Chapter 18


  1. Jeff Brandes, ‘‘The Role of Secure Archiving in the E-Mail Life Cycle,’’ Infostor (November 2003), www.infostor.com.

  2. Ibid.

  3. ‘‘2003 E-Mail Rules, Policies, and Practices Survey,’’ conducted by American Management Association, The ePolicy Institute, and Clearswift. Survey findings available online at www.epolicyinstitute.com.

  4. Vontu Press Release, ‘‘62% of Employees Report Incidents at Work That Put Customer Data at Risk for Identity Theft’’ (June 2, 2003). Survey results available at www.vontu.com.

  5. Jane Black, ‘‘Why Offices Are Now Open Secrets,’’ Business-Week Online (September 16, 2003), www.businessweek.com/print/technology/content/sep2003/tc20030916_1563_tc129 .

  6. Phyllis Plitch, ‘‘A Piece of the Action: Corporate Governance Is Hot—And There’s No Shortage of Companies Promising to Help,’’ The Wall Street Journal (October 27, 2003), R9.

  7. Olga Kharif, ‘‘For CFOs, a Crash Course in Tech,’’ Business-WeekOnline (September 30, 2003), www.businessweek.com/technology/content/sep2003/tc20030930_9216_PG1_tc131.htm .

  8. Nancy Flynn and Randolph Kahn, Esq., E-Mail Rules, New York, AMACOM, 2003.




Instant Messaging Rules. A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication
Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication
ISBN: 0814472532
EAN: 2147483647
Year: 2003
Pages: 241
Authors: Nancy Flynn

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net