•  
  •  
 

Prior Publisher

The Association of Digital Forensics, Security and Law (ADFSL)

Abstract

The article surveys the changing risk environment for corporations from their employees’ electronic communications. It identifies the types of liabilities that corporations can incur from such employee communications. It discusses the objectives of corporate internet use policies and the types of provisions such policies should contain. It suggests an alternative risk-based approach to corporate acceptable use policies instead of a traditional “laundry list” of internet use prohibitions.

References

CFO Journal. (2013). The Morning Ledger: CFOs seek security from cybercrime. The Wall Street Journal, August 13 2013. Retrieved from http://blogs.wsj.com/cfo/2013/08/13/the-morning-ledger-cfos-seek-securityfrom-cybercrime/ on August 21, 2013.

Cisco Systems. (2013). Cisco 2011 annual security report. Retrieved from http://www.cisco.com/en/US/prod/collateral/vpndevc/security_annual_report_ 2011.pdf (pp. 6-8) on May 21, 2013.

Compuscan. (2013).Email disclaimer. Retrieved from https://www.compuscan.co.za/ about-us/132-email-disclaimer on May 21, 2013.

ITPro. (2013). Sony insurer doesn’t want to pay for data breaches. Retrieved from http://www.itpro.co.uk/635140/sony-insurer-doesn-t-want-to-pay-fordata-breaches on May 21, 2013.

Mailguard. (2013). Watch porn at work–a guide for employers and managers. Retrieved from http://www.mailguard.com.au/blog/porn-at-work/ on May 21, 2013.

National Legal Research Group, Inc. (2013). Internet acceptable use policies for law firms and other employers. Retrieved from http://www.nlrg.com/internet-acceptable-use-policies-for-law-firms-and-otheremployers/ on May 21, 2013.

PBT Consulting. (2013). Research: Employees spend entirely too much time accessing the internet while at work. Retrieved from http://tommytoy.typepad.com/tommy-toy-pbt-consultin/2010/09/researchemployees-spending-entirely-too-much-time-surfing-the-web-while-atwork.html on May 21, 2013.

Pingdom. (2013). Internet 2011 in numbers. Retrieved from http://royal.pingdom.com/2012/01/17/internet-2011-in-numbers/ on May 21, 2013.

Ponemon Institute Research Report. (2013). Cost of data breach study: Global analysis. Symantec Corporation. Retrieved from https://www4.symantec.com/mktginfo/whitepaper/053013_GL_NA_WP_Pone mon-2013-Cost-of-a-Data-Breach-Report_daiNA_cta72382.pdf on September 2, 2013.

Radicati, Sara, and Hoang, Quoc. (2013). Email statistics report, 2011-2015. Retrieved from http://www.radicati.com/wp/wp-content/uploads/2011/05/Email-StatisticsReport-2011-2015-Executive-Summary.pdf on May 21, 2013.

Smith, Aaron. (2013). Citi–Millions stolen in May hack attack. Retrieved from http://money.cnn.com/2011/06/27/technology/citi_credit_card/index.htm on May 21, 2013.

Yarow, Jay. (2013). 107,000,000,000,000. Retrieved from http://articles.businessinsider.com/2011-01-14/tech/30078145_1_hours-ofvideo-uploaded-big-number-facebook on May 21, 2013.

Zubulake v. UBS Warburg [case study]. (2003).

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.