Legal Risks of Uncontrolled E-mail and Web Access

E-mail and the Internet are critical resources for most organizations, but the attributes that make them so essential can generate significant legal risks for employers. E-mail and Internet misuse continues unabated. This paper considers some of the risks of employee use of e-mail and the Internet and suggests solutions such as setting up effective usage policies to help reduce risk.
  • Written By:
  • Published On:
  • (Originally Published On:) )
 
comments powered by Disqus


Featured publications:

Usability as an ERP Selection Criteria

Enterprise resource planning (ERP) software is often criticized for being complex and difficult to use—which puts up a barrier to receiving potential benefits. Systems with integrated search functionality and Web-like interfaces can make ERP solutions easier to use. Learn how to evaluate ERP software for its usability, so you can avoid investing in platforms that aren’t evolved toward usable and efficient interfaces.
  • Written By:
  • Published On:

Antidot Information Search and Access Solutions

Antidot provides ready-to-use solutions for information search and access that are tailored to the specific needs of content publishers, e-merchants, and business organizations. Read the brochure and see how these software solutions have enhanced the value of the vendor’s customers’ information assets and improved their operational performance.
  • Written By:
  • Published On:

3 Ways You Will Overpay for Your Mobile Workforce Management Solution and 3 Strategies to Avoid It

The benefits of mobile workforce management solutions are well documented. So are the costs and risks. The goal of this e-book is to help service organizations and the individuals charged with deploying mobile workforce management solutions to recognize the cost and risk drivers, formulate a deployment strategy, and understand the solution architecture requirements. Download the e-book.
  • Written By:
  • Published On:

You may also be interested in these related documents:

Bullet-proofing Instant Messaging

As more corporations adopt instant messaging (IM), chief information officers (CIOs) and IT managers are learning that it can be a serious source of liability and security exposure. Users, it seems, simply don’t understand the losses and exposures that can result from incautious IM use. Find out how security software solutions can help you reap the benefits of IM without exposing your company to unnecessary risk.
  • Written By:
  • Published On:

Case Study: Old National Bancorp Mitigates E-mail Risks and Meets the Needs of Clients and Regulators

Indiana, US-based Old National Bancorp owns multiple financial services operations and offers a range of services. With over 3,000 employees, the bank needed a comprehensive policy-based e-mail retention plan to address compliance, legal discovery, and the exponential growth of message stores. Learn how an e-mail retention solution helped the bank meet compliance, scalability, and information life cycle management needs.
  • Written By:
  • Published On:

How Your Employees May Be Exposing You to Legal Risks through Misuse of E-mail

Read this white paper to learn about the areas of potential legal liability and exposure that arise not only through the purely internal activities of your employees, but when inappropriate material makes its way into the corporate e-environment from the outside—and learn about the legal exposure that may arise when you permit employees to be exposed to spam containing pornographic or other inappropriate content.
  • Written By:
  • Published On: