TITLE

Be prudent with E-mail use

AUTHOR(S)
Boles, Margaret
PUB. DATE
October 1997
SOURCE
Workforce (10928332);Oct97, Vol. 76 Issue 10, p21
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Reports on legal expenses incurred resulting from an employer's failure to create and enforce an electronic mail policy. Use of e-mails for business purposes; Minimizing the risks of lawsuits.
ACCESSION #
9710255933

 

Related Articles

  • Follow 5 email commandments to streamline use. Brand, Kim // Indiana Lawyer;4/13/2012, Vol. 23 Issue 3, p5 

    The article presents several tips related to email messages which include delegation of inbox to assistant, processing of email only four times a day, and strong password for safety and security.

  • Deliver value by beginning with original creative content. Jenkins, Simms // Direct Marketing News;10/2/2010, p18 

    The article offers information on how to avoid several electronic mail (e-mail) marketing crimes such as lackluster content, sending too often or neglecting to test or segment.

  • Thwart email phishing. McKinty, Colin // SC Magazine: For IT Security Professionals (15476693);Nov2015, Vol. 26 Issue 11, p17 

    The author discusses the factors to be considered on enforcing an anti-phishing training for employee which includes understanding the email's context to determine if it is a legimate source, knowing the content of the hyperlink, and the composition of the email.

  • Internet Manners. Miller, Samantha // People;01/08/2001, Vol. 55 Issue 1, p21 

    Answers a question about whether senders will know that a recipient has blocked their electronic-mail message.

  • Vendors target e-mail overload. Marsan, Carolyn Duffy // Network World;08/28/2000, Vol. 17 Issue 35, p1 

    Introduces an emerging technology called Sieve, which touts a universal way to create filters for sorting, deleting and forwarding electronic mail messages before they enter one's inbox. Advantages that Sieve has over the filtering capabilities available in leading e-mail packages; Sieve's...

  • Don't check this. Fitzgerald; Moscou, Mark // Editor & Publisher;10/16/99, Vol. 132 Issue 42, p18 

    Warns electronic mail users regarding the VBS/Freelink, a computer virus that is sent as e-mail attachments. Description of the computer virus; Transfer mode; Similarity to `Melissa' virus.

  • E-mail references 'could breach new data protection legislation.' Taylor, Chris // People Management;7/12/2001, Vol. 7 Issue 14, p13 

    Cautions employers on the risk of breaching the Data Protection Act of 1998 for supplying job references via e-mail. Precautionary measures that employers should take in sending job references through e-mail; Problems related to the monitoring of e-mails and how they were covered by various...

  • Fighting Spam. Blotzer, Michael J. // Occupational Hazards;Jun2002, Vol. 64 Issue 6, p11 

    Presents tips for eradicating unsolicited electronic mail messages. Filtration of electronic mail software using spam filtering software; Electronic mail address changing; Unsubscription from electronic mail lists.

  • BITS Head Aims To Solidify Email Authentication. Adams, John // American Banker;9/29/2011, Vol. 176 Issue 151, p9 

    The article focuses on email authentication that can prevent spam and phishing which is discussed by Paul Smocer, president of the Financial Services Roundtable's technology unit called BITS.

  • No f-words, we're British.  // Grocer;3/5/2011, Vol. 234 Issue 7995, p74 

    The article discusses the controversy involving the email security system of Dudley councilor Pat Martin in England, which objected to her use of the word faggots in a conversation with a friend.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics