ALA Logo
Welcome, Guest!   |  
ALA Tagline
 
 
Technology & Information Systems >> IT Policies & Procedures

IT Policies & Procedures

Displaying 1 - 10 of 14

Heathfield, Susan M. Not all workplaces are candidates for electronic surveillance of employees at work. In fact, depending upon the culture and environment, electronic surveillance of employees would injure trust and relationships, and send powerfully...
http://humanresources.about.com/od/technology/a/surveillance.htm
Jones, Richard. The IT department must be involved in the employee termination process because of access to the company network, proprietary corporate data and more. See how to utilize IT in termination.
http://humanresources.about.com/od/whenemploymentends/a/it_termination.htm
Perey, Christine and Travis Berkley. Instant messaging has established a foothold in corporations. It's easier and faster to check an IM client to see if someone is online and shoot off a quick question than to send an e-mail and wait for a response....
http://www.nwfusion.com/reviews/2004/0628imrev.html
Poll, Edward. Because of recent awards against law firms for harassment, wrongful termination of employment, and other such torts where discovery of Internet activity has been used as evidence, many firms are now at least discussing having an Internet...
http://www.lawbiz.com/pa_2.html
Strother, Jay D. No ethics opinion can completely cover the changing landscape of websites, social media and other forms of electronic communication, but you can create guidelines to help avoid ethical problems and limit exposure to risk.
http://www.alanet.org/publications/issue/marapr11/LM_MarchApril11_LIfeature.pdf
Tarr, Brett. This article discusses the ways in which data that rightfully belong to an employer are taken outside the firm, and offers some solutions to help reduce the risk of losing proprietary data as a result of employee departures.
http://www.alanet.org/publications/issue/feb09/LM-Feb09-F3-Confidential.pdf
McClellan, Susan. Administrators must understand the ethical implications of metadata and the importance of establishing a relevant firm policy for dealing with its challenges.
http://www.alanet.org/publications/issue/apr09/LM-Apr09-F4-Metadata.pdf
Musil, Christine. PDF is a useful format for file sharing, but it is occasionally misused or blindly trusted as secure. This article discusses several pitfalls and their remedies.
http://www.alanet.org/publications/issue/julaug10/LM-JulAug10-QuickTips.pdf
Reach, Catherine Sanders. Are your online accounts hacker-proof? Both your personal account and any accounts held by your firm need to be protected from security breaches. Read these tips to minimize security weaknesses in your account's password recovery
http://www.americanbar.org/content/aba/groups/departments_offices/legal_technology_resources/resourc
ces/articles/youraba0809.html
Heathfield, Susan M. Sample e-mail and Internet policies - not to be construed as legal advice.
http://humanresources.about.com/od/policiesandsamples1/a/email_policy.htm
Result Pages: 1 2 Next >>
 
 
 
Connect with ALA: