Amazon cover image
Image from Amazon.com

E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / Michael R. Overly.

By: Material type: TextTextPublication details: New York : AMACOM, ©1999.Description: 1 online resource (x, 146 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 0585000484
  • 9780585000480
Subject(s): Genre/Form: Additional physical formats: Print version:: E-policy.DDC classification:
  • 658.4/78 21
LOC classification:
  • HD30.38 .O94 1999eb
Online resources:
Contents:
pt. I. Getting Your Feet Wet -- Ch. 1. E-mail: The Prime Mover -- pt. II. Potential Claims by Employees -- Ch. 2. Employee Privacy Rights: To Peek or Not to Peek, That is the Question -- Ch. 3. Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities? -- Ch. 4. Discrimination and Harassment: Avoiding a Hostile Work Environment -- pt. III. Potential Claims by Third Persons -- Ch. 5. Copyright: Think Before You Cut and Paste -- Ch. 6. Defamation: Can I Say That? -- Ch. 7. Spamming: Too Much of a Good Thing -- pt. IV. Protecting Corporate Information and Resources -- Ch. 8. Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets -- Ch. 9. Attorney-Client Communications Using E-mail: Are They Protected? -- Ch. 10. Computer Security -- Ch. 11. Preventing Waste of Computer Resources -- pt. V. Putting It All Together: Constructing An E-Mail and Computer Use Policy -- Ch. 12. Six Essentials for Every Good Policy -- Ch. 13. Ensuring Employee Compliance with Policies: Education, Education, Education ... -- App. A. Example Policies -- App. B. Selected Laws and Regulations.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Business Available
Total holds: 0

Includes indexes.

Print version record.

pt. I. Getting Your Feet Wet -- Ch. 1. E-mail: The Prime Mover -- pt. II. Potential Claims by Employees -- Ch. 2. Employee Privacy Rights: To Peek or Not to Peek, That is the Question -- Ch. 3. Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities? -- Ch. 4. Discrimination and Harassment: Avoiding a Hostile Work Environment -- pt. III. Potential Claims by Third Persons -- Ch. 5. Copyright: Think Before You Cut and Paste -- Ch. 6. Defamation: Can I Say That? -- Ch. 7. Spamming: Too Much of a Good Thing -- pt. IV. Protecting Corporate Information and Resources -- Ch. 8. Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets -- Ch. 9. Attorney-Client Communications Using E-mail: Are They Protected? -- Ch. 10. Computer Security -- Ch. 11. Preventing Waste of Computer Resources -- pt. V. Putting It All Together: Constructing An E-Mail and Computer Use Policy -- Ch. 12. Six Essentials for Every Good Policy -- Ch. 13. Ensuring Employee Compliance with Policies: Education, Education, Education ... -- App. A. Example Policies -- App. B. Selected Laws and Regulations.

Access to Internet version restricted to York University faculty, staff and students.

Powered by Koha