Companies have compelling reasons to protect private and confidential information. Securing business information preserves trade secrets and other intangible assets, and protecting customer information creates trust and brand loyalty, reduces
litigation, and prevents liability. In addition, the spread of misleading and inaccurate information through email and the Internet can damage a company's reputation.
Controlling the flow of information presents one of today's greatest challenges for businesses. Email, peer-to-peer (P2P) file sharing programs, unauthorized software downloads, and even the use of home computers and web-based email for work related
projects, all expose business data and jeopardize information security.
These materials address one of the most important avenues for protecting business and customer information: controlling and monitoring employee computer use. The materials provide background information regarding employee privacy and an employer's legal (not technological) ability to monitor an employee's computer, email, and Internet use. They also highlight selected practices and policies designed to permit monitoring and protect information from accidental or intentional disclosure.
Firefox recommends the PDF Plugin for Mac OS X for viewing PDF documents in your browser.
We can also show you Legal Updates using the Google Viewer; however, you will need to be logged into Google Docs to view them.
Please choose one of the above to proceed!
LOADING PDF: If there are any problems, click here to download the file.