1 / 9

Effect of Corporate IT Policies on Otherwise Privileged Communication

Effect of Corporate IT Policies on Otherwise Privileged Communication. By: Jonathan T. Barton. Personal. Corporate. How do You Communicate?.

lynley
Télécharger la présentation

Effect of Corporate IT Policies on Otherwise Privileged Communication

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton

  2. Personal Corporate How do You Communicate?

  3. If an employee uses his employer’s corporate IT resources to prepare or send/receive a personal (i.e., non-work related) communication, does that destroy whatever privilege might otherwise attach to the communication? Issue:

  4. Communications Made Via the Company E-mail Account • Communications Made Via a Password-Protected, Web-Based E-mail • Documents Saved Locally on a Company-Issued Computer What Type of Communication?

  5. ABC Company Privacy Notice: All employees and other authorized users of computer resources should be aware of ABC’s policies for appropriate use of computing resources. Follow these links to view the IT Acceptable Use Policy and the IT Security Policy. In order to protect the privacy and confidentiality of corporate information assets, ABC has implemented an Internet Monitoring System to identify inappropriate and unauthorized use of ABC computer resources. The System monitors the content of all inbound and outbound Internet traffic and external e-mail usage. Questionable activity will be logged and tracked for resolution by ABC management. All information transmitted or stored by the system (including e-mail and files) may be subject to public disclosure. By accepting the Accept button below, you acknowledge your understanding and acceptance of ABC’s policies. Otherwise, select Decline to log off this system immediately.

  6. XYZ COMPANY IAUP 1. XYZ Company recognizes the business need for some, if not all of its employees to have access to the Internet while on the job, using company computers. As such, XYZ has made the business decision to make the Internet available to employees for XYZ business purposes. 2. XYZ intends for the Internet to be accessed for business purposes and expects that employees will spend no more than 5 minutes per day accessing the Internet for non-business purposes. 3. The company reserves the right to use monitoring software to make sure the company’s IAUP is being adhered to by its employees. The company may record and/or monitor one or more employees’ computer and Internet activity for any reason and without any specific notice. 4. By clicking “Agree” below, you agree that: a. You have had the opportunity to review this agreement and ask any questions regarding this document. b. You will adhere to the company’s IAUP. c. You will be subject to disciplinary measures, including possible termination, if you violate the IAUP.

  7. Does the corporation maintain a policy banning personal or other objectionable use; • Does the company monitor the use of the employee’s computer or e-mail; • Do third parties have a right of access to the computer or e-mails; and • Did the corporation notify the employee, or was the employee aware, of the use and monitoring policies? Asia Global Factors

  8. Personal accounts may allow you to maintain a privilege. • Do not confuse privilege with privacy. Ripped from the Headlines:

More Related