E-policy :: how to develop computer, E-policy, and Internet guidelines to protect your company and its assets /
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York :
AMACOM,
©1999.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | Includes indexes. |
Beschreibung: | 1 online resource (x, 146 pages) |
ISBN: | 0585000484 9780585000480 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm42328398 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 980602s1999 nyu o 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCL |d OCLCQ |d MUQ |d OCLCQ |d YDXCP |d OCLCQ |d TUU |d OCLCQ |d TNF |d OCLCQ |d OCLCF |d P4I |d NLGGC |d OCLCO |d OCLCQ |d NAM |d OCLCQ |d SCL |d OCLCQ |d AGLDB |d C@V |d VGM |d OCLCQ |d SAV |d OCLCA |d LUE |d WRM |d VNS |d INARC |d VTS |d CEF |d OCLCQ |d TOF |d WYU |d BRX |d YOU |d TKN |d STF |d M8D |d JX9 |d OCLCQ |d NJT |d UKSSU |d IBQ |d LDP |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 45816765 |a 649234321 |a 760289250 |a 961577665 |a 962704825 |a 1038651118 |a 1077831463 |a 1154952475 |a 1156850771 |a 1162404306 |a 1241940735 | ||
020 | |a 0585000484 |q (electronic bk.) | ||
020 | |a 9780585000480 |q (electronic bk.) | ||
020 | |z 0814479960 | ||
035 | |a (OCoLC)42328398 |z (OCoLC)45816765 |z (OCoLC)649234321 |z (OCoLC)760289250 |z (OCoLC)961577665 |z (OCoLC)962704825 |z (OCoLC)1038651118 |z (OCoLC)1077831463 |z (OCoLC)1154952475 |z (OCoLC)1156850771 |z (OCoLC)1162404306 |z (OCoLC)1241940735 | ||
050 | 4 | |a HD30.38 |b .O94 1999eb | |
072 | 7 | |a BUS |x 097000 |2 bisacsh | |
072 | 7 | |a BUS |x 104000 |2 bisacsh | |
072 | 7 | |a BUS |x 071000 |2 bisacsh | |
072 | 7 | |a BUS |x 103000 |2 bisacsh | |
082 | 7 | |a 658.4/78 |2 21 | |
049 | |a MAIN | ||
100 | 1 | |a Overly, Michael R. |0 http://id.loc.gov/authorities/names/n98050541 | |
245 | 1 | 0 | |a E-policy : |b how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / |c Michael R. Overly. |
260 | |a New York : |b AMACOM, |c ©1999. | ||
300 | |a 1 online resource (x, 146 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Includes indexes. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a pt. I. Getting Your Feet Wet -- Ch. 1. E-mail: The Prime Mover -- pt. II. Potential Claims by Employees -- Ch. 2. Employee Privacy Rights: To Peek or Not to Peek, That is the Question -- Ch. 3. Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities? -- Ch. 4. Discrimination and Harassment: Avoiding a Hostile Work Environment -- pt. III. Potential Claims by Third Persons -- Ch. 5. Copyright: Think Before You Cut and Paste -- Ch. 6. Defamation: Can I Say That? -- Ch. 7. Spamming: Too Much of a Good Thing -- pt. IV. Protecting Corporate Information and Resources -- Ch. 8. Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets -- Ch. 9. Attorney-Client Communications Using E-mail: Are They Protected? -- Ch. 10. Computer Security -- Ch. 11. Preventing Waste of Computer Resources -- pt. V. Putting It All Together: Constructing An E-Mail and Computer Use Policy -- Ch. 12. Six Essentials for Every Good Policy -- Ch. 13. Ensuring Employee Compliance with Policies: Education, Education, Education ... -- App. A. Example Policies -- App. B. Selected Laws and Regulations. | |
546 | |a English. | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh95010367 | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Electronic mail systems |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh2005003449 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Entreprises |x Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Courrier électronique |x Sécurité |x Mesures. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Workplace Culture. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Corporate Governance. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Leadership. |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS |x Organizational Development. |2 bisacsh | |
650 | 7 | |a Business enterprises |x Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Electronic mail systems |x Security measures |2 fast | |
758 | |i has work: |a E-policy (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGFDTJ7kM49wK6JFGjTj4q |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Overly, Michael R. |t E-policy. |d New York : AMACOM, ©1999 |z 0814479960 |w (DLC) 98026077 |w (OCoLC)39269566 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1902 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a EBSCOhost |b EBSC |n 1902 | ||
938 | |a Internet Archive |b INAR |n epolicyhowtodeve0000over_u4n4 | ||
938 | |a Internet Archive |b INAR |n epolicyhowtodeve0000over | ||
938 | |a YBP Library Services |b YANK |n 2302034 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm42328398 |
---|---|
_version_ | 1816881573163696128 |
adam_text | |
any_adam_object | |
author | Overly, Michael R. |
author_GND | http://id.loc.gov/authorities/names/n98050541 |
author_facet | Overly, Michael R. |
author_role | |
author_sort | Overly, Michael R. |
author_variant | m r o mr mro |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD30 |
callnumber-raw | HD30.38 .O94 1999eb |
callnumber-search | HD30.38 .O94 1999eb |
callnumber-sort | HD 230.38 O94 41999EB |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-4-EBA |
contents | pt. I. Getting Your Feet Wet -- Ch. 1. E-mail: The Prime Mover -- pt. II. Potential Claims by Employees -- Ch. 2. Employee Privacy Rights: To Peek or Not to Peek, That is the Question -- Ch. 3. Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities? -- Ch. 4. Discrimination and Harassment: Avoiding a Hostile Work Environment -- pt. III. Potential Claims by Third Persons -- Ch. 5. Copyright: Think Before You Cut and Paste -- Ch. 6. Defamation: Can I Say That? -- Ch. 7. Spamming: Too Much of a Good Thing -- pt. IV. Protecting Corporate Information and Resources -- Ch. 8. Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets -- Ch. 9. Attorney-Client Communications Using E-mail: Are They Protected? -- Ch. 10. Computer Security -- Ch. 11. Preventing Waste of Computer Resources -- pt. V. Putting It All Together: Constructing An E-Mail and Computer Use Policy -- Ch. 12. Six Essentials for Every Good Policy -- Ch. 13. Ensuring Employee Compliance with Policies: Education, Education, Education ... -- App. A. Example Policies -- App. B. Selected Laws and Regulations. |
ctrlnum | (OCoLC)42328398 |
dewey-full | 658.4/78 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.4/78 |
dewey-search | 658.4/78 |
dewey-sort | 3658.4 278 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04641cam a2200661 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm42328398 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">980602s1999 nyu o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MUQ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TNF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">P4I</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NAM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AGLDB</subfield><subfield code="d">C@V</subfield><subfield code="d">VGM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">WRM</subfield><subfield code="d">VNS</subfield><subfield code="d">INARC</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TOF</subfield><subfield code="d">WYU</subfield><subfield code="d">BRX</subfield><subfield code="d">YOU</subfield><subfield code="d">TKN</subfield><subfield code="d">STF</subfield><subfield code="d">M8D</subfield><subfield code="d">JX9</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NJT</subfield><subfield code="d">UKSSU</subfield><subfield code="d">IBQ</subfield><subfield code="d">LDP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">45816765</subfield><subfield code="a">649234321</subfield><subfield code="a">760289250</subfield><subfield code="a">961577665</subfield><subfield code="a">962704825</subfield><subfield code="a">1038651118</subfield><subfield code="a">1077831463</subfield><subfield code="a">1154952475</subfield><subfield code="a">1156850771</subfield><subfield code="a">1162404306</subfield><subfield code="a">1241940735</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0585000484</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780585000480</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0814479960</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)42328398</subfield><subfield code="z">(OCoLC)45816765</subfield><subfield code="z">(OCoLC)649234321</subfield><subfield code="z">(OCoLC)760289250</subfield><subfield code="z">(OCoLC)961577665</subfield><subfield code="z">(OCoLC)962704825</subfield><subfield code="z">(OCoLC)1038651118</subfield><subfield code="z">(OCoLC)1077831463</subfield><subfield code="z">(OCoLC)1154952475</subfield><subfield code="z">(OCoLC)1156850771</subfield><subfield code="z">(OCoLC)1162404306</subfield><subfield code="z">(OCoLC)1241940735</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD30.38</subfield><subfield code="b">.O94 1999eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">097000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">104000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">071000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">103000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.4/78</subfield><subfield code="2">21</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Overly, Michael R.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n98050541</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">E-policy :</subfield><subfield code="b">how to develop computer, E-policy, and Internet guidelines to protect your company and its assets /</subfield><subfield code="c">Michael R. Overly.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">New York :</subfield><subfield code="b">AMACOM,</subfield><subfield code="c">©1999.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (x, 146 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes indexes.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">pt. I. Getting Your Feet Wet -- Ch. 1. E-mail: The Prime Mover -- pt. II. Potential Claims by Employees -- Ch. 2. Employee Privacy Rights: To Peek or Not to Peek, That is the Question -- Ch. 3. Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities? -- Ch. 4. Discrimination and Harassment: Avoiding a Hostile Work Environment -- pt. III. Potential Claims by Third Persons -- Ch. 5. Copyright: Think Before You Cut and Paste -- Ch. 6. Defamation: Can I Say That? -- Ch. 7. Spamming: Too Much of a Good Thing -- pt. IV. Protecting Corporate Information and Resources -- Ch. 8. Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets -- Ch. 9. Attorney-Client Communications Using E-mail: Are They Protected? -- Ch. 10. Computer Security -- Ch. 11. Preventing Waste of Computer Resources -- pt. V. Putting It All Together: Constructing An E-Mail and Computer Use Policy -- Ch. 12. Six Essentials for Every Good Policy -- Ch. 13. Ensuring Employee Compliance with Policies: Education, Education, Education ... -- App. A. Example Policies -- App. B. Selected Laws and Regulations.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95010367</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic mail systems</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2005003449</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Entreprises</subfield><subfield code="x">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Courrier électronique</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Workplace Culture.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Corporate Governance.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Leadership.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Organizational Development.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic mail systems</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">E-policy (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGFDTJ7kM49wK6JFGjTj4q</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Overly, Michael R.</subfield><subfield code="t">E-policy.</subfield><subfield code="d">New York : AMACOM, ©1999</subfield><subfield code="z">0814479960</subfield><subfield code="w">(DLC) 98026077</subfield><subfield code="w">(OCoLC)39269566</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1902</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1902</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">epolicyhowtodeve0000over_u4n4</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">epolicyhowtodeve0000over</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2302034</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm42328398 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:14:51Z |
institution | BVB |
isbn | 0585000484 9780585000480 |
language | English |
oclc_num | 42328398 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (x, 146 pages) |
psigel | ZDB-4-EBA |
publishDate | 1999 |
publishDateSearch | 1999 |
publishDateSort | 1999 |
publisher | AMACOM, |
record_format | marc |
spelling | Overly, Michael R. http://id.loc.gov/authorities/names/n98050541 E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / Michael R. Overly. New York : AMACOM, ©1999. 1 online resource (x, 146 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes indexes. Print version record. pt. I. Getting Your Feet Wet -- Ch. 1. E-mail: The Prime Mover -- pt. II. Potential Claims by Employees -- Ch. 2. Employee Privacy Rights: To Peek or Not to Peek, That is the Question -- Ch. 3. Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities? -- Ch. 4. Discrimination and Harassment: Avoiding a Hostile Work Environment -- pt. III. Potential Claims by Third Persons -- Ch. 5. Copyright: Think Before You Cut and Paste -- Ch. 6. Defamation: Can I Say That? -- Ch. 7. Spamming: Too Much of a Good Thing -- pt. IV. Protecting Corporate Information and Resources -- Ch. 8. Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets -- Ch. 9. Attorney-Client Communications Using E-mail: Are They Protected? -- Ch. 10. Computer Security -- Ch. 11. Preventing Waste of Computer Resources -- pt. V. Putting It All Together: Constructing An E-Mail and Computer Use Policy -- Ch. 12. Six Essentials for Every Good Policy -- Ch. 13. Ensuring Employee Compliance with Policies: Education, Education, Education ... -- App. A. Example Policies -- App. B. Selected Laws and Regulations. English. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Computer security. Electronic mail systems Security measures. http://id.loc.gov/authorities/subjects/sh2005003449 Computer Security https://id.nlm.nih.gov/mesh/D016494 Entreprises Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. Courrier électronique Sécurité Mesures. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Business enterprises Computer networks Security measures fast Computer security fast Electronic mail systems Security measures fast has work: E-policy (Text) https://id.oclc.org/worldcat/entity/E39PCGFDTJ7kM49wK6JFGjTj4q https://id.oclc.org/worldcat/ontology/hasWork Print version: Overly, Michael R. E-policy. New York : AMACOM, ©1999 0814479960 (DLC) 98026077 (OCoLC)39269566 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1902 Volltext |
spellingShingle | Overly, Michael R. E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / pt. I. Getting Your Feet Wet -- Ch. 1. E-mail: The Prime Mover -- pt. II. Potential Claims by Employees -- Ch. 2. Employee Privacy Rights: To Peek or Not to Peek, That is the Question -- Ch. 3. Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities? -- Ch. 4. Discrimination and Harassment: Avoiding a Hostile Work Environment -- pt. III. Potential Claims by Third Persons -- Ch. 5. Copyright: Think Before You Cut and Paste -- Ch. 6. Defamation: Can I Say That? -- Ch. 7. Spamming: Too Much of a Good Thing -- pt. IV. Protecting Corporate Information and Resources -- Ch. 8. Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets -- Ch. 9. Attorney-Client Communications Using E-mail: Are They Protected? -- Ch. 10. Computer Security -- Ch. 11. Preventing Waste of Computer Resources -- pt. V. Putting It All Together: Constructing An E-Mail and Computer Use Policy -- Ch. 12. Six Essentials for Every Good Policy -- Ch. 13. Ensuring Employee Compliance with Policies: Education, Education, Education ... -- App. A. Example Policies -- App. B. Selected Laws and Regulations. Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Computer security. Electronic mail systems Security measures. http://id.loc.gov/authorities/subjects/sh2005003449 Computer Security https://id.nlm.nih.gov/mesh/D016494 Entreprises Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. Courrier électronique Sécurité Mesures. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Business enterprises Computer networks Security measures fast Computer security fast Electronic mail systems Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh95010367 http://id.loc.gov/authorities/subjects/sh2005003449 https://id.nlm.nih.gov/mesh/D016494 |
title | E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / |
title_auth | E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / |
title_exact_search | E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / |
title_full | E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / Michael R. Overly. |
title_fullStr | E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / Michael R. Overly. |
title_full_unstemmed | E-policy : how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / Michael R. Overly. |
title_short | E-policy : |
title_sort | e policy how to develop computer e policy and internet guidelines to protect your company and its assets |
title_sub | how to develop computer, E-policy, and Internet guidelines to protect your company and its assets / |
topic | Business enterprises Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh95010367 Computer security. Electronic mail systems Security measures. http://id.loc.gov/authorities/subjects/sh2005003449 Computer Security https://id.nlm.nih.gov/mesh/D016494 Entreprises Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. Courrier électronique Sécurité Mesures. BUSINESS & ECONOMICS Workplace Culture. bisacsh BUSINESS & ECONOMICS Corporate Governance. bisacsh BUSINESS & ECONOMICS Leadership. bisacsh BUSINESS & ECONOMICS Organizational Development. bisacsh Business enterprises Computer networks Security measures fast Computer security fast Electronic mail systems Security measures fast |
topic_facet | Business enterprises Computer networks Security measures. Computer security. Electronic mail systems Security measures. Computer Security Entreprises Réseaux d'ordinateurs Sécurité Mesures. Sécurité informatique. Courrier électronique Sécurité Mesures. BUSINESS & ECONOMICS Workplace Culture. BUSINESS & ECONOMICS Corporate Governance. BUSINESS & ECONOMICS Leadership. BUSINESS & ECONOMICS Organizational Development. Business enterprises Computer networks Security measures Computer security Electronic mail systems Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1902 |
work_keys_str_mv | AT overlymichaelr epolicyhowtodevelopcomputerepolicyandinternetguidelinestoprotectyourcompanyanditsassets |