This text provides step-by-step guidelines for creating up-to-date, legally sound policies that explicitly define the rights and obligations of employees when using e-mail and the Internet. This description may be from another edition of this product.
This is a really good book for a Net Admin such as myself. It explains all the legalese very well and I don't see any aspect of policy that it doesn't touch on. There are lots of great quotes you can put into your own policy document.The one complaint I read about it being "thin", is somewhat accurate. It's less than 150 pages, but there is a lot great information in those pages. My only complaint is that you will have to type all of the policies into your own document. They are not provided electronically. Add a CD to the book, or a web site where the samples can be downloaded and I'd give 5-stars.
Very Concise and Easy to Follow
Published by Thriftbooks.com User , 23 years ago
I like this book. It is very readable, concise, practical and easy to follow. The author has done an excellent work to put this vast field of legal and technical knowlege into a very readable form for average reader in business and management.
For every CIO, VP, IT's & VP, HR's bookshelf. Recommended.
Published by Thriftbooks.com User , 26 years ago
Provides guidelines for developing policy governing the use of computers, e-mail and the internet. Focuses on reducing legal liability, protecting confidential, proprietary information, and guarding against the waste of information technology resources. Filled with many examples of policies. Includes text of selected laws and regulations and a useful index of sample clauses. Should be on every CIO's, VP, IT and VP, HR's bookshelf. Recommended.
Well worth the money!
Published by Thriftbooks.com User , 26 years ago
It's written for the lay person who needs to formulate IT policy. It gives both policy statement examples and background data to permit the reader to formulate policies to suit their business needs. It was exactly what I was looking for.
A great tool for developing solid, effective email policies
Published by Thriftbooks.com User , 26 years ago
I found this book very intuitive and easy to read. My company helps organizations put software controls in place to reduce their exposure to Internet and Email related threats. In many cases, my customers are asking for direction on how to set up solid, effective policies for email and internet usage. This book addresses that need perfectly. It splits down the issue into the key component parts, discusses the potantial threats using real life examples and recommends protective wording to put in your policy. As a policy maker, you can judge which are the most important threats to your business and create a policy related to your requirements. Importantly, the book provides insight as to how to monitor and manage the policy you have created on an on-going basis. Just creating it and distributing it is not enough anymore.
ThriftBooks sells millions of used books at the lowest everyday prices. We personally assess every book's quality and offer rare, out-of-print treasures. We deliver the joy of reading in recyclable packaging with free standard shipping on US orders over $15. ThriftBooks.com. Read more. Spend less.