E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / Michael R. Overly.
Material type:![Text](/opac-tmpl/lib/famfamfam/BK.png)
- text
- computer
- online resource
- 0585000484
- 9780585000480
- Business enterprises -- Computer networks -- Security measures
- Computer security
- Electronic mail systems -- Security measures
- Computer Security
- Entreprises -- Réseaux d'ordinateurs -- Sécurité -- Mesures
- Sécurité informatique
- Courrier électronique -- Sécurité -- Mesures
- BUSINESS & ECONOMICS -- Workplace Culture
- BUSINESS & ECONOMICS -- Corporate Governance
- BUSINESS & ECONOMICS -- Leadership
- BUSINESS & ECONOMICS -- Organizational Development
- Business enterprises -- Computer networks -- Security measures
- Computer security
- Electronic mail systems -- Security measures
- Management Theory
- Management
- Business & Economics
- 658.4/78 21
- HD30.38 .O94 1999eb
Item type | Home library | Collection | Call number | Materials specified | Status | Date due | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
OPJGU Sonepat- Campus | E-Books EBSCO | Available |
Includes indexes.
Print version record.
pt. I. Getting Your Feet Wet -- Ch. 1. E-mail: The Prime Mover -- pt. II. Potential Claims by Employees -- Ch. 2. Employee Privacy Rights: To Peek or Not to Peek, That is the Question -- Ch. 3. Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities? -- Ch. 4. Discrimination and Harassment: Avoiding a Hostile Work Environment -- pt. III. Potential Claims by Third Persons -- Ch. 5. Copyright: Think Before You Cut and Paste -- Ch. 6. Defamation: Can I Say That? -- Ch. 7. Spamming: Too Much of a Good Thing -- pt. IV. Protecting Corporate Information and Resources -- Ch. 8. Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets -- Ch. 9. Attorney-Client Communications Using E-mail: Are They Protected? -- Ch. 10. Computer Security -- Ch. 11. Preventing Waste of Computer Resources -- pt. V. Putting It All Together: Constructing An E-Mail and Computer Use Policy -- Ch. 12. Six Essentials for Every Good Policy -- Ch. 13. Ensuring Employee Compliance with Policies: Education, Education, Education ... -- App. A. Example Policies -- App. B. Selected Laws and Regulations.
English.
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide
There are no comments on this title.