CHAPTER 48

E-MAIL AND INTERNET USE POLICIES

M. E. Kabay and Nicholas Takacs

48.1 INTRODUCTION

48.2 DAMAGING THE REPUTATION OF THE ENTERPRISE

48.2.1 Violating Laws

48.2.2 III-Advised E-mail

48.2.3 Inappropriate Use of Corporate Identifiers

48.2.4 Blogs, Personal Web Sites, and Social Networking Sites

48.2.5 Disseminating and Using Incorrect Information

48.2.6 Hoaxes

48.3 THREATS TO PEOPLE AND SYSTEMS

48.3.1 Threats of Physical Harm

48.3.2 Pedophiles Online

48.3.3 Viruses and Other Malicious Code

48.3.4 Spyware and Adware

48.4 THREATS TO PRODUCTIVITY

48.4.1 Inefficient Use of Corporate E-mail

48.4.2 Mail Storms

48.4.3 Buying on the Web

48.4.4 Online Gambling

48.4.5 Internet Addiction

48.4.6 Online Dating and Cybersex

48.4.7 Games and Virtual Reality

48.5 LEGAL LIABILITY

48.5.1 Libel

48.5.2 Stolen Software, Music, and Videos

48.5.3 Plagiarism

48.5.4 Criminal Hacking and Hacktivism

48.5.5 Creating a Hostile Work Environment

48.5.6 Archiving E-mail

48.6 RECOMMENDATIONS

48.6.1 Protecting Children

48.6.2 Threats

48.6.3 Hate Sites

48.6.4 Pornography

48.6.5 Internet Addiction

48.6.6 Online Dating

48.6.7 Online Games

48.6.8 Online Purchases

48.6.9 Online Auctions

48.6.10 Online Gambling

48.6.11 Preventing Malware Infections

48.6.12 Guarding against Spyware

48.6.13 Junk E-mail

48.6.14 Mail Storms

48.6.15 Detecting Hoaxes

48.6.16 Get-Rich-Quick Schemes

48.6.17 Hacking

48.7 CONCLUDING REMARKS

48.8 FURTHER READING

48.9 NOTES

48.1 INTRODUCTION.1

The Internet offers every enterprise exciting opportunities ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.