SlideShare a Scribd company logo
1 of 2
Protecting YourCompany from Liability
Why an Effective IT and Network Policyis Essentialto Secure YourBusiness
Have you ever been concerned when one of your employees shares a web link or article of
questionable content in an interoffice email, and don’t know the proper course of action to take?
The most frequent responses include: reply to the message with a severe reprimand, call the
offender into your office to discuss the issue and course of action, or pass along the memo to
others. The last option is obviously not a viable choice, and the first just avoids a tough
discussion. A face-to-face meeting is the only way to address this serious workplace problem.
While managers can’t predict and prevent every potential employee issue, these problems can
typically be averted with a company IT and network policy.
To avoid the distribution of objectionable material through the company’s email or other
communications systems, clear organizational rules must be in place. These policies protect the
reputation of the organization and reduce the risk of fines and lawsuits by ensuring that
employees, clients, and business partners aren’t exposed to offensive jokes, pictures, or other
inappropriate communications. Implementing effective computer and network rules is the best
way to reduce issues and liabilities.
Management must do more than create these policies to ensure compliance; without enforcement
it’s a worthless endeavor. If the company doesn’t adequately respond to rule violations and hand
out equal punishment to each offender, the organization could face substantial penalties and
significant damage to its reputation. In addition to monetary and status costs, the loss of a key
employee or client due to an act of poor judgment can negatively impact or destroy the business.
The Needfor Computer Policies
New technology enters the workplace on an almost daily basis, with some creating issues that
companies never anticipate. Even if a business has an employee handbook, few include specific
language pertaining to computer usage or have been updated to deal with the latest devices and
websites. For example, despite the prevalence of social media sites, not many companies restrict
access to them during working hours.
Whether surfing the web for the latest sports news or checking a myriad of online sites for status
updates, the Internet is one of the largest productivity killers in businesses. Just add up the
number of social media posts made by your employees on a typical day and consider how many
minutes they waste, realizing that reading their friends’ posts likely takes up a lot more time.
Computer games also reduce productivity, especially for competitive individuals with a drive to
win every contest.
Businesses have options, such as banning or restricting access to these sites or programs. Some
organizations just restrict the time employees can use these programs or apps, rather than
prohibit them outright—or only allow access using personal devices and networks. Each
company must tailor these policies to meet their individual staff and office needs.
Another concern is information security, as the inappropriate use of technology increases the
threat of viruses, spyware, and trojans. When employees access websites that are known sources
of this malware, it adds significantly to the organization’s security risks and can lead to
expensive system downtime and repairs. The first step is to create and communicate rules for
employee use of the internet, including the types of sites to be avoided and penalties for trying to
overcome the company’s security measures, such as software that detects, blocks, and removes
viruses and spyware. Web-access and monitoring applications ensure that the Internet policies
you establish are followed (automatically). Of course, the best prevention comes from employees
following the rules you establish, but using the security measures helps ensure the organization’s
systems are well protected against malicious intrusions.
The final reason to create company computer policies involves liability. When an employee
misrepresents him/herself, accesses pornographic sites, or violates copyright or other laws using
a company email or other computer system, the business may also be exposed to lawsuits and
penalties. Without adequate rules in place prior to an incident, the courts may view the company
as a complicit partner in any transgression committed with its equipment. Sexual harassment is
one example, when email or internal communications are used to send offensive messages or
materials to co-workers (or customers). If there isn’t a well-established rule in place prohibiting
this type of communication, a lawsuit against the company could have more merit than litigation
against a business with a clear policy. As with any liability issue, just writing a rule is not
enough; it must be properly communicated and acknowledged by all employees in order to
protect the organization and its people.
Article submitted by Laurie Breese, Owner of TeamLogic IT of Orland Park.
TeamLogic IT of Orland Park, Illinois is part of a nationwide network of computer consultation
and managed services businesses providing outsourced IT services. Small- to medium-sized
businesses rely on TeamLogic IT to handle a broad range of services from urgent computer
repair and proactive maintenance to the installation of entire networks and more. For more
information, contact Laurie at lbreese@TeamLogicIT.com or visit
www.TeamLogicIT.com./OrlandParkIL

More Related Content

What's hot

Email policy training management revised(1a)
Email policy training management revised(1a)Email policy training management revised(1a)
Email policy training management revised(1a)Janette Levey Frisch
 
20110512-1 ARMA Boston Email Policy
20110512-1 ARMA Boston Email Policy20110512-1 ARMA Boston Email Policy
20110512-1 ARMA Boston Email PolicyJesse Wilkins
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoringProxies Rent
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward F. T. Charfauros
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliancePeter Goldbrunner
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgePerficient, Inc.
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowSymantec
 
Beyond the water cooler
Beyond the water coolerBeyond the water cooler
Beyond the water coolerwychepa
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperJames Tanner
 
Ponemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAMPonemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAMEMC
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...PortalGuard
 
Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEchoworx
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHabFg
 
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...Signals Defense, LLC
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc SecurityMallTake
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistMorrison & Foerster
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingJim Kaplan CIA CFE
 

What's hot (20)

Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Email policy training management revised(1a)
Email policy training management revised(1a)Email policy training management revised(1a)
Email policy training management revised(1a)
 
20110512-1 ARMA Boston Email Policy
20110512-1 ARMA Boston Email Policy20110512-1 ARMA Boston Email Policy
20110512-1 ARMA Boston Email Policy
 
Proxy For employee monitoring
Proxy  For employee monitoringProxy  For employee monitoring
Proxy For employee monitoring
 
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
Edward; w5; employee privacy report; 08.16.11. Copyright 2013 Edward F. T. Ch...
 
Five strategies for gdpr compliance
Five strategies for gdpr complianceFive strategies for gdpr compliance
Five strategies for gdpr compliance
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital AgeManaging Privacy Risk and Promoting Ethical Culture in the Digital Age
Managing Privacy Risk and Promoting Ethical Culture in the Digital Age
 
The Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t knowThe Evolution of Data Privacy: 3 things you didn’t know
The Evolution of Data Privacy: 3 things you didn’t know
 
Beyond the water cooler
Beyond the water coolerBeyond the water cooler
Beyond the water cooler
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaper
 
Ponemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAMPonemon: Managing Complexity in IAM
Ponemon: Managing Complexity in IAM
 
Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...Portal Authentication: A Balancing Act Between Security Usability and Complia...
Portal Authentication: A Balancing Act Between Security Usability and Complia...
 
Enterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey ReportEnterprise Encryption and Authentication Usage: Survey Report
Enterprise Encryption and Authentication Usage: Survey Report
 
Liberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT networkLiberteks | Prevent rogue access on your SMB IT network
Liberteks | Prevent rogue access on your SMB IT network
 
How to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, VirusHow to Protect Your PC from Malware, Ransomware, Virus
How to Protect Your PC from Malware, Ransomware, Virus
 
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
Wireless Security: Not just 802.11 Anymore by Rick Mellendick, Signals Defens...
 
Computer Security Guide to Pc Security
Computer Security Guide to Pc SecurityComputer Security Guide to Pc Security
Computer Security Guide to Pc Security
 
Anticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach ChecklistAnticipating an Attack: A Pre-Breach Checklist
Anticipating an Attack: A Pre-Breach Checklist
 
How analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of samplingHow analytics should be used in controls testing instead of sampling
How analytics should be used in controls testing instead of sampling
 

Similar to Liabilty

Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Kielentot Martinez
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docxaryan532920
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxhealdkathaleen
 
19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docxaulasnilda
 
Outsourcing Email Management? Companies are getting the Message
Outsourcing Email Management?  Companies are getting the MessageOutsourcing Email Management?  Companies are getting the Message
Outsourcing Email Management? Companies are getting the Messagepaully58
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docxsodhi3
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015CBIZ, Inc.
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guideMark Bennett
 
Information Ethics
Information EthicsInformation Ethics
Information EthicsUMaine
 
Designing A Thorough Franchise Business Computer System
Designing A Thorough Franchise Business Computer SystemDesigning A Thorough Franchise Business Computer System
Designing A Thorough Franchise Business Computer Systemfoamymystique5307
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Vijay Dalmia
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber securityHelen Carpenter
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018Human Capital Department
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docxambersalomon88660
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggadabotor7
 
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docxBUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docxhumphrieskalyn
 
Cybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveCybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveBrown Smith Wallace
 
Group 4 Networks Assessment Outline
Group 4 Networks Assessment OutlineGroup 4 Networks Assessment Outline
Group 4 Networks Assessment Outlinedgrubisa
 

Similar to Liabilty (20)

Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)Computer ethics in the workplace (industry)
Computer ethics in the workplace (industry)
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Risk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docxRisk Management of Email and Internet Use in the Workplace by John.docx
Risk Management of Email and Internet Use in the Workplace by John.docx
 
19Question 1 4 4 pointsLO5 What is a packetQu.docx
19Question 1 4  4 pointsLO5 What is a packetQu.docx19Question 1 4  4 pointsLO5 What is a packetQu.docx
19Question 1 4 4 pointsLO5 What is a packetQu.docx
 
Outsourcing Email Management? Companies are getting the Message
Outsourcing Email Management?  Companies are getting the MessageOutsourcing Email Management?  Companies are getting the Message
Outsourcing Email Management? Companies are getting the Message
 
Computer Basics in the Work Place
Computer Basics in the Work PlaceComputer Basics in the Work Place
Computer Basics in the Work Place
 
Replies Required for below Posting 1 user security awarene.docx
Replies Required for below  Posting 1  user security awarene.docxReplies Required for below  Posting 1  user security awarene.docx
Replies Required for below Posting 1 user security awarene.docx
 
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
Risk & Advisory Services: Quarterly Risk Advisor Nov. 2015
 
Cyber security guide
Cyber security guideCyber security guide
Cyber security guide
 
Information Ethics
Information EthicsInformation Ethics
Information Ethics
 
Designing A Thorough Franchise Business Computer System
Designing A Thorough Franchise Business Computer SystemDesigning A Thorough Franchise Business Computer System
Designing A Thorough Franchise Business Computer System
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
Need for having Security, Email & Internet Usage Policy in Companies - Legal ...
 
Cyber liability and cyber security
Cyber liability and cyber securityCyber liability and cyber security
Cyber liability and cyber security
 
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
GDPR Pop Up | Human Capital Department - HR Forum - 26 April 2018
 
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
1. Reply to Discussion ( Minimum 200 Words)1. What types of et.docx
 
chapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxgggggggggggggggggggggggggggchapter 5.pptxggggggggggggggggggggggggggg
chapter 5.pptxggggggggggggggggggggggggggg
 
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docxBUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
BUS105 Needs Improvement (1) Satisfactory (2) Ex.docx
 
Cybersecurity: How to be Proactive
Cybersecurity: How to be ProactiveCybersecurity: How to be Proactive
Cybersecurity: How to be Proactive
 
Group 4 Networks Assessment Outline
Group 4 Networks Assessment OutlineGroup 4 Networks Assessment Outline
Group 4 Networks Assessment Outline
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

Liabilty

  • 1. Protecting YourCompany from Liability Why an Effective IT and Network Policyis Essentialto Secure YourBusiness Have you ever been concerned when one of your employees shares a web link or article of questionable content in an interoffice email, and don’t know the proper course of action to take? The most frequent responses include: reply to the message with a severe reprimand, call the offender into your office to discuss the issue and course of action, or pass along the memo to others. The last option is obviously not a viable choice, and the first just avoids a tough discussion. A face-to-face meeting is the only way to address this serious workplace problem. While managers can’t predict and prevent every potential employee issue, these problems can typically be averted with a company IT and network policy. To avoid the distribution of objectionable material through the company’s email or other communications systems, clear organizational rules must be in place. These policies protect the reputation of the organization and reduce the risk of fines and lawsuits by ensuring that employees, clients, and business partners aren’t exposed to offensive jokes, pictures, or other inappropriate communications. Implementing effective computer and network rules is the best way to reduce issues and liabilities. Management must do more than create these policies to ensure compliance; without enforcement it’s a worthless endeavor. If the company doesn’t adequately respond to rule violations and hand out equal punishment to each offender, the organization could face substantial penalties and significant damage to its reputation. In addition to monetary and status costs, the loss of a key employee or client due to an act of poor judgment can negatively impact or destroy the business. The Needfor Computer Policies New technology enters the workplace on an almost daily basis, with some creating issues that companies never anticipate. Even if a business has an employee handbook, few include specific language pertaining to computer usage or have been updated to deal with the latest devices and websites. For example, despite the prevalence of social media sites, not many companies restrict access to them during working hours. Whether surfing the web for the latest sports news or checking a myriad of online sites for status updates, the Internet is one of the largest productivity killers in businesses. Just add up the number of social media posts made by your employees on a typical day and consider how many minutes they waste, realizing that reading their friends’ posts likely takes up a lot more time. Computer games also reduce productivity, especially for competitive individuals with a drive to win every contest.
  • 2. Businesses have options, such as banning or restricting access to these sites or programs. Some organizations just restrict the time employees can use these programs or apps, rather than prohibit them outright—or only allow access using personal devices and networks. Each company must tailor these policies to meet their individual staff and office needs. Another concern is information security, as the inappropriate use of technology increases the threat of viruses, spyware, and trojans. When employees access websites that are known sources of this malware, it adds significantly to the organization’s security risks and can lead to expensive system downtime and repairs. The first step is to create and communicate rules for employee use of the internet, including the types of sites to be avoided and penalties for trying to overcome the company’s security measures, such as software that detects, blocks, and removes viruses and spyware. Web-access and monitoring applications ensure that the Internet policies you establish are followed (automatically). Of course, the best prevention comes from employees following the rules you establish, but using the security measures helps ensure the organization’s systems are well protected against malicious intrusions. The final reason to create company computer policies involves liability. When an employee misrepresents him/herself, accesses pornographic sites, or violates copyright or other laws using a company email or other computer system, the business may also be exposed to lawsuits and penalties. Without adequate rules in place prior to an incident, the courts may view the company as a complicit partner in any transgression committed with its equipment. Sexual harassment is one example, when email or internal communications are used to send offensive messages or materials to co-workers (or customers). If there isn’t a well-established rule in place prohibiting this type of communication, a lawsuit against the company could have more merit than litigation against a business with a clear policy. As with any liability issue, just writing a rule is not enough; it must be properly communicated and acknowledged by all employees in order to protect the organization and its people. Article submitted by Laurie Breese, Owner of TeamLogic IT of Orland Park. TeamLogic IT of Orland Park, Illinois is part of a nationwide network of computer consultation and managed services businesses providing outsourced IT services. Small- to medium-sized businesses rely on TeamLogic IT to handle a broad range of services from urgent computer repair and proactive maintenance to the installation of entire networks and more. For more information, contact Laurie at lbreese@TeamLogicIT.com or visit www.TeamLogicIT.com./OrlandParkIL