The E-Policy handbook :: designing and implementing effective E-mail, Internet, and software policies /
Annotation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York :
AMACOM,
2000.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Annotation Publisher Fact Sheet |
Beschreibung: | Includes index. |
Beschreibung: | 1 online resource (xviii, 284 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 081442550X 9780814425503 9780814470916 0814470912 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm47009726 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 010327s2000 nyu ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCL |d OCLCQ |d OCLCG |d OCLCQ |d TUU |d OCLCQ |d TNF |d OCLCO |d OCLCQ |d ZCU |d OCLCQ |d NLGGC |d OCLCQ |d UV0 |d DKDLA |d ADU |d E7B |d B24X7 |d YDXCP |d COO |d OCLCQ |d EBLCP |d OCLCQ |d COCUF |d CNNOR |d PLS |d MOR |d PIFBR |d MERUC |d OCLCQ |d SAV |d OCLCQ |d QT7 |d MNS |d OCLCF |d OCLCQ |d CEF |d MUO |d ICG |d OCLCQ |d INT |d TOF |d OCLCQ |d TKN |d DKC |d AU@ |d OCLCQ |d M8D |d JX9 |d UMK |d OCLCQ |d OCLCO |d OCLCQ |d NNQ |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 228136519 |a 475336773 |a 488812179 |a 533267108 |a 614859804 |a 647482425 |a 664114241 |a 722449642 |a 728040730 |a 756536211 |a 888490163 |a 961584358 |a 961665147 |a 962697570 |a 962724889 |a 975207788 |a 975242552 |a 981989417 |a 982012871 |a 988479544 |a 991918469 |a 995761219 |a 995876079 |a 1005938263 |a 1371443171 | ||
020 | |a 081442550X |q (electronic bk.) | ||
020 | |a 9780814425503 |q (electronic bk.) | ||
020 | |a 9780814470916 |q (pbk.) | ||
020 | |a 0814470912 |q (pbk.) | ||
035 | |a (OCoLC)47009726 |z (OCoLC)228136519 |z (OCoLC)475336773 |z (OCoLC)488812179 |z (OCoLC)533267108 |z (OCoLC)614859804 |z (OCoLC)647482425 |z (OCoLC)664114241 |z (OCoLC)722449642 |z (OCoLC)728040730 |z (OCoLC)756536211 |z (OCoLC)888490163 |z (OCoLC)961584358 |z (OCoLC)961665147 |z (OCoLC)962697570 |z (OCoLC)962724889 |z (OCoLC)975207788 |z (OCoLC)975242552 |z (OCoLC)981989417 |z (OCoLC)982012871 |z (OCoLC)988479544 |z (OCoLC)991918469 |z (OCoLC)995761219 |z (OCoLC)995876079 |z (OCoLC)1005938263 |z (OCoLC)1371443171 | ||
037 | |b 00001432 | ||
050 | 4 | |a HE7551 |b .F58 2000eb | |
072 | 7 | |a COM |x 052000 |2 bisacsh | |
072 | 7 | |a COM |x 037000 |2 bisacsh | |
072 | 7 | |a COM |x 013000 |2 bisacsh | |
072 | 7 | |a COM |x 032000 |2 bisacsh | |
072 | 7 | |a COM |x 018000 |2 bisacsh | |
072 | 7 | |a COM |x 014000 |2 bisacsh | |
072 | 7 | |a COM |x 067000 |2 bisacsh | |
082 | 7 | |a 004/.068 |2 21 | |
049 | |a MAIN | ||
100 | 1 | |a Flynn, Nancy, |d 1956- |1 https://id.oclc.org/worldcat/entity/E39PBJxxbdk9CJhXbyxX6jfcyd |0 http://id.loc.gov/authorities/names/n99280527 | |
245 | 1 | 4 | |a The E-Policy handbook : |b designing and implementing effective E-mail, Internet, and software policies / |c Nancy L. Flynn. |
260 | |a New York : |b AMACOM, |c 2000. | ||
300 | |a 1 online resource (xviii, 284 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
520 | 8 | |a Annotation |b Regulating company e-mail & Internet usage isn't a "big brother" tactic. These days, it's just smart business. That's because trillions of e-mails travel each year through corporate networks & they're not all work-related. From off-color jokes to pornographic images, from software pirates to eBay addicts, digital abuse has left companies wide open to liability risks, security breaches & productivity nosedives. The most effective & least used way for a company to protect itself is by developing clear, comprehensive e-policies. And this completely thorough, up-to-date & readable e-policy survival kit will make it easy. Packed with step-by-step guidelines, sample policies & e-disaster stories, THE E-POLICY HANDBOOK helps readers: Realize the magnitude of e-risks, Understand cyberlaws, Gauge the vulnerability of their organization, Purchase protective cyber-insurance, Write & format top-notch e-policies, Train employees about on-line policies, Draft an e-crisis communications plan & more. | |
520 | 8 | |a Publisher Fact Sheet |b Helps readers realize the magnitude of e-risks, understand cyberlaws, gauge the vulnerability of their organization, purchase protective cyber-insurance, write & formate e-policies, train employees about online policies, & draft & e-crisis communications plan. | |
505 | 0 | |a Intro -- Contents -- Foreword -- Preface -- Getting Started: Assessing Your OrganizationÌs E- Risks -- Introduction -- Forming Your E- Policy Team -- Conducting a Comprehensive E- Audit -- Developing E- Risk Management, E- Security, and E- Insurance Policies to Limit Liabilities -- Cyberlaw Issues -- Developing an Effective E- Risk Management Policy -- A Computer Security Policy to Reduce External Risks -- Using Cyberinsurance Policies to Help Manage E- Risks -- Crafting Effective E- Mail, Internet, and Software Policies -- The Basics of E- Policy Development -- E- Mail Policy Considerations -- A Netiquette Primer for Employees and Managers -- Internet Policy Considerations -- Software Policy Considerations -- Establishing an Electronic Writing Policy for Employees -- E- Writing Guidelines Ensure SpeedyÛ and SafeÛ Communication -- Powerful and Persuasive, Safe and Secure Electronic Writing -- The ABCs of Effective Electronic Business Writing -- Watch Your Cyberlanguage -- Formatting Written E- Policies, E- Mail Messages, and Internet Copy -- Getting Employees On- Board with Your Online Policy -- Rallying the Support of Managers -- Instilling a Sense of E- Policy Ownership among Employees -- Responding to E- Crises and Recapping E- Policy Needs -- Fighting Internet Disaster -- E- Policy Dos and DonÌts -- E- Policy Development and Implementation Checklist for Employers -- Sample E- Mail, Internet, and Computer Use Policies -- Sample E- Risk Management Policy -- Sample Software Usage Policies -- Glossary of Computer and Electronic Writing Terms -- Resources and Expert Sources -- Suggested Reading -- NOTES -- Index. | |
650 | 0 | |a Electronic mail systems |x Management. | |
650 | 0 | |a Information technology |x Management. |0 http://id.loc.gov/authorities/subjects/sh2008006980 | |
650 | 0 | |a Computer network resources |x Management. | |
650 | 0 | |a Computer software |x Management. | |
650 | 6 | |a Courrier électronique |x Gestion. | |
650 | 6 | |a Technologie de l'information |x Gestion. | |
650 | 6 | |a Information électronique |x Gestion. | |
650 | 6 | |a Logiciels |x Gestion. | |
650 | 7 | |a COMPUTERS |x Reference. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Machine Theory. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Literacy. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Information Technology. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Data Processing. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Computer Science. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Hardware |x General. |2 bisacsh | |
650 | 7 | |a Computer software |x Management |2 fast | |
650 | 7 | |a Electronic mail systems |x Management |2 fast | |
650 | 7 | |a Information technology |x Management |2 fast | |
758 | |i has work: |a The e-policy handbook (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGrjQhrQ9vGRRGttQxq6yq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Flynn, Nancy, 1956- |t E-Policy handbook. |d New York : AMACOM, 2000 |z 0814470912 |w (DLC) 00060598 |w (OCoLC)44712949 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=53933 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bkb00000330 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL3001817 | ||
938 | |a ebrary |b EBRY |n ebr10120204 | ||
938 | |a EBSCOhost |b EBSC |n 53933 | ||
938 | |a YBP Library Services |b YANK |n 2343126 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm47009726 |
---|---|
_version_ | 1816881595185889280 |
adam_text | |
any_adam_object | |
author | Flynn, Nancy, 1956- |
author_GND | http://id.loc.gov/authorities/names/n99280527 |
author_facet | Flynn, Nancy, 1956- |
author_role | |
author_sort | Flynn, Nancy, 1956- |
author_variant | n f nf |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HE7551 |
callnumber-raw | HE7551 .F58 2000eb |
callnumber-search | HE7551 .F58 2000eb |
callnumber-sort | HE 47551 F58 42000EB |
callnumber-subject | HE - Transportation and Communications |
collection | ZDB-4-EBA |
contents | Intro -- Contents -- Foreword -- Preface -- Getting Started: Assessing Your OrganizationÌs E- Risks -- Introduction -- Forming Your E- Policy Team -- Conducting a Comprehensive E- Audit -- Developing E- Risk Management, E- Security, and E- Insurance Policies to Limit Liabilities -- Cyberlaw Issues -- Developing an Effective E- Risk Management Policy -- A Computer Security Policy to Reduce External Risks -- Using Cyberinsurance Policies to Help Manage E- Risks -- Crafting Effective E- Mail, Internet, and Software Policies -- The Basics of E- Policy Development -- E- Mail Policy Considerations -- A Netiquette Primer for Employees and Managers -- Internet Policy Considerations -- Software Policy Considerations -- Establishing an Electronic Writing Policy for Employees -- E- Writing Guidelines Ensure SpeedyÛ and SafeÛ Communication -- Powerful and Persuasive, Safe and Secure Electronic Writing -- The ABCs of Effective Electronic Business Writing -- Watch Your Cyberlanguage -- Formatting Written E- Policies, E- Mail Messages, and Internet Copy -- Getting Employees On- Board with Your Online Policy -- Rallying the Support of Managers -- Instilling a Sense of E- Policy Ownership among Employees -- Responding to E- Crises and Recapping E- Policy Needs -- Fighting Internet Disaster -- E- Policy Dos and DonÌts -- E- Policy Development and Implementation Checklist for Employers -- Sample E- Mail, Internet, and Computer Use Policies -- Sample E- Risk Management Policy -- Sample Software Usage Policies -- Glossary of Computer and Electronic Writing Terms -- Resources and Expert Sources -- Suggested Reading -- NOTES -- Index. |
ctrlnum | (OCoLC)47009726 |
dewey-full | 004/.068 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004/.068 |
dewey-search | 004/.068 |
dewey-sort | 14 268 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07201cam a2200793Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm47009726 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">010327s2000 nyu ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TNF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NLGGC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UV0</subfield><subfield code="d">DKDLA</subfield><subfield code="d">ADU</subfield><subfield code="d">E7B</subfield><subfield code="d">B24X7</subfield><subfield code="d">YDXCP</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COCUF</subfield><subfield code="d">CNNOR</subfield><subfield code="d">PLS</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QT7</subfield><subfield code="d">MNS</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CEF</subfield><subfield code="d">MUO</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">TOF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TKN</subfield><subfield code="d">DKC</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">JX9</subfield><subfield code="d">UMK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NNQ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">228136519</subfield><subfield code="a">475336773</subfield><subfield code="a">488812179</subfield><subfield code="a">533267108</subfield><subfield code="a">614859804</subfield><subfield code="a">647482425</subfield><subfield code="a">664114241</subfield><subfield code="a">722449642</subfield><subfield code="a">728040730</subfield><subfield code="a">756536211</subfield><subfield code="a">888490163</subfield><subfield code="a">961584358</subfield><subfield code="a">961665147</subfield><subfield code="a">962697570</subfield><subfield code="a">962724889</subfield><subfield code="a">975207788</subfield><subfield code="a">975242552</subfield><subfield code="a">981989417</subfield><subfield code="a">982012871</subfield><subfield code="a">988479544</subfield><subfield code="a">991918469</subfield><subfield code="a">995761219</subfield><subfield code="a">995876079</subfield><subfield code="a">1005938263</subfield><subfield code="a">1371443171</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">081442550X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780814425503</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780814470916</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0814470912</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)47009726</subfield><subfield code="z">(OCoLC)228136519</subfield><subfield code="z">(OCoLC)475336773</subfield><subfield code="z">(OCoLC)488812179</subfield><subfield code="z">(OCoLC)533267108</subfield><subfield code="z">(OCoLC)614859804</subfield><subfield code="z">(OCoLC)647482425</subfield><subfield code="z">(OCoLC)664114241</subfield><subfield code="z">(OCoLC)722449642</subfield><subfield code="z">(OCoLC)728040730</subfield><subfield code="z">(OCoLC)756536211</subfield><subfield code="z">(OCoLC)888490163</subfield><subfield code="z">(OCoLC)961584358</subfield><subfield code="z">(OCoLC)961665147</subfield><subfield code="z">(OCoLC)962697570</subfield><subfield code="z">(OCoLC)962724889</subfield><subfield code="z">(OCoLC)975207788</subfield><subfield code="z">(OCoLC)975242552</subfield><subfield code="z">(OCoLC)981989417</subfield><subfield code="z">(OCoLC)982012871</subfield><subfield code="z">(OCoLC)988479544</subfield><subfield code="z">(OCoLC)991918469</subfield><subfield code="z">(OCoLC)995761219</subfield><subfield code="z">(OCoLC)995876079</subfield><subfield code="z">(OCoLC)1005938263</subfield><subfield code="z">(OCoLC)1371443171</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="b">00001432</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HE7551</subfield><subfield code="b">.F58 2000eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">052000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">037000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">013000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">018000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">067000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004/.068</subfield><subfield code="2">21</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Flynn, Nancy,</subfield><subfield code="d">1956-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJxxbdk9CJhXbyxX6jfcyd</subfield><subfield code="0">http://id.loc.gov/authorities/names/n99280527</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The E-Policy handbook :</subfield><subfield code="b">designing and implementing effective E-mail, Internet, and software policies /</subfield><subfield code="c">Nancy L. Flynn.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">New York :</subfield><subfield code="b">AMACOM,</subfield><subfield code="c">2000.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xviii, 284 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">Regulating company e-mail & Internet usage isn't a "big brother" tactic. These days, it's just smart business. That's because trillions of e-mails travel each year through corporate networks & they're not all work-related. From off-color jokes to pornographic images, from software pirates to eBay addicts, digital abuse has left companies wide open to liability risks, security breaches & productivity nosedives. The most effective & least used way for a company to protect itself is by developing clear, comprehensive e-policies. And this completely thorough, up-to-date & readable e-policy survival kit will make it easy. Packed with step-by-step guidelines, sample policies & e-disaster stories, THE E-POLICY HANDBOOK helps readers: Realize the magnitude of e-risks, Understand cyberlaws, Gauge the vulnerability of their organization, Purchase protective cyber-insurance, Write & format top-notch e-policies, Train employees about on-line policies, Draft an e-crisis communications plan & more.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Publisher Fact Sheet</subfield><subfield code="b">Helps readers realize the magnitude of e-risks, understand cyberlaws, gauge the vulnerability of their organization, purchase protective cyber-insurance, write & formate e-policies, train employees about online policies, & draft & e-crisis communications plan.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Contents -- Foreword -- Preface -- Getting Started: Assessing Your OrganizationÌs E- Risks -- Introduction -- Forming Your E- Policy Team -- Conducting a Comprehensive E- Audit -- Developing E- Risk Management, E- Security, and E- Insurance Policies to Limit Liabilities -- Cyberlaw Issues -- Developing an Effective E- Risk Management Policy -- A Computer Security Policy to Reduce External Risks -- Using Cyberinsurance Policies to Help Manage E- Risks -- Crafting Effective E- Mail, Internet, and Software Policies -- The Basics of E- Policy Development -- E- Mail Policy Considerations -- A Netiquette Primer for Employees and Managers -- Internet Policy Considerations -- Software Policy Considerations -- Establishing an Electronic Writing Policy for Employees -- E- Writing Guidelines Ensure SpeedyÛ and SafeÛ Communication -- Powerful and Persuasive, Safe and Secure Electronic Writing -- The ABCs of Effective Electronic Business Writing -- Watch Your Cyberlanguage -- Formatting Written E- Policies, E- Mail Messages, and Internet Copy -- Getting Employees On- Board with Your Online Policy -- Rallying the Support of Managers -- Instilling a Sense of E- Policy Ownership among Employees -- Responding to E- Crises and Recapping E- Policy Needs -- Fighting Internet Disaster -- E- Policy Dos and DonÌts -- E- Policy Development and Implementation Checklist for Employers -- Sample E- Mail, Internet, and Computer Use Policies -- Sample E- Risk Management Policy -- Sample Software Usage Policies -- Glossary of Computer and Electronic Writing Terms -- Resources and Expert Sources -- Suggested Reading -- NOTES -- Index.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic mail systems</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information technology</subfield><subfield code="x">Management.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2008006980</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer network resources</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Courrier électronique</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Technologie de l'information</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Information électronique</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Reference.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Machine Theory.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Literacy.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Information Technology.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Data Processing.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Hardware</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer software</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Electronic mail systems</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information technology</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The e-policy handbook (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGrjQhrQ9vGRRGttQxq6yq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Flynn, Nancy, 1956-</subfield><subfield code="t">E-Policy handbook.</subfield><subfield code="d">New York : AMACOM, 2000</subfield><subfield code="z">0814470912</subfield><subfield code="w">(DLC) 00060598</subfield><subfield code="w">(OCoLC)44712949</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=53933</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bkb00000330</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL3001817</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10120204</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">53933</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2343126</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm47009726 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:15:13Z |
institution | BVB |
isbn | 081442550X 9780814425503 9780814470916 0814470912 |
language | English |
oclc_num | 47009726 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xviii, 284 pages) |
psigel | ZDB-4-EBA |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | AMACOM, |
record_format | marc |
spelling | Flynn, Nancy, 1956- https://id.oclc.org/worldcat/entity/E39PBJxxbdk9CJhXbyxX6jfcyd http://id.loc.gov/authorities/names/n99280527 The E-Policy handbook : designing and implementing effective E-mail, Internet, and software policies / Nancy L. Flynn. New York : AMACOM, 2000. 1 online resource (xviii, 284 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes index. Print version record. Includes bibliographical references and index. Annotation Regulating company e-mail & Internet usage isn't a "big brother" tactic. These days, it's just smart business. That's because trillions of e-mails travel each year through corporate networks & they're not all work-related. From off-color jokes to pornographic images, from software pirates to eBay addicts, digital abuse has left companies wide open to liability risks, security breaches & productivity nosedives. The most effective & least used way for a company to protect itself is by developing clear, comprehensive e-policies. And this completely thorough, up-to-date & readable e-policy survival kit will make it easy. Packed with step-by-step guidelines, sample policies & e-disaster stories, THE E-POLICY HANDBOOK helps readers: Realize the magnitude of e-risks, Understand cyberlaws, Gauge the vulnerability of their organization, Purchase protective cyber-insurance, Write & format top-notch e-policies, Train employees about on-line policies, Draft an e-crisis communications plan & more. Publisher Fact Sheet Helps readers realize the magnitude of e-risks, understand cyberlaws, gauge the vulnerability of their organization, purchase protective cyber-insurance, write & formate e-policies, train employees about online policies, & draft & e-crisis communications plan. Intro -- Contents -- Foreword -- Preface -- Getting Started: Assessing Your OrganizationÌs E- Risks -- Introduction -- Forming Your E- Policy Team -- Conducting a Comprehensive E- Audit -- Developing E- Risk Management, E- Security, and E- Insurance Policies to Limit Liabilities -- Cyberlaw Issues -- Developing an Effective E- Risk Management Policy -- A Computer Security Policy to Reduce External Risks -- Using Cyberinsurance Policies to Help Manage E- Risks -- Crafting Effective E- Mail, Internet, and Software Policies -- The Basics of E- Policy Development -- E- Mail Policy Considerations -- A Netiquette Primer for Employees and Managers -- Internet Policy Considerations -- Software Policy Considerations -- Establishing an Electronic Writing Policy for Employees -- E- Writing Guidelines Ensure SpeedyÛ and SafeÛ Communication -- Powerful and Persuasive, Safe and Secure Electronic Writing -- The ABCs of Effective Electronic Business Writing -- Watch Your Cyberlanguage -- Formatting Written E- Policies, E- Mail Messages, and Internet Copy -- Getting Employees On- Board with Your Online Policy -- Rallying the Support of Managers -- Instilling a Sense of E- Policy Ownership among Employees -- Responding to E- Crises and Recapping E- Policy Needs -- Fighting Internet Disaster -- E- Policy Dos and DonÌts -- E- Policy Development and Implementation Checklist for Employers -- Sample E- Mail, Internet, and Computer Use Policies -- Sample E- Risk Management Policy -- Sample Software Usage Policies -- Glossary of Computer and Electronic Writing Terms -- Resources and Expert Sources -- Suggested Reading -- NOTES -- Index. Electronic mail systems Management. Information technology Management. http://id.loc.gov/authorities/subjects/sh2008006980 Computer network resources Management. Computer software Management. Courrier électronique Gestion. Technologie de l'information Gestion. Information électronique Gestion. Logiciels Gestion. COMPUTERS Reference. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Computer Literacy. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Hardware General. bisacsh Computer software Management fast Electronic mail systems Management fast Information technology Management fast has work: The e-policy handbook (Text) https://id.oclc.org/worldcat/entity/E39PCGrjQhrQ9vGRRGttQxq6yq https://id.oclc.org/worldcat/ontology/hasWork Print version: Flynn, Nancy, 1956- E-Policy handbook. New York : AMACOM, 2000 0814470912 (DLC) 00060598 (OCoLC)44712949 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=53933 Volltext |
spellingShingle | Flynn, Nancy, 1956- The E-Policy handbook : designing and implementing effective E-mail, Internet, and software policies / Intro -- Contents -- Foreword -- Preface -- Getting Started: Assessing Your OrganizationÌs E- Risks -- Introduction -- Forming Your E- Policy Team -- Conducting a Comprehensive E- Audit -- Developing E- Risk Management, E- Security, and E- Insurance Policies to Limit Liabilities -- Cyberlaw Issues -- Developing an Effective E- Risk Management Policy -- A Computer Security Policy to Reduce External Risks -- Using Cyberinsurance Policies to Help Manage E- Risks -- Crafting Effective E- Mail, Internet, and Software Policies -- The Basics of E- Policy Development -- E- Mail Policy Considerations -- A Netiquette Primer for Employees and Managers -- Internet Policy Considerations -- Software Policy Considerations -- Establishing an Electronic Writing Policy for Employees -- E- Writing Guidelines Ensure SpeedyÛ and SafeÛ Communication -- Powerful and Persuasive, Safe and Secure Electronic Writing -- The ABCs of Effective Electronic Business Writing -- Watch Your Cyberlanguage -- Formatting Written E- Policies, E- Mail Messages, and Internet Copy -- Getting Employees On- Board with Your Online Policy -- Rallying the Support of Managers -- Instilling a Sense of E- Policy Ownership among Employees -- Responding to E- Crises and Recapping E- Policy Needs -- Fighting Internet Disaster -- E- Policy Dos and DonÌts -- E- Policy Development and Implementation Checklist for Employers -- Sample E- Mail, Internet, and Computer Use Policies -- Sample E- Risk Management Policy -- Sample Software Usage Policies -- Glossary of Computer and Electronic Writing Terms -- Resources and Expert Sources -- Suggested Reading -- NOTES -- Index. Electronic mail systems Management. Information technology Management. http://id.loc.gov/authorities/subjects/sh2008006980 Computer network resources Management. Computer software Management. Courrier électronique Gestion. Technologie de l'information Gestion. Information électronique Gestion. Logiciels Gestion. COMPUTERS Reference. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Computer Literacy. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Hardware General. bisacsh Computer software Management fast Electronic mail systems Management fast Information technology Management fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2008006980 |
title | The E-Policy handbook : designing and implementing effective E-mail, Internet, and software policies / |
title_auth | The E-Policy handbook : designing and implementing effective E-mail, Internet, and software policies / |
title_exact_search | The E-Policy handbook : designing and implementing effective E-mail, Internet, and software policies / |
title_full | The E-Policy handbook : designing and implementing effective E-mail, Internet, and software policies / Nancy L. Flynn. |
title_fullStr | The E-Policy handbook : designing and implementing effective E-mail, Internet, and software policies / Nancy L. Flynn. |
title_full_unstemmed | The E-Policy handbook : designing and implementing effective E-mail, Internet, and software policies / Nancy L. Flynn. |
title_short | The E-Policy handbook : |
title_sort | e policy handbook designing and implementing effective e mail internet and software policies |
title_sub | designing and implementing effective E-mail, Internet, and software policies / |
topic | Electronic mail systems Management. Information technology Management. http://id.loc.gov/authorities/subjects/sh2008006980 Computer network resources Management. Computer software Management. Courrier électronique Gestion. Technologie de l'information Gestion. Information électronique Gestion. Logiciels Gestion. COMPUTERS Reference. bisacsh COMPUTERS Machine Theory. bisacsh COMPUTERS Computer Literacy. bisacsh COMPUTERS Information Technology. bisacsh COMPUTERS Data Processing. bisacsh COMPUTERS Computer Science. bisacsh COMPUTERS Hardware General. bisacsh Computer software Management fast Electronic mail systems Management fast Information technology Management fast |
topic_facet | Electronic mail systems Management. Information technology Management. Computer network resources Management. Computer software Management. Courrier électronique Gestion. Technologie de l'information Gestion. Information électronique Gestion. Logiciels Gestion. COMPUTERS Reference. COMPUTERS Machine Theory. COMPUTERS Computer Literacy. COMPUTERS Information Technology. COMPUTERS Data Processing. COMPUTERS Computer Science. COMPUTERS Hardware General. Computer software Management Electronic mail systems Management Information technology Management |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=53933 |
work_keys_str_mv | AT flynnnancy theepolicyhandbookdesigningandimplementingeffectiveemailinternetandsoftwarepolicies AT flynnnancy epolicyhandbookdesigningandimplementingeffectiveemailinternetandsoftwarepolicies |