Flylib.com
List of Sidebars
Previous page
Table of content
Chapter 1: Instant Messaging Is Used by Someone in Nearly Every U.S. Company
Real-Life E-Disaster Story:
Brokers Instant Messaging with No Regard for Regulatory Rules
Real-Life E-Disaster Story:
Instant Messaging Viruses on the Rise
Real-Life E-Disaster Story:
Deception by Unscrupulous Outsiders
Chapter 2: Uncovering Unauthorized Instant Messaging Use in Your Office
Sample Instant Messaging Survey Memo
Sample Instant Messaging Usage Questionnaire for Employees
Chapter 3: What’s the Best Way to Manage Employees’ Instant Messaging Use?
Real-Life E-Disaster Story:
IT Consultant Circumvents Instant Messaging Ban
Real-Life E-Disaster Story:
50,000 Employees Protest Instant Messaging Shutoff
Real-Life E-Disaster Story:
Employers Favor Instant Messaging Over E-Mail in Battle Against Spam
Real-Life E-Disaster Story:
Private Messages Travel via Public Networks
Chapter 6: Instant Messaging Creates Business Challenges and Legal Headaches
Real-Life E-Disaster Story:
Instant Messaging Evidence Supports Conviction
Real-Life E-Disaster Story:
Employer Liable for Supervisor’s Sexual Harassment.
Real-Life E-Disaster Story:
E-Mail Evidence Leads to $3.75 Billion Settlement
Chapter 7: Instant Messaging Compounds Confidentiality Concerns
Real-Life E-Disaster Story:
Customer Data at Risk of Identity Theft
Sample Record Ownership Statement
Real-Life E-Disaster Story:
Instant Messaging Leaks Sink Corporate Ships
Real-Life E-Disaster Story:
The CFO Seeks Revenge via Instant Messaging
Sample Confidentiality Statement
Chapter 8: Protecting Privacy in the Instant Messaging World: Prying Eyes May Be Reading Over Your Electronic Shoulder
Real-Life E-Disaster Story:
No Expectation of Privacy on Work Computer
Real Life E-Disaster Story:
The E-Love Note Read Around the World
Sample Privacy Statement
Chapter 9: Use Written Rules and Policies to Enforce Your Strategic Instant Messaging Management Plan
Real-Life E-Disaster Story:
650 ‘‘Shockingly Explicit’’ Personal E-Mails Lead to Termination
Sample Personal Use Statement
Real-Life E-Disaster Story:
Personal Use Brings Down the Company E-Mail System
Chapter 10: What Constitutes Appropriate (and Inappropriate) Instant Messaging Content?
Real-Life E-Disaster Story:
Can Your Company or Industry Afford a High-Profile Instant Messaging Gaffe?
Real-Life E-Disaster Story:
It Was No Laughing Matter When the Joke Triggered a Lawsuit
Real-Life E-Disaster Story:
E-Mail Reveals Negative Attitude Toward Women
Sample Content Statement
Sample Content Statement
Chapter 11: Retaining Instant Messaging Business Records Is a Legal Necessity—and a Business Challenge
Real-Life E-Disaster Story:
E-Mail Content Delivers Damning Evidence
Chapter 12: How to Manage Instant Messaging Business Record Retention
Real-Life E-Disaster Story:
Failure to Adhere to Policy Costs Millions
Real-Life E-Disaster Story:
Unsurpassed Growth for Unmanaged Instant Messaging.
Real-Life E-Disaster Story:
Personal Messages Return to Haunt Employees Years After Transmission
Chapter 13: Instant Messaging Discovery: Locating Evidence—For or Against You
Real Life E-Disaster Story:
Manufacturer of E-Mail Backup Systems Fails to Back Up Its Own E-Mail
Real-Life E-Disaster Story:
Missing E-Mail Costs Brokerage $100,000
Real-Life E-Disaster Story:
E-Mail Retention Gaffe Triggers $1 Million Fine
Chapter 14: Beware the Destruction of Instant Messaging Evidence
Real-Life E-Disaster Story:
The Investment Banker’s E-Mail Triggers Obstruction of Justice Charge
Real-Life E-Disaster Story:
Company Ruled Negligent for Destroying E-Mail Evidence
Chapter 17: Instant Messaging Is Big on Wall Street
Real-Life E-Disaster Story:
Regulators Turn Their Attention to Instant Messaging
Real-Life E-Disaster Story:
Failure to Retain E-Mail Records Is a Multimillion-Dollar Mistake
Chapter 19: Instant Messaging Regulations Extend to Main Street, Too
Real-Life E-Disaster Story:
University Locks Up Students’ E-Records
Previous page
Table of content
Instant Messaging Rules: A Business Guide to Managing Policies, Security, and Legal Issues for Safe IM Communication
ISBN: 0814472532
EAN: 2147483647
Year: 2003
Pages: 241
Authors:
Nancy Flynn
BUY ON AMAZON
Strategies for Information Technology Governance
An Emerging Strategy for E-Business IT Governance
Assessing Business-IT Alignment Maturity
Measuring ROI in E-Commerce Applications: Analysis to Action
Technical Issues Related to IT Governance Tactics: Product Metrics, Measurements and Process Control
Governing Information Technology Through COBIT
FileMaker Pro 8: The Missing Manual
Reports and Summary Fields
The Structure of a Calculation
Replacing Data Using a Calculation
Organizing Complex Scripts
Disable Script Steps
Developing Tablet PC Applications (Charles River Media Programming)
Tablet PC Screen Rotation and Special Buttons
Using Gestures to Control Tablet Media Player
Power Management for the Tablet PC
Using Third-Party Engines
Tablet Fax
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The AJAX Revolution
The Microsoft Client Library for AJAX
The Pulsing Heart of ASP.NET AJAX
The AJAX Control Toolkit
Remote Method Calls with ASP.NET AJAX
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 400: Flexible Cords and Cables
Article 402: Fixture Wires
Notes to Tables
Example D3(a) Industrial Feeders in a Common Raceway
Example No. D6 Maximum Demand for Range Loads
Digital Character Animation 3 (No. 3)
Design Styles
Chapter Eight. Animal Motion
Acting Vs. Animating
Other Techniques
Chapter Ten. Directing and Filmmaking
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies