Foreword |
|
xiii | |
Preface |
|
xvii | |
PART ONE Getting Started: Assessing Your Organization's E-Risks |
|
1 | (30) |
|
|
3 | (8) |
|
Why Every Organization Needs E-Mail, Internet, and Software Usage Policies |
|
|
3 | (1) |
|
In the Electronic Office, Risks Abound |
|
|
4 | (1) |
|
No Employer Is Immune from E-Risk |
|
|
4 | (1) |
|
Keeping Employees on Track When They Are Online |
|
|
5 | (4) |
|
Take a Proactive Approach to Risk Prevention |
|
|
9 | (2) |
|
Forming Your E-Policy Team |
|
|
11 | (6) |
|
Potential E-Policy Team Members |
|
|
11 | (3) |
|
|
14 | (3) |
|
Conducting a Comprehensive E-Audit |
|
|
17 | (14) |
|
Introduction: Uncovering Computer System Uses and Abuses |
|
|
17 | (1) |
|
Host a Preliminary Planning Session with Managers |
|
|
18 | (1) |
|
Generate Staff Support for Your E-Audit |
|
|
19 | (8) |
|
|
27 | (4) |
PART TWO Developing E-Risk Management, E-Security, and E-Insurance Policies to Limit Liabilities |
|
31 | (48) |
|
Cyberlaw Issues: Understanding Employee Rights and Employer Responsibilities |
|
|
33 | (16) |
|
Talk with a Cyberlaw Expert |
|
|
34 | (1) |
|
Reconciling Privacy Expectations with Privacy Rights |
|
|
34 | (1) |
|
Stay Out of Court by Putting It in Writing |
|
|
35 | (1) |
|
Serve Notice before You Peek |
|
|
35 | (4) |
|
Sexual Harassment, Discrimination, and Defamation |
|
|
39 | (1) |
|
|
40 | (2) |
|
|
42 | (2) |
|
|
44 | (1) |
|
|
45 | (1) |
|
|
46 | (3) |
|
Developing an Effective E-Risk Management Policy |
|
|
49 | (12) |
|
Establish a Policy Governing Document Creation and Content |
|
|
49 | (1) |
|
Give Your Employees Rules to Work By |
|
|
50 | (1) |
|
Establish a Document Retention and Deletion Policy |
|
|
51 | (1) |
|
There Is No Good Reason to Save E-Mail Files |
|
|
52 | (1) |
|
If You Must Retain E-Mail, Be Smart about It |
|
|
52 | (1) |
|
The High Cost of E-Mail Retention |
|
|
53 | (1) |
|
What's Your Excuse for Retaining E-Mail? |
|
|
53 | (1) |
|
Force Employees to Empty Their Mailboxes |
|
|
54 | (2) |
|
Limit Liability by Enforcing Risk Management Policies |
|
|
56 | (1) |
|
Hush...Keep Your Password to Yourself |
|
|
56 | (1) |
|
|
57 | (1) |
|
Investigate Unusual Behavior |
|
|
57 | (1) |
|
Use Monitoring Software to Catch Bad Electronic Behavior |
|
|
58 | (2) |
|
|
60 | (1) |
|
A Computer Security Policy to Reduce External Risks |
|
|
61 | (8) |
|
Ten Tips for Enhanced Computer Security |
|
|
62 | (5) |
|
|
67 | (1) |
|
|
68 | (1) |
|
Using Cyberinsurance Policies to Help Manage E-Risks |
|
|
69 | (10) |
|
Employment Practices Insurance Helps Limit E-Mail Risks |
|
|
70 | (1) |
|
Crisis Communications Coverage Helps You Recover from E-Disaster |
|
|
71 | (1) |
|
Ward Off Bugs with Computer Virus Transmission Coverage |
|
|
72 | (1) |
|
Insure against Copyright and Trademark Infringement with Media Liability Coverage |
|
|
73 | (1) |
|
Patent Infringement Coverage Insures against Multimillion-Dollar Claims |
|
|
73 | (1) |
|
Fight Cyberterrorism with Extortion and Reward Coverage |
|
|
74 | (1) |
|
Cover Third-Party Losses with Unauthorized Access/Unauthorized Use Coverage |
|
|
74 | (1) |
|
Specialized Network Security Coverage Helps Guard Confidential Data |
|
|
75 | (1) |
|
Computer Software and Services E&O Coverage Insures against Advice, Service, or Product Failure |
|
|
75 | (1) |
|
Product Liability Insurance Covers Product Failures |
|
|
76 | (1) |
|
Directors' and Officers' Coverage Protects Business and Personal Assets |
|
|
76 | (1) |
|
Business Interruption Coverage Can Help Keep You Up and Running |
|
|
76 | (1) |
|
Guard Against E-Theft with Crime Loss Insurance |
|
|
76 | (1) |
|
Protect Your Computer Assets with Electronic Data Processing (EDP) Coverage |
|
|
77 | (1) |
|
|
77 | (2) |
PART THREE Crafting Effective E-Mail, Internet, and Software Policies |
|
79 | (48) |
|
The Basics of E-Policy Development |
|
|
81 | (6) |
|
General Guidelines for Effective E-Mail, Internet, and Software Usage Policies |
|
|
82 | (3) |
|
It's Time to Get to Work on E-Policy Development |
|
|
85 | (1) |
|
|
85 | (2) |
|
E-Mail Policy Considerations: Think before You Send |
|
|
87 | (8) |
|
Instruct Employees to Avoid E-Mail When... |
|
|
87 | (1) |
|
Advise Employees to Use E-Mail When... |
|
|
88 | (2) |
|
Attachment Guidelines for E-Mail Senders |
|
|
90 | (1) |
|
Attachment Guidelines for E-Mail Receivers |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (2) |
|
A Netiquette Primer for Employees and Managers |
|
|
95 | (10) |
|
Mind Your Electronic Manners |
|
|
96 | (1) |
|
Establishing Netiquette Guidelines for Employees |
|
|
96 | (5) |
|
Special Netiquette Considerations for Managers |
|
|
101 | (3) |
|
|
104 | (1) |
|
Internet Policy Considerations: Keeping Employees in Line While They're Online |
|
|
105 | (6) |
|
Establish and Enforce a Comprehensive Internet Policy |
|
|
105 | (1) |
|
|
106 | (1) |
|
Prohibit the Wasting of Computer Resources |
|
|
106 | (1) |
|
Enforce Language Guidelines |
|
|
106 | (1) |
|
|
106 | (1) |
|
Apply the ABCs of Effective Electronic Writing |
|
|
107 | (1) |
|
Battle Technological Challenges with Technological Solutions |
|
|
107 | (1) |
|
Train, Train, and Train Some More |
|
|
108 | (1) |
|
|
108 | (3) |
|
Software Policy Considerations: Don't Let Software Pirates Sink Your Ship |
|
|
111 | (16) |
|
Software Piracy in the Workplace |
|
|
113 | (1) |
|
Softlifters Will Be Prosecuted |
|
|
114 | (1) |
|
The High Cost of Software Piracy |
|
|
114 | (1) |
|
Educate Employees about the Dangers of Workplace Piracy |
|
|
115 | (1) |
|
Software Usage Checklist for Employers |
|
|
115 | (3) |
|
Manager's Tip Sheet: Answers to Employees' Most Common Software Piracy Questions |
|
|
118 | (8) |
|
|
126 | (1) |
PART FOUR Establishing an Electronic Writing Policy for Employees |
|
127 | (50) |
|
E-Writing Guidelines Ensure Speedy---and Safe---Communication |
|
|
129 | (8) |
|
Assessing and Addressing Employees' Electronic Writing Needs |
|
|
129 | (1) |
|
Managerial Writing Review |
|
|
130 | (2) |
|
Understanding Employees' Electronic Writing Concerns |
|
|
132 | (4) |
|
Putting Your E-Writing Findings to Work |
|
|
136 | (1) |
|
|
136 | (1) |
|
Powerful and Persuasive, Safe and Secure Electronic Writing |
|
|
137 | (8) |
|
Writing a Subject Line with Real Oomph |
|
|
137 | (2) |
|
Grabbing and Holding the Electronic Reader's Attention |
|
|
139 | (1) |
|
Separating the Weak from the Strong |
|
|
140 | (1) |
|
Applying the Inverted Pyramid to Electronic Writing |
|
|
141 | (1) |
|
Don't Be a Mystery Writer |
|
|
142 | (1) |
|
Why an Inverted Pyramid Approach to E-Documents? |
|
|
142 | (2) |
|
|
144 | (1) |
|
The ABCs of Effective Electronic Business Writing |
|
|
145 | (10) |
|
Accuracy: Speedy Doesn't Mean Sloppy |
|
|
145 | (1) |
|
Spelling Counts, Even in Cyberspace |
|
|
146 | (1) |
|
Five Electronic Spelling Tips |
|
|
146 | (1) |
|
Brief Is Best: Trim the Fat from Electronic Writing |
|
|
147 | (1) |
|
|
148 | (1) |
|
Strive for an Active Style |
|
|
148 | (1) |
|
Power Words Vs. Puny Words |
|
|
149 | (1) |
|
|
150 | (1) |
|
Clear Writing Is Persuasive Writing |
|
|
150 | (1) |
|
Selecting an Appropriate Tone for Electronic Correspondence |
|
|
151 | (1) |
|
|
152 | (1) |
|
Take Yourself Out of the Picture |
|
|
153 | (1) |
|
|
153 | (2) |
|
|
155 | (16) |
|
Controlling Content to Control Risk |
|
|
155 | (1) |
|
Using Conversational Language |
|
|
156 | (1) |
|
Bending a Few Rules to Strike an Appropriate Tone |
|
|
156 | (1) |
|
|
157 | (1) |
|
Strategies to Keep Electronic Writing Gender-Neutral |
|
|
157 | (3) |
|
Establishing Company-Specific Language Guidelines |
|
|
160 | (2) |
|
Avoid E-Communication Pitfalls |
|
|
162 | (3) |
|
The Language of Electronic Abbreviations |
|
|
165 | (1) |
|
Electronic Acronyms Create New Challenges |
|
|
165 | (2) |
|
Smileys Can Warm Up or Dumb Down Communication |
|
|
167 | (2) |
|
|
169 | (2) |
|
Formatting Written E-Policies, E-Mail Messages, and Internet Copy |
|
|
171 | (6) |
|
|
171 | (1) |
|
Incorporate White Space into Policies |
|
|
171 | (1) |
|
Rely on Bold Headlines and Subheads in Policies |
|
|
172 | (1) |
|
Include a Table of Contents in Each Policy |
|
|
172 | (1) |
|
E-Mail and Internet Formatting Guidelines |
|
|
172 | (3) |
|
|
175 | (2) |
PART FIVE Getting Employees On-Board with Your Online Policy |
|
177 | (14) |
|
Rallying the Support of Managers |
|
|
179 | (8) |
|
In the Battle against E-Risks, Managers Form the Front Line of Defense |
|
|
180 | (1) |
|
|
180 | (1) |
|
Managers' Tip Sheet: Answers to Employees' Most Common E-Policy Questions |
|
|
181 | (4) |
|
|
185 | (2) |
|
Instilling a Sense of E-Policy Ownership among Employees |
|
|
187 | (4) |
|
Tips for Training Employees |
|
|
188 | (1) |
|
Continuing Education Is Directly Linked to Success |
|
|
189 | (1) |
|
Don't Forget to Train Your E-Writers and E-Crisis Response Team |
|
|
189 | (1) |
|
|
190 | (1) |
PART SIX Responding to E-Crises and Recapping E-Policy Needs |
|
191 | (24) |
|
Fighting Internet Disasters: Drafting an E-Crisis Communications Policy |
|
|
193 | (10) |
|
Hoping for the Best, Preparing for the Worst |
|
|
193 | (1) |
|
Are You Prepared to Handle an E-Crisis? |
|
|
194 | (1) |
|
The Potential for Electronic Crises Is Huge |
|
|
194 | (1) |
|
People Problems Cannot Be Avoided |
|
|
195 | (1) |
|
Incorporate Crisis Communications Planning into E-Policy Development |
|
|
196 | (2) |
|
Avoid Common Media Relations Mistakes |
|
|
198 | (3) |
|
|
201 | (2) |
|
|
203 | (4) |
|
|
203 | (2) |
|
|
205 | (2) |
|
E-Policy Development and Implementation Checklist for Employers |
|
|
207 | (8) |
Appendix A: Sample E-Mail, Internet, and Computer Use Policies |
|
215 | (16) |
Appendix B: Sample E-Risk Management Policy |
|
231 | (8) |
Appendix C: Sample Software Usage Policies |
|
239 | (14) |
Appendix D: Glossary of Computer and Electronic Writing Terms |
|
253 | (10) |
Appendix E: Resources and Expert Sources |
|
263 | (4) |
Appendix F: Suggested Reading |
|
267 | (2) |
Notes |
|
269 | (10) |
Index |
|
279 | (6) |
About the Author |
|
285 | |