Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: Instant Messaging Is Used by Someone in Nearly Every U.S. Company
Real-Life E-Disaster Story:
Brokers Instant Messaging with No Regard for Regulatory Rules
Real-Life E-Disaster Story:
Instant Messaging Viruses on the Rise
Real-Life E-Disaster Story:
Deception by Unscrupulous Outsiders
Chapter 2: Uncovering Unauthorized Instant Messaging Use in Your Office
Sample Instant Messaging Survey Memo
Sample Instant Messaging Usage Questionnaire for Employees
Chapter 3: What’s the Best Way to Manage Employees’ Instant Messaging Use?
Real-Life E-Disaster Story:
IT Consultant Circumvents Instant Messaging Ban
Real-Life E-Disaster Story:
50,000 Employees Protest Instant Messaging Shutoff
Real-Life E-Disaster Story:
Employers Favor Instant Messaging Over E-Mail in Battle Against Spam
Real-Life E-Disaster Story:
Private Messages Travel via Public Networks
Chapter 6: Instant Messaging Creates Business Challenges and Legal Headaches
Real-Life E-Disaster Story:
Instant Messaging Evidence Supports Conviction
Real-Life E-Disaster Story:
Employer Liable for Supervisor’s Sexual Harassment.
Real-Life E-Disaster Story:
E-Mail Evidence Leads to $3.75 Billion Settlement
Chapter 7: Instant Messaging Compounds Confidentiality Concerns
Real-Life E-Disaster Story:
Customer Data at Risk of Identity Theft
Sample Record Ownership Statement
Real-Life E-Disaster Story:
Instant Messaging Leaks Sink Corporate Ships
Real-Life E-Disaster Story:
The CFO Seeks Revenge via Instant Messaging
Sample Confidentiality Statement
Chapter 8: Protecting Privacy in the Instant Messaging World: Prying Eyes May Be Reading Over Your Electronic Shoulder
Real-Life E-Disaster Story:
No Expectation of Privacy on Work Computer
Real Life E-Disaster Story:
The E-Love Note Read Around the World
Sample Privacy Statement
Chapter 9: Use Written Rules and Policies to Enforce Your Strategic Instant Messaging Management Plan
Real-Life E-Disaster Story:
650 ‘‘Shockingly Explicit’’ Personal E-Mails Lead to Termination
Sample Personal Use Statement
Real-Life E-Disaster Story:
Personal Use Brings Down the Company E-Mail System
Chapter 10: What Constitutes Appropriate (and Inappropriate) Instant Messaging Content?
Real-Life E-Disaster Story:
Can Your Company or Industry Afford a High-Profile Instant Messaging Gaffe?
Real-Life E-Disaster Story:
It Was No Laughing Matter When the Joke Triggered a Lawsuit
Real-Life E-Disaster Story:
E-Mail Reveals Negative Attitude Toward Women
Sample Content Statement
Sample Content Statement
Chapter 11: Retaining Instant Messaging Business Records Is a Legal Necessity—and a Business Challenge
Real-Life E-Disaster Story:
E-Mail Content Delivers Damning Evidence
Chapter 12: How to Manage Instant Messaging Business Record Retention
Real-Life E-Disaster Story:
Failure to Adhere to Policy Costs Millions
Real-Life E-Disaster Story:
Unsurpassed Growth for Unmanaged Instant Messaging.
Real-Life E-Disaster Story:
Personal Messages Return to Haunt Employees Years After Transmission
Chapter 13: Instant Messaging Discovery: Locating Evidence—For or Against You
Real Life E-Disaster Story:
Manufacturer of E-Mail Backup Systems Fails to Back Up Its Own E-Mail
Real-Life E-Disaster Story:
Missing E-Mail Costs Brokerage $100,000
Real-Life E-Disaster Story:
E-Mail Retention Gaffe Triggers $1 Million Fine
Chapter 14: Beware the Destruction of Instant Messaging Evidence
Real-Life E-Disaster Story:
The Investment Banker’s E-Mail Triggers Obstruction of Justice Charge
Real-Life E-Disaster Story:
Company Ruled Negligent for Destroying E-Mail Evidence
Chapter 17: Instant Messaging Is Big on Wall Street
Real-Life E-Disaster Story:
Regulators Turn Their Attention to Instant Messaging
Real-Life E-Disaster Story:
Failure to Retain E-Mail Records Is a Multimillion-Dollar Mistake
Chapter 19: Instant Messaging Regulations Extend to Main Street, Too
Real-Life E-Disaster Story:
University Locks Up Students’ E-Records
Previous page
Table of content
Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication
ISBN: 0814472532
EAN: 2147483647
Year: 2003
Pages: 241
Authors:
Nancy Flynn
BUY ON AMAZON
Network Security Architectures
Network Security Axioms
References
FTP
Medium Network Campus Security Design
Conclusions
C++ How to Program (5th Edition)
while Repetition Statement
Exercises
Summary
Exercises
F.5. Conditional Compilation
Visual C# 2005 How to Program (2nd Edition)
User-Defined Controls
Introduction
Terminology
Self-Review Exercises
B.2. Abbreviating Binary Numbers as Octal and Hexadecimal Numbers
Twisted Network Programming Essentials
Installing from Source Files
Working with Asynchronous Results
Providing IMAP Access to Mailboxes
SSH
Providing an Administrative Python Shell
Microsoft VBScript Professional Projects
Arrays
Customizing the Start Menu and Quick Launch Toolbar
Using Configuration Files to Control Script Execution
Converting Reports to HTML Pages
Appendix B Whats on the Companion Web Site
.NET-A Complete Development Cycle
Commonly Used Software Development Models
Our First .NET Application
Project Requirements
Initial Project Planning
Initial Requirements Analysis and Design
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies