CHAPTER 48
E-MAIL AND INTERNET USE POLICIES
M. E. Kabay and Nicholas Takacs
48.2 DAMAGING THE REPUTATION OF THE ENTERPRISE
48.2.3 Inappropriate Use of Corporate Identifiers
48.2.4 Blogs, Personal Web Sites, and Social Networking Sites
48.2.5 Disseminating and Using Incorrect Information
48.3 THREATS TO PEOPLE AND SYSTEMS
48.3.1 Threats of Physical Harm
48.3.3 Viruses and Other Malicious Code
48.4.1 Inefficient Use of Corporate E-mail
48.4.6 Online Dating and Cybersex
48.4.7 Games and Virtual Reality
48.5.2 Stolen Software, Music, and Videos
48.5.4 Criminal Hacking and Hacktivism
48.5.5 Creating a Hostile Work Environment
48.6.11 Preventing Malware Infections
48.6.12 Guarding against Spyware
48.6.16 Get-Rich-Quick Schemes
48.1 INTRODUCTION.1
The Internet offers every enterprise exciting opportunities ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.