The E-Policy Handbook
, by Flynn, NancyNote: Supplemental materials are not guaranteed with Rental or Used book purchases.
- ISBN: 9780814470916 | 0814470912
- Cover: Paperback
- Copyright: 1/8/2001
"Regulating company e-mail and Internet usage isn't a ""big brother"" tactic. These days, it's just smart business. That's because trillions of e-mails travel each year through corporate networks--and they're not all work-related. From off-color jokes to pornographic images, from software pirates to eBay addicts, digital abuse has left companies wide open to liability risks, security breaches, and productivity nosedives. The most effective--and least used--way for a company to protect itself is by developing clear, comprehensive e-policies. And this completely thorough, up-to-date, and readable e-policy survival kit will make it easy. Packed with step-by-step guidelines, sample policies, and e-disaster stories, The E-Policy Handbook helps readers: Realize the magnitude of e-risks * Understand cyberlaws * Gauge the vulnerability of their organization * Purchase protective cyber-insurance * Write and format top-notch e-policies * Train employees about on-line policies * Draft an e-crisis communications plan, and more."
Nancy Flynn (Columbus, OH) is a recognized electronic communications expert who has been interviewed by The Wall Street Journal, National Public Radio, and the AP and UPI wire services. She is the author of The $100,000 Writer and coauthor of Writing Effective E-Mail.
Foreword | xiii | ||||
Preface | xvii | ||||
PART ONE Getting Started: Assessing Your Organization's E-Risks | 1 | (30) | |||
|
3 | (8) | |||
|
3 | (1) | |||
|
4 | (1) | |||
|
4 | (1) | |||
|
5 | (4) | |||
|
9 | (2) | |||
|
11 | (6) | |||
|
11 | (3) | |||
|
14 | (3) | |||
|
17 | (14) | |||
|
17 | (1) | |||
|
18 | (1) | |||
|
19 | (8) | |||
|
27 | (4) | |||
PART TWO Developing E-Risk Management, E-Security, and E-Insurance Policies to Limit Liabilities | 31 | (48) | |||
|
33 | (16) | |||
|
34 | (1) | |||
|
34 | (1) | |||
|
35 | (1) | |||
|
35 | (4) | |||
|
39 | (1) | |||
|
40 | (2) | |||
|
42 | (2) | |||
|
44 | (1) | |||
|
45 | (1) | |||
|
46 | (3) | |||
|
49 | (12) | |||
|
49 | (1) | |||
|
50 | (1) | |||
|
51 | (1) | |||
|
52 | (1) | |||
|
52 | (1) | |||
|
53 | (1) | |||
|
53 | (1) | |||
|
54 | (2) | |||
|
56 | (1) | |||
|
56 | (1) | |||
|
57 | (1) | |||
|
57 | (1) | |||
|
58 | (2) | |||
|
60 | (1) | |||
|
61 | (8) | |||
|
62 | (5) | |||
|
67 | (1) | |||
|
68 | (1) | |||
|
69 | (10) | |||
|
70 | (1) | |||
|
71 | (1) | |||
|
72 | (1) | |||
|
73 | (1) | |||
|
73 | (1) | |||
|
74 | (1) | |||
|
74 | (1) | |||
|
75 | (1) | |||
|
75 | (1) | |||
|
76 | (1) | |||
|
76 | (1) | |||
|
76 | (1) | |||
|
76 | (1) | |||
|
77 | (1) | |||
|
77 | (2) | |||
PART THREE Crafting Effective E-Mail, Internet, and Software Policies | 79 | (48) | |||
|
81 | (6) | |||
|
82 | (3) | |||
|
85 | (1) | |||
|
85 | (2) | |||
|
87 | (8) | |||
|
87 | (1) | |||
|
88 | (2) | |||
|
90 | (1) | |||
|
91 | (1) | |||
|
92 | (1) | |||
|
92 | (1) | |||
|
93 | (1) | |||
|
93 | (2) | |||
|
95 | (10) | |||
|
96 | (1) | |||
|
96 | (5) | |||
|
101 | (3) | |||
|
104 | (1) | |||
|
105 | (6) | |||
|
105 | (1) | |||
|
106 | (1) | |||
|
106 | (1) | |||
|
106 | (1) | |||
|
106 | (1) | |||
|
107 | (1) | |||
|
107 | (1) | |||
|
108 | (1) | |||
|
108 | (3) | |||
|
111 | (16) | |||
|
113 | (1) | |||
|
114 | (1) | |||
|
114 | (1) | |||
|
115 | (1) | |||
|
115 | (3) | |||
|
118 | (8) | |||
|
126 | (1) | |||
PART FOUR Establishing an Electronic Writing Policy for Employees | 127 | (50) | |||
|
129 | (8) | |||
|
129 | (1) | |||
|
130 | (2) | |||
|
132 | (4) | |||
|
136 | (1) | |||
|
136 | (1) | |||
|
137 | (8) | |||
|
137 | (2) | |||
|
139 | (1) | |||
|
140 | (1) | |||
|
141 | (1) | |||
|
142 | (1) | |||
|
142 | (2) | |||
|
144 | (1) | |||
|
145 | (10) | |||
|
145 | (1) | |||
|
146 | (1) | |||
|
146 | (1) | |||
|
147 | (1) | |||
|
148 | (1) | |||
|
148 | (1) | |||
|
149 | (1) | |||
|
150 | (1) | |||
|
150 | (1) | |||
|
151 | (1) | |||
|
152 | (1) | |||
|
153 | (1) | |||
|
153 | (2) | |||
|
155 | (16) | |||
|
155 | (1) | |||
|
156 | (1) | |||
|
156 | (1) | |||
|
157 | (1) | |||
|
157 | (3) | |||
|
160 | (2) | |||
|
162 | (3) | |||
|
165 | (1) | |||
|
165 | (2) | |||
|
167 | (2) | |||
|
169 | (2) | |||
|
171 | (6) | |||
|
171 | (1) | |||
|
171 | (1) | |||
|
172 | (1) | |||
|
172 | (1) | |||
|
172 | (3) | |||
|
175 | (2) | |||
PART FIVE Getting Employees On-Board with Your Online Policy | 177 | (14) | |||
|
179 | (8) | |||
|
180 | (1) | |||
|
180 | (1) | |||
|
181 | (4) | |||
|
185 | (2) | |||
|
187 | (4) | |||
|
188 | (1) | |||
|
189 | (1) | |||
|
189 | (1) | |||
|
190 | (1) | |||
PART SIX Responding to E-Crises and Recapping E-Policy Needs | 191 | (24) | |||
|
193 | (10) | |||
|
193 | (1) | |||
|
194 | (1) | |||
|
194 | (1) | |||
|
195 | (1) | |||
|
196 | (2) | |||
|
198 | (3) | |||
|
201 | (2) | |||
|
203 | (4) | |||
|
203 | (2) | |||
|
205 | (2) | |||
|
207 | (8) | |||
Appendix A: Sample E-Mail, Internet, and Computer Use Policies | 215 | (16) | |||
Appendix B: Sample E-Risk Management Policy | 231 | (8) | |||
Appendix C: Sample Software Usage Policies | 239 | (14) | |||
Appendix D: Glossary of Computer and Electronic Writing Terms | 253 | (10) | |||
Appendix E: Resources and Expert Sources | 263 | (4) | |||
Appendix F: Suggested Reading | 267 | (2) | |||
Notes | 269 | (10) | |||
Index | 279 | (6) | |||
About the Author | 285 |
What is included with this book?
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.