Policing Cyberspace

Waltemath, Joy
November 2001
Advisor Today;Nov2001, Vol. 96 Issue 11, p114
Trade Publication
Discusses areas of electronic mail and Internet use policy that will benefit employers and employees. Content of the policy on personal use of electronic mail and the Internet; Legitimate business reasons that give the right to access and monitor any messages and files on the computer system; Activities that are prohibited among employees; Information on reporting violation of the rules.


Related Articles

  • Under surveillance. Donaldson, Sonya A. // Black Enterprise;Dec2001, Vol. 32 Issue 5, p52 

    Explains the possibility of employers gaining access to the personal electronic mail of employees and even track their Internet use.

  • INTERNET TIPS. Spandbauer, Scott; Lasky, Michael S.; O'Reilly, Dennis // PCWorld;Apr2002, Vol. 20 Issue 4, p148 

    Offers advice on using the Internet. Ways to share files through Web sites; How to query an Internet time server.

  • Prying Eyes in Cyberspace. Alger, Jonathan // Academe;Sep/Oct99, Vol. 85 Issue 5, p95 

    Discusses legal matters regarding the electronic monitoring of Internet and e-mail access in universities and colleges. Legal cases cited; Legal concerns as justification of the monitoring; How faculty members can maintain privacy in their computer use.

  • I TUBE, YOUTUBE. Moran, Gwen // Entrepreneur;Nov2007, Vol. 35 Issue 11, p100 

    The article offers tips on how to maximize video-sharing in YouTube as a promotional tool for business. Michael Harrosh, CEO of Sierra Snowboard put a video on how to properly wax a snowboard on YouTube which resulted in more views of the company's web site. Miller suggests on using simple and a...

  • Cookie opt-in plan rejected by Euro body. Mutel, Glen // Precision Marketing;4/26/2002, Vol. 14 Issue 30, p1 

    Focuses on the decision of the European Parliament Committee on Citizens' Freedoms & Rights, Justice and Home Affairs to reject proposals requiring Web users to give prior consent for each cookie they encountered on the Web. Amendments made during the second reading of the directive;...

  • Paring Down Internet Access. Zsigo, Konstantin J. // Wireless Review;08/15/99, Vol. 16 Issue 16, p31 

    Discusses the definitions of electronic mail and Internet access. Implication of pushing product through mainline distribution channels; Information on e-chat applications; Usage of portal, an Internet application. INSET: Southern LINC Tests Wireless Data.

  • Outsourcing Internet Security: A New Business Solution from America's Community Bankers. Potter, Mike // Community Banker;Jan2002, Vol. 11 Issue 1, p38 

    Discusses the plan to manage Internet security of community bankers in the United States. Assessment of risks related to Internet security; Increase of electronic mail viruses; Set of testing and monitoring solutions.

  • ACB Partners Releases Bank Internet Security Study.  // Community Banker;Jan2002, Vol. 11 Issue 1, p44 

    Announces the release of a study on the Internet security systems of community banks by the ABC Partners Incorporated in the United States. Protection from external intrusion of Internet connections; Management of electronic mail viruses; Occurrence of three security incidents per day.

  • Preventing E-Mail Overload. Mandell, Mel // World Trade;May2001, Vol. 14 Issue 3, p44 

    Provides information on how to prevent e-mail overload. Main causes of e-mail overload; Elimination or access blocking of the use of the Internet for employees; Ways for employees to reduce electronic mail overload; Limitation on sending electronic mails.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics