The article surveys the changing risk environment for corporations from their employees’ electronic communications. It identifies the types of liabilities that corporations can incur from such employee communications. It discusses the objectives of corporate internet use policies and the types of provisions such policies should contain. It suggests an alternative risk-based approach to corporate acceptable use policies instead of a traditional “laundry list” of internet use prohibitions.
CFO Journal. (2013). The Morning Ledger: CFOs seek security from cybercrime. The Wall Street Journal, August 13 2013. Retrieved from http://blogs.wsj.com/cfo/2013/08/13/the-morning-ledger-cfos-seek-securityfrom-cybercrime/ on August 21, 2013.
Cisco Systems. (2013). Cisco 2011 annual security report. Retrieved from http://www.cisco.com/en/US/prod/collateral/vpndevc/security_annual_report_ 2011.pdf (pp. 6-8) on May 21, 2013.
Compuscan. (2013).Email disclaimer. Retrieved from https://www.compuscan.co.za/ about-us/132-email-disclaimer on May 21, 2013.
ITPro. (2013). Sony insurer doesn’t want to pay for data breaches. Retrieved from http://www.itpro.co.uk/635140/sony-insurer-doesn-t-want-to-pay-fordata-breaches on May 21, 2013.
Mailguard. (2013). Watch porn at work–a guide for employers and managers. Retrieved from http://www.mailguard.com.au/blog/porn-at-work/ on May 21, 2013.
National Legal Research Group, Inc. (2013). Internet acceptable use policies for law firms and other employers. Retrieved from http://www.nlrg.com/internet-acceptable-use-policies-for-law-firms-and-otheremployers/ on May 21, 2013.
PBT Consulting. (2013). Research: Employees spend entirely too much time accessing the internet while at work. Retrieved from http://tommytoy.typepad.com/tommy-toy-pbt-consultin/2010/09/researchemployees-spending-entirely-too-much-time-surfing-the-web-while-atwork.html on May 21, 2013.
Pingdom. (2013). Internet 2011 in numbers. Retrieved from http://royal.pingdom.com/2012/01/17/internet-2011-in-numbers/ on May 21, 2013.
Ponemon Institute Research Report. (2013). Cost of data breach study: Global analysis. Symantec Corporation. Retrieved from https://www4.symantec.com/mktginfo/whitepaper/053013_GL_NA_WP_Pone mon-2013-Cost-of-a-Data-Breach-Report_daiNA_cta72382.pdf on September 2, 2013.
Radicati, Sara, and Hoang, Quoc. (2013). Email statistics report, 2011-2015. Retrieved from http://www.radicati.com/wp/wp-content/uploads/2011/05/Email-StatisticsReport-2011-2015-Executive-Summary.pdf on May 21, 2013.
Smith, Aaron. (2013). Citi–Millions stolen in May hack attack. Retrieved from http://money.cnn.com/2011/06/27/technology/citi_credit_card/index.htm on May 21, 2013.
Yarow, Jay. (2013). 107,000,000,000,000. Retrieved from http://articles.businessinsider.com/2011-01-14/tech/30078145_1_hours-ofvideo-uploaded-big-number-facebook on May 21, 2013.
Zubulake v. UBS Warburg [case study]. (2003).
Ruhnka, John and Loopesko, Windham E.
"Risk Management of Email and Internet Use in the Workplace,"
Journal of Digital Forensics, Security and Law: Vol. 8
, Article 1.
Available at: http://commons.erau.edu/jdfsl/vol8/iss3/1