|
|
|
|
LEADER |
02718nam a2200361 a 4500 |
001 |
1879624 |
005 |
20171111234702.0 |
008 |
980602s1999 nyu o 001 0 eng d |
020 |
|
|
|a 0585000484
|q (electronic bk.)
|
020 |
|
|
|a 9780585000480
|q (electronic bk.)
|z 0814479960
|
040 |
|
|
|a N$T
|b eng
|e pn
|
050 |
|
4 |
|a HD30.38
|b .O94 1999eb
|
100 |
1 |
|
|a Overly, Michael R.
|
245 |
1 |
0 |
|a E-policy :
|b how to develop computer, E-policy, and Internet guidelines to protect your company and its assets /
|c Michael R. Overly.
|
260 |
|
|
|a New York :
|b AMACOM,
|c ©1999.
|
300 |
|
|
|a 1 online resource (x, 146 pages)
|
500 |
|
|
|a Includes indexes.
|
505 |
0 |
|
|a pt. I. Getting Your Feet Wet -- Ch. 1. E-mail: The Prime Mover -- pt. II. Potential Claims by Employees -- Ch. 2. Employee Privacy Rights: To Peek or Not to Peek, That is the Question -- Ch. 3. Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities? -- Ch. 4. Discrimination and Harassment: Avoiding a Hostile Work Environment -- pt. III. Potential Claims by Third Persons -- Ch. 5. Copyright: Think Before You Cut and Paste -- Ch. 6. Defamation: Can I Say That? -- Ch. 7. Spamming: Too Much of a Good Thing -- pt. IV. Protecting Corporate Information and Resources -- Ch. 8. Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets -- Ch. 9. Attorney-Client Communications Using E-mail: Are They Protected? -- Ch. 10. Computer Security -- Ch. 11. Preventing Waste of Computer Resources -- pt. V. Putting It All Together: Constructing An E-Mail and Computer Use Policy -- Ch. 12. Six Essentials for Every Good Policy -- Ch. 13. Ensuring Employee Compliance with Policies: Education, Education, Education ... -- App. A. Example Policies -- App. B. Selected Laws and Regulations.
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Electronic mail systems
|x Security measures.
|
650 |
|
6 |
|a Entreprises
|x Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Courrier électronique
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Workplace Culture.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Corporate Governance.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Leadership.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Development.
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
7 |
|a Computer security.
|
650 |
|
7 |
|a Electronic mail systems
|x Security measures.
|
856 |
4 |
0 |
|u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1902
|
952 |
|
|
|a CY-NiOUC
|b 5a04627b6c5ad14ac1ee78d5
|c 998a
|d 945l
|e -
|t 1
|x m
|z Books
|