Skip to Main Content
The e-Policy Handbook: Rules and Best Practices to Safely Manage Your Company’s E-Mail, Blogs, Social Networking, and Other Electronic Communication Tools, Second Edition
book

The e-Policy Handbook: Rules and Best Practices to Safely Manage Your Company’s E-Mail, Blogs, Social Networking, and Other Electronic Communication Tools, Second Edition

by Nancy Flynn
January 2009
Intermediate to advanced content levelIntermediate to advanced
304 pages
9h 41m
English
AMACOM
Content preview from The e-Policy Handbook: Rules and Best Practices to Safely Manage Your Company’s E-Mail, Blogs, Social Networking, and Other Electronic Communication Tools, Second Edition
CHAPTER
18
Software Risks, Rules,
Policies and Best Practices
Would you walk into your local computer store and steal a package of
software for business or personal use? Of course not. Yet many people
who would never consider shoplifting from a retail store are guilty of
‘‘softlifting,’’ or pirating, computer software.
1
Worldwide, software piracy is so pervasive that 35 percent of the
software installed on personal computers in 2006 was pirated, or illegally
obtained. That amounts to more than $40 billion in global losses for the
software industry, a 15 percent increase over the previous year, accord-
ing to the 2007 BSA-IDC Global Software Piracy Study. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Resilient Thinking - Protecting organisations in the 21st century, Second edition

Resilient Thinking - Protecting organisations in the 21st century, Second edition

Phillip Wood
E-mail in an Instant

E-mail in an Instant

Keith Bailey, Karen Leland

Publisher Resources

ISBN: 9780814410783