Cover image for Managing your wired workforce : a practical guide
Title:
Managing your wired workforce : a practical guide
Author:
Czarnowsky, Christyne A., 1949-
Publication Information:
Denver, Colo. : Bradford Pub., [2003]

©2003
Physical Description:
xiii, 169 pages ; 22 cm + 1 CD-ROM (4 3/4 in.)
General Note:
Includes index.
Language:
English
ISBN:
9781883726799
Format :
Book

Available:*

Library
Call Number
Material Type
Home Location
Status
Item Holds
Searching...
HD30.37 .C983 2003 Adult Non-Fiction Central Closed Stacks
Searching...

On Order

Summary

Summary

This book is intended for business executives, owners, and managers who do business in a fast-paced environment. It identifies Internet issues that every manager needs to face: Internet security issues; identity theft and the Internet in the workplace; managing Internet use by employees; and developing an Internet use policy.


Table of Contents

Dedicationp. v
About the authorsp. vi
Editor's notep. vii
Chapter 1 The Importance of Managing Your Wired Workforcep. 1
Possible business disastersp. 2
Management goalsp. 3
Summaryp. 5
Chapter 2 Developing an Internet Management Systemp. 7
Why is an Internet and e-mail management system important to your business?p. 7
Where should you start?p. 9
Is Internet and e-mail use management new to you (or your business)?p. 10
Case studiesp. 10
Critical start-up questions when your business embarks on Internet and e-mail use managementp. 13
Step 1 Analyze needp. 14
Step 2 Analyze riskp. 15
What are employees doing online, if not working?p. 18
Pornography viewing at workp. 18
Sexual and racial harassment onlinep. 19
Shopping and other online activitiesp. 20
Dangerous e-mailp. 21
Step 3 Analyze securityp. 23
Step 4 Formulate policyp. 24
Step 5 Investigate hardware and software needsp. 26
Summaryp. 28
Chapter 3 Monitoring and Filtering E-Mail Usep. 31
Can a business legally monitor its employees' Internet activities?p. 32
How does spam affect your business e-mail?p. 32
Spam fightersp. 34
The newest inbox polluters: hoaxes and chain lettersp. 35
What can you do?p. 36
Using software to monitor and filter e-mail usep. 37
Software monitoring systems designed for multiple tasksp. 37
Software that works for large and small businessesp. 38
Small operations software, with limitationsp. 39
Monitoring instant messagesp. 39
The downside of Internet monitoring: Negative impact on employee moralep. 40
Summaryp. 41
Chapter 4 Your Staff and Information Technology: The Human Resources Issues Generated by the Internetp. 43
The IT professionalp. 44
Managing the IT manager and the security managerp. 45
What about outsourcing?p. 46
Security servicesp. 47
Information security starts with every new hirep. 48
Background checksp. 48
Trainingp. 49
Tips on developing and implementing security policiesp. 49
E-mail and instant messaging policiesp. 51
Information security checklist for training in your businessp. 54
Other security measuresp. 54
Summaryp. 55
Chapter 5 E-Mail Management, Computer Security, and Physical Security Issuesp. 59
The security assessmentp. 62
Memo to managersp. 63
Computer securityp. 64
Firewallsp. 64
Encryptionp. 67
Anti-virus softwarep. 69
Tech Tip--virusp. 70
Passwords and other authenticationp. 71
Tech Tip--passwordsp. 73
Your employees are in the field: What special security is needed?p. 73
Patches and updatesp. 75
Back-upsp. 75
Physical securityp. 76
Adequate physical securityp. 76
Breaching physical securityp. 77
A process for determining the amount of security that is neededp. 77
Disaster planningp. 79
Summaryp. 81
Chapter 6 Identity Theft, the Internet, and Your Businessp. 83
What is identity theft?p. 83
Identity theft: Its scope and impactp. 84
How does identity theft happen?p. 85
Risky businessp. 86
Protecting against identity theftsp. 87
Important questionsp. 88
Who's leading the charge against identity thieves?p. 89
What if your business is a target?p. 91
Concerns for online merchantsp. 91
Summaryp. 93
Chapter 7 The Internet and Intellectual Property: An Essential Guide for Managersp. 95
What exactly is "intellectual property" and why should it be managed?p. 96
How does the Internet affect a business's protection of intellectual property rights?p. 96
Computer security systems: Can they protect your intellectual property?p. 97
Types of intellectual property your business may havep. 98
Trade secretsp. 98
What is the difference between a business's confidential information and its trade secrets?p. 99
Legal issues involving trade secretsp. 99
When the federal government may come to your aidp. 101
Remedies for trade secret theftp. 101
Keeping the "secret" in trade secret--what to do firstp. 102
If an actual trade secret is stolen, can criminal action be brought?p. 102
Can someone else legally obtain trade secrets from your business?p. 103
Memo to managers--using non disclosure agreementsp. 103
Checklist for safeguarding your business's trade secretsp. 105
Copyrighted materialp. 106
Who owns a copyright?p. 106
What does a copyright protect?p. 107
When does a copyright originate?p. 108
Advantages of registering with the U.S. Copyright Officep. 108
What is not protected by copyright?p. 109
What are a manager's responsibilities regarding copyrights?p. 109
Consequences of copyright infringementp. 110
How long does copyright protection last?p. 111
How can another's original work be used without infringing on the copyright?p. 111
Copyright and the Internetp. 111
How can a business protect itself from copyright infringement by employees?p. 114
Are Web pages and e-mails protected by copyright?p. 114
What about Web sites?p. 115
What about putting a link to another's site on your site?p. 116
How do you obtain permission to use copyrighted material?p. 117
What if someone is using part or your entire Web site without permission?p. 117
The "fair-use" doctrinep. 118
An innocent looking trapp. 119
The Digital Millennium Copyright Act of 1998p. 120
Patentsp. 123
What features make an invention quality for a patent?p. 125
Trademarks and trade namesp. 125
How do you know if something is trademarked?p. 125
What's the difference between trademark and trade name?p. 126
Trade dress and when imitation may mean litigationp. 126
Summaryp. 127
Appendix 1 The Internet: A Little History and How It Worksp. 129
What is the Internet?p. 129
How did the Internet come to be?p. 130
How does the Internet work?p. 131
Appendix 2 The World Wide Webp. 135
The difference between the Internet and the World Wide Webp. 135
How did the World Wide Web begin?p. 136
Want to know more?p. 137
Appendix 3 CD-Rom Contentsp. 139
Sample Internet and e-mail use policyp. 140
Checklist for e-mail policies and proceduresp. 151
Checklist for setting up a corporate confidentiality and trade secret protection programp. 154
Glossaryp. 159
Indexp. 165