Skip to Main Content
The e-Policy Handbook: Rules and Best Practices to Safely Manage Your Company’s E-Mail, Blogs, Social Networking, and Other Electronic Communication Tools, Second Edition
book

The e-Policy Handbook: Rules and Best Practices to Safely Manage Your Company’s E-Mail, Blogs, Social Networking, and Other Electronic Communication Tools, Second Edition

by Nancy Flynn
January 2009
Intermediate to advanced content levelIntermediate to advanced
304 pages
9h 41m
English
AMACOM
Content preview from The e-Policy Handbook: Rules and Best Practices to Safely Manage Your Company’s E-Mail, Blogs, Social Networking, and Other Electronic Communication Tools, Second Edition
54 Privacy, Confidentiality, and Data Security Rules
Personal E-Mail Accounts and Public IM Tools
Create a False Sense of Security
Most employees are surprised to learn that it is possible for corporate
IT departments to track e-mail sent via employees’ personal accounts
(Gmail, AOL, etc.) and to search the system for unauthorized IM down-
loads (AIM, Yahoo! Messenger, for example). Employers are advised to
combine technology with policy and training in order to enforce a strict
ban on all personal e-mail accounts and any Web-based IM tools that are
not supported by IM gateway/management software (see Part 5).
Because personal e-mail accounts and IM
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Resilient Thinking - Protecting organisations in the 21st century, Second edition

Resilient Thinking - Protecting organisations in the 21st century, Second edition

Phillip Wood
E-mail in an Instant

E-mail in an Instant

Keith Bailey, Karen Leland

Publisher Resources

ISBN: 9780814410783