Establish an Effective E-Policy
A few weeks ago, one of the center directors had a story in one of those weekly business newspapers discussing the use of office computers for personal use. This story from InfoWorld begged for being shared:
Any time that you allow employees access to your computer systems and authorize their use of the Internet, e-mail and instant messaging (IM), you put your organization's assets, future and reputation at risk.
By implementing well-defined best practices for all forms of electronic communication, your company can mitigate potential liabilities.
This comprehensive white paper offers:
- The Three E's of Electronic Risk Management, including how
to effectively enforce established policies.
- Managing peer-to-peer (P2P) file networking technology and
related security threats.
- Monitoring IM to manage risk and prevent disasters.
- 12 recommendations for electronic communication management.
- Various sample Internet policies.
Manage your organization's electronic liabilities today or risk disaster tomorrow.
Click here.
Any time that you allow employees access to your computer systems and authorize their use of the Internet, e-mail and instant messaging (IM), you put your organization's assets, future and reputation at risk.
By implementing well-defined best practices for all forms of electronic communication, your company can mitigate potential liabilities.
This comprehensive white paper offers:
- The Three E's of Electronic Risk Management, including how
to effectively enforce established policies.
- Managing peer-to-peer (P2P) file networking technology and
related security threats.
- Monitoring IM to manage risk and prevent disasters.
- 12 recommendations for electronic communication management.
- Various sample Internet policies.
Manage your organization's electronic liabilities today or risk disaster tomorrow.
Click here.
Comments