How to Get Things Done in PDF

Solution the questions that come up whilst managers and employees have to comply with surprising management roles and principles in flattened organizational types. top if you are now not the Boss offers a conceptual framework so you might practice while assessing your personal companies and paintings. The e-book discusses the underlying principles worthwhile for a shift from a tradition of hierarchies to 1 of relationships and the institution of intrapreneurial and holistic paintings environments.

Extra info for E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets

Example text

3 Page 32 Although an employer may not generally prohibit all organizing activities by employees, it may restrict the times and locations in which its facilities are used for organizing. In particular, employees do not have a statutory right to use their employer's computer system for any reason-personal or labor-organizational-other than to assist them in carrying out work-related duties. 4 For example, E. I. , allegedly had permitted employees to use e-mail for a wide variety of purposes, including personal use, that had nothing to do with the company's business.

10 One of the motivating forces for the amendment was a 1985 Congressional study that graphically described potential threats that new technology posed to citizen's civil liberties. Congress passed the ECPA in part to address deficiencies in individual privacy protections. It remains unclear how the ECPA applies to computer networks operated by private businesses. However, the ECPA is likely to apply if the business's private network has the ability to send and receive messages over external networks such Page 26 as the Internet.

2 million to settle a sexual harassment lawsuit brought by a large group of women who alleged, among other things, that a subsidiary of Chevron permitted its internal e-mail system to be used for transmit- Page 13 ting sexually offensive messages. " Ease of Misaddressing Because e-mail is typically addressed by selecting the recipient's name from an online directory, it is very easy to click on the wrong name and send the message to an unintended person. This is a particular problem when you are sending a message to multiple recipients, and it may not be obvious that you included an incorrect name in the "To:" field of the e-mail.

Download PDF sample

E-Policy: How to Develop Computer, E-mail, and Internet Guidelines to Protect Your Company and Its Assets by Michael R. Overly


by Jeff
4.5

Rated 4.07 of 5 – based on 12 votes