Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: Instant Messaging Is Used by Someone in Nearly Every U.S. Company
Real-Life E-Disaster Story:
Brokers Instant Messaging with No Regard for Regulatory Rules
Real-Life E-Disaster Story:
Instant Messaging Viruses on the Rise
Real-Life E-Disaster Story:
Deception by Unscrupulous Outsiders
Chapter 2: Uncovering Unauthorized Instant Messaging Use in Your Office
Sample Instant Messaging Survey Memo
Sample Instant Messaging Usage Questionnaire for Employees
Chapter 3: What’s the Best Way to Manage Employees’ Instant Messaging Use?
Real-Life E-Disaster Story:
IT Consultant Circumvents Instant Messaging Ban
Real-Life E-Disaster Story:
50,000 Employees Protest Instant Messaging Shutoff
Real-Life E-Disaster Story:
Employers Favor Instant Messaging Over E-Mail in Battle Against Spam
Real-Life E-Disaster Story:
Private Messages Travel via Public Networks
Chapter 6: Instant Messaging Creates Business Challenges and Legal Headaches
Real-Life E-Disaster Story:
Instant Messaging Evidence Supports Conviction
Real-Life E-Disaster Story:
Employer Liable for Supervisor’s Sexual Harassment.
Real-Life E-Disaster Story:
E-Mail Evidence Leads to $3.75 Billion Settlement
Chapter 7: Instant Messaging Compounds Confidentiality Concerns
Real-Life E-Disaster Story:
Customer Data at Risk of Identity Theft
Sample Record Ownership Statement
Real-Life E-Disaster Story:
Instant Messaging Leaks Sink Corporate Ships
Real-Life E-Disaster Story:
The CFO Seeks Revenge via Instant Messaging
Sample Confidentiality Statement
Chapter 8: Protecting Privacy in the Instant Messaging World: Prying Eyes May Be Reading Over Your Electronic Shoulder
Real-Life E-Disaster Story:
No Expectation of Privacy on Work Computer
Real Life E-Disaster Story:
The E-Love Note Read Around the World
Sample Privacy Statement
Chapter 9: Use Written Rules and Policies to Enforce Your Strategic Instant Messaging Management Plan
Real-Life E-Disaster Story:
650 ‘‘Shockingly Explicit’’ Personal E-Mails Lead to Termination
Sample Personal Use Statement
Real-Life E-Disaster Story:
Personal Use Brings Down the Company E-Mail System
Chapter 10: What Constitutes Appropriate (and Inappropriate) Instant Messaging Content?
Real-Life E-Disaster Story:
Can Your Company or Industry Afford a High-Profile Instant Messaging Gaffe?
Real-Life E-Disaster Story:
It Was No Laughing Matter When the Joke Triggered a Lawsuit
Real-Life E-Disaster Story:
E-Mail Reveals Negative Attitude Toward Women
Sample Content Statement
Sample Content Statement
Chapter 11: Retaining Instant Messaging Business Records Is a Legal Necessity—and a Business Challenge
Real-Life E-Disaster Story:
E-Mail Content Delivers Damning Evidence
Chapter 12: How to Manage Instant Messaging Business Record Retention
Real-Life E-Disaster Story:
Failure to Adhere to Policy Costs Millions
Real-Life E-Disaster Story:
Unsurpassed Growth for Unmanaged Instant Messaging.
Real-Life E-Disaster Story:
Personal Messages Return to Haunt Employees Years After Transmission
Chapter 13: Instant Messaging Discovery: Locating Evidence—For or Against You
Real Life E-Disaster Story:
Manufacturer of E-Mail Backup Systems Fails to Back Up Its Own E-Mail
Real-Life E-Disaster Story:
Missing E-Mail Costs Brokerage $100,000
Real-Life E-Disaster Story:
E-Mail Retention Gaffe Triggers $1 Million Fine
Chapter 14: Beware the Destruction of Instant Messaging Evidence
Real-Life E-Disaster Story:
The Investment Banker’s E-Mail Triggers Obstruction of Justice Charge
Real-Life E-Disaster Story:
Company Ruled Negligent for Destroying E-Mail Evidence
Chapter 17: Instant Messaging Is Big on Wall Street
Real-Life E-Disaster Story:
Regulators Turn Their Attention to Instant Messaging
Real-Life E-Disaster Story:
Failure to Retain E-Mail Records Is a Multimillion-Dollar Mistake
Chapter 19: Instant Messaging Regulations Extend to Main Street, Too
Real-Life E-Disaster Story:
University Locks Up Students’ E-Records
Previous page
Table of content
Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication
ISBN: 0814472532
EAN: 2147483647
Year: 2003
Pages: 241
Authors:
Nancy Flynn
BUY ON AMAZON
Qshell for iSeries
Using Parameters and Variables
Input and Output
Commands
Grep
The Perl Utility
Beginning Cryptography with Java
Symmetric Key Cryptography
Asymmetric Key Cryptography
Key and Certificate Management Using Keystores
CMS and S/MIME
SSL and TLS
Certified Ethical Hacker Exam Prep
Footprinting and Scanning
An Overview of TrojansThe History of Trojans
Sniffers
Wireless Technologies, Security, and Attacks
Ethics and Legality
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Creating a Struts-based MVC Application
Form Presentation and Validation with Struts
Building a Data Access Tier with ObjectRelationalBridge
Creating a Search Engine with Lucene
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Working with Excel Objects
Working with the MAPIFolder Object
Outlook Issues
Advanced Topic: Dynamic Host Items
Conclusion
Special Edition Using FileMaker 8
FileMaker Extra: Indexing in FileMaker
Working with Custom Menus
Troubleshooting
Using an IWP Solution
Working with Web Services
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies