SlideShare uma empresa Scribd logo
1 de 10
MONITORING EMPLOYEE’S E-MAILS Sigrid, Jane
We are going to talk about... ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is monitoring? ,[object Object],[object Object],[object Object],[object Object]
E-mails and monitoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reasons for monitoring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reasons for monitoring
Inappropriate Web surfing
Negative sides of monitoring ,[object Object],[object Object],[object Object]
Conclusion ,[object Object]
Thank you for listening!

Mais conteúdo relacionado

Mais procurados

legalworkspace-infographic 0116
legalworkspace-infographic 0116legalworkspace-infographic 0116
legalworkspace-infographic 0116Melissa Ek
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdfMing Man Chan
 
Where You'll Find Today's Top Malware
Where You'll Find Today's Top MalwareWhere You'll Find Today's Top Malware
Where You'll Find Today's Top MalwareIBM Security
 

Mais procurados (6)

legalworkspace-infographic 0116
legalworkspace-infographic 0116legalworkspace-infographic 0116
legalworkspace-infographic 0116
 
AWWAWCEnv1102.009
AWWAWCEnv1102.009AWWAWCEnv1102.009
AWWAWCEnv1102.009
 
Mobile app security
Mobile app securityMobile app security
Mobile app security
 
Cyber Security vs.pdf
Cyber Security vs.pdfCyber Security vs.pdf
Cyber Security vs.pdf
 
A Guide to Employee Computer Tracking
A Guide to Employee Computer TrackingA Guide to Employee Computer Tracking
A Guide to Employee Computer Tracking
 
Where You'll Find Today's Top Malware
Where You'll Find Today's Top MalwareWhere You'll Find Today's Top Malware
Where You'll Find Today's Top Malware
 

Destaque

Email Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mailEmail Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mailRalph van der Pauw
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)Prafull Johri
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentationAmandeep Kaur
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5koolkampus
 
Network Effects
Network EffectsNetwork Effects
Network Effectsa16z
 

Destaque (10)

Security as Code
Security as CodeSecurity as Code
Security as Code
 
Email Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mailEmail Security, The Essence of Secure E-mail
Email Security, The Essence of Secure E-mail
 
Encryption
EncryptionEncryption
Encryption
 
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Firewall presentation
Firewall presentationFirewall presentation
Firewall presentation
 
E-mail Security in Network Security NS5
E-mail Security in Network Security NS5E-mail Security in Network Security NS5
E-mail Security in Network Security NS5
 
E commerce
E commerceE commerce
E commerce
 
Network Effects
Network EffectsNetwork Effects
Network Effects
 

Semelhante a Monitoring Employee`S E Mails

Workplace Surveillance
Workplace SurveillanceWorkplace Surveillance
Workplace SurveillanceSampath
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace SurveilanceSampath
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docxarnoldmeredith47041
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxmusicalworld14
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slidesecommerce
 
Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...Kannan Subbiah
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_servicesG. Subramanian
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachJon Gatrell
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information securityUMaine
 
Investigating computer system abuse power point final
Investigating computer system abuse power point finalInvestigating computer system abuse power point final
Investigating computer system abuse power point finalDan Michaluk
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindThe Lorenzi Group
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Qualsys Ltd
 
Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!Jisc
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Praveenkumar Hosangadi
 

Semelhante a Monitoring Employee`S E Mails (20)

Workplace Surveillance
Workplace SurveillanceWorkplace Surveillance
Workplace Surveillance
 
Workplace Surveilance
Workplace SurveilanceWorkplace Surveilance
Workplace Surveilance
 
The Financial Balance Sheet Part I This slidesh.docx
The Financial  Balance Sheet Part I This slidesh.docxThe Financial  Balance Sheet Part I This slidesh.docx
The Financial Balance Sheet Part I This slidesh.docx
 
Cyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptxCyber Security_Training Presentation.pptx
Cyber Security_Training Presentation.pptx
 
Maloney Slides
Maloney SlidesMaloney Slides
Maloney Slides
 
Data Loss During Downsizing
Data Loss During DownsizingData Loss During Downsizing
Data Loss During Downsizing
 
Cyber fraud and Security - What risks does family office's face in today's wo...
Cyber fraud and Security - What risks does family office's face intoday's wo...Cyber fraud and Security - What risks does family office's face intoday's wo...
Cyber fraud and Security - What risks does family office's face in today's wo...
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Case study financial_services
Case study financial_servicesCase study financial_services
Case study financial_services
 
Understand Risk in Communications and Data Breach
Understand Risk in Communications and Data BreachUnderstand Risk in Communications and Data Breach
Understand Risk in Communications and Data Breach
 
Information ethics & intro to information security
Information ethics & intro to information securityInformation ethics & intro to information security
Information ethics & intro to information security
 
Investigating computer system abuse power point final
Investigating computer system abuse power point finalInvestigating computer system abuse power point final
Investigating computer system abuse power point final
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
How to keep printing processes GDPR compliant
How to keep printing processes GDPR compliantHow to keep printing processes GDPR compliant
How to keep printing processes GDPR compliant
 
Active Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of MindActive Network Monitoring brings Peace of Mind
Active Network Monitoring brings Peace of Mind
 
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
Preparing for GDPR: General Data Protection Regulation - Stakeholder Presenta...
 
Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!Logfiles? GDPR Says YES!
Logfiles? GDPR Says YES!
 
Frankston
FrankstonFrankston
Frankston
 
Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!Big data contains valuable information - Protect It!
Big data contains valuable information - Protect It!
 

Mais de rsoosaar

Oh, he saw it coming!
Oh, he saw it coming!Oh, he saw it coming!
Oh, he saw it coming!rsoosaar
 
The euro zone`s debt crisis
The euro zone`s debt crisisThe euro zone`s debt crisis
The euro zone`s debt crisisrsoosaar
 
Marketing in a weak economy
Marketing in a weak economyMarketing in a weak economy
Marketing in a weak economyrsoosaar
 
Is today's economic crisis another great depression
Is today's economic crisis another great depressionIs today's economic crisis another great depression
Is today's economic crisis another great depressionrsoosaar
 
Hope at last
Hope at lastHope at last
Hope at lastrsoosaar
 
Enterprise
EnterpriseEnterprise
Enterprisersoosaar
 
Commercial property blues
Commercial property bluesCommercial property blues
Commercial property bluesrsoosaar
 
Baltic countries are fighting for euro
Baltic countries are fighting for euroBaltic countries are fighting for euro
Baltic countries are fighting for eurorsoosaar
 
Unemployment in spain
Unemployment in spainUnemployment in spain
Unemployment in spainrsoosaar
 
Volcanic fallout
Volcanic falloutVolcanic fallout
Volcanic falloutrsoosaar
 
Hidden costs of climate change in us
Hidden costs of climate change in usHidden costs of climate change in us
Hidden costs of climate change in usrsoosaar
 
Don't miss the tech stock revival
Don't miss the tech stock revivalDon't miss the tech stock revival
Don't miss the tech stock revivalrsoosaar
 
Bailing out greece
Bailing out greeceBailing out greece
Bailing out greecersoosaar
 
The 10 most expensive homes in the world
The 10 most expensive homes in the worldThe 10 most expensive homes in the world
The 10 most expensive homes in the worldrsoosaar
 
Protecting your portfolio from deflation
Protecting your portfolio from deflationProtecting your portfolio from deflation
Protecting your portfolio from deflationrsoosaar
 
China's overheating economy
China's overheating economyChina's overheating economy
China's overheating economyrsoosaar
 
Courageous leadership aadam kurm_ep1
Courageous leadership aadam kurm_ep1Courageous leadership aadam kurm_ep1
Courageous leadership aadam kurm_ep1rsoosaar
 
Employee engagement
Employee engagementEmployee engagement
Employee engagementrsoosaar
 
Export or die
Export or dieExport or die
Export or diersoosaar
 
Learning lessons of latvia's losses
Learning lessons of latvia's lossesLearning lessons of latvia's losses
Learning lessons of latvia's lossesrsoosaar
 

Mais de rsoosaar (20)

Oh, he saw it coming!
Oh, he saw it coming!Oh, he saw it coming!
Oh, he saw it coming!
 
The euro zone`s debt crisis
The euro zone`s debt crisisThe euro zone`s debt crisis
The euro zone`s debt crisis
 
Marketing in a weak economy
Marketing in a weak economyMarketing in a weak economy
Marketing in a weak economy
 
Is today's economic crisis another great depression
Is today's economic crisis another great depressionIs today's economic crisis another great depression
Is today's economic crisis another great depression
 
Hope at last
Hope at lastHope at last
Hope at last
 
Enterprise
EnterpriseEnterprise
Enterprise
 
Commercial property blues
Commercial property bluesCommercial property blues
Commercial property blues
 
Baltic countries are fighting for euro
Baltic countries are fighting for euroBaltic countries are fighting for euro
Baltic countries are fighting for euro
 
Unemployment in spain
Unemployment in spainUnemployment in spain
Unemployment in spain
 
Volcanic fallout
Volcanic falloutVolcanic fallout
Volcanic fallout
 
Hidden costs of climate change in us
Hidden costs of climate change in usHidden costs of climate change in us
Hidden costs of climate change in us
 
Don't miss the tech stock revival
Don't miss the tech stock revivalDon't miss the tech stock revival
Don't miss the tech stock revival
 
Bailing out greece
Bailing out greeceBailing out greece
Bailing out greece
 
The 10 most expensive homes in the world
The 10 most expensive homes in the worldThe 10 most expensive homes in the world
The 10 most expensive homes in the world
 
Protecting your portfolio from deflation
Protecting your portfolio from deflationProtecting your portfolio from deflation
Protecting your portfolio from deflation
 
China's overheating economy
China's overheating economyChina's overheating economy
China's overheating economy
 
Courageous leadership aadam kurm_ep1
Courageous leadership aadam kurm_ep1Courageous leadership aadam kurm_ep1
Courageous leadership aadam kurm_ep1
 
Employee engagement
Employee engagementEmployee engagement
Employee engagement
 
Export or die
Export or dieExport or die
Export or die
 
Learning lessons of latvia's losses
Learning lessons of latvia's lossesLearning lessons of latvia's losses
Learning lessons of latvia's losses
 

Último

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 

Último (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 

Monitoring Employee`S E Mails

Notas do Editor

  1. The Economist Online – February 12th 2010
  2. The presentation lasts about... We are going to talk about...
  3. the act of observing something The act of listening, carrying out surveillance on, and/or recording of enemy emissions for intelligence purposes.
  4. Employee use of electronic mail (e-mail) during business hours is a common characteristic of the 21st century American workplace. According to a recent study, over 130 million workers are currently flooding recipients with 2.8 billion e-mail messages each day.1 Employers provide e-mail services to their employees as an efficient means of facilitating both intra-company communication and communication with the outside client base.2 E-mail serves to increase the efficiency of today's workplace because it is inexpensive to provide, simple to install and easy to use.3 E-mail usage also dramatically decreases the use of office-related, paper-based correspondence. However, despite these efficiencies, this technological advancement is also creating collateral problems concerning issues of employee privacy that today's legal environment appears unprepared to solve. This inadequacy in the law is primarily based on the fact that many employees do not know the extent of their privacy rights regarding their company-provided e-mail accounts. In fact, many employees operate under the false assumption that personal e-mail messages sent from work are protected from their employer's scrutiny.
  5. 1. Maintaining the company's professional reputation and image; 2. Maintaining employee productivity; 3. Preventing and discouraging sexual or other illegal workplace harassment; 4. Preventing "cyberstalking" by employees; 5. Preventing possible defamation liability (kohustuste laimamine); 6. Preventing employee disclosure of trade secrets and other confidential information; and 7. Avoiding copyright and other intellectual property infringement from employees illegally downloading software, etc.8
  6. To motivate compliance with rules and policies, more than one fourth of employers have fired workers for misusing e-mail and nearly one third have fired employees for misusing the Internet. The 28% of employers who have fired workers for e-mail misuse did so for the following reasons: violation of any company policy (64%); inappropriate or offensive language (62%); excessive personal use (26%); breach of confidentiality rules (22%); other (12%). The 30% of bosses who have fired workers for Internet misuse cite the following reasons: viewing, downloading, or uploading inappropriate/offensive content (84%); excessive personal use (34%); other (9%).
  7. Employers are primarily concerned about inappropriate Web surfing, with 66% monitoring Internet connections. Fully 65% of companies use software to block connections to inappropriate Websites—a 27% increase since 2001 when AMA/ePolicy Institute first surveyed electronic monitoring and surveillance policies and procedures. Employers who block access to the Web are concerned about employees visiting adult sites with sexual, romantic, or pornographic content (96%); game sites (61%); social networking sites (50%); entertainment sites (40%); shopping/auction sites (27%); and sports sites (21%). In addition, companies use URL blocks to stop employees from visiting external blogs (18%).
  8. Hard to make the difference between personal and bussiness information.