`
`spy-m»miyflé?"
`
`”*"il-‘iig
`
`What are your company's potential liabilities in cyberspace?
`
`When is e-mail not private?
`
`Why could your biggest Internet security threat
`come from msrde your company network?
`
`How does the Telecommunications Act of 1996 affect
`the way you manage your corporate network?
`
`Panasonic-1017
`
`Page 1 of 18
`
`Panasonic-1017
`Page 1 of 18
`
`
`
`Corporate
`poliiics omcl
`
`qu Jn+erme+
`
`Homes 6. gaskin
`
`To join a Prentice Hall PTR Internet
`mailing list, point to:
`
`http://www.prenhall.com/register
`
`nu'|||
`
`Prentice Hall PTR
`
`Upper Saddle River, NJ 07458
`
`Page 2 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 2 of 18
`
`
`
`
`
`
`
`
`
`
`
`_
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`,
`
`I
`,.
`
`I .
`
`‘
`
`’
`\
`
`
`
`
`
`Prentice-Hall Hispanoamericana, SA ,Mexico
`
`Prentice—Hall of India Private Limited,New Delhi
`
`Prentice-Hall ofJapan, Inc ,Tokyr)
`
`Simon & Schuster Asia Pte. Ltd.,Si;1gupnre
`
`Editora Prentice-Hall do Brasi1,Ltda ,Rio (lejmleiro
`
`ISBN 0-13-651803-6
`
`Prentice-Hall International (UK) Limited, London
`Prentice-Hall ofAustmlia Pty Limited, Sydney
`Prentice-Hall Canada Inc, Toronto
`
`
`
`Panasonic-1017
`
`Page 3 of 18
`
`Includes bibliogmphical references
`ISBN 0-13-6518036
`2 BusineSs enterprises-(Iommunication systems
`I Business—(iomputer network resources
`5
`Internet (Computer network)
`4 World Wide \Veb (Information retrieval system)
`I Title
`H1150 57 (237
`658 4'058—dc2t)
`
`1997
`
`96-46157
`(ZIP
`
`Editorial/production supervision: Raymond E Pajek
`Cover design: AMI/Jon}! Gemmelluro
`Cover illustration: Fun Post
`Manufacturing manager: Alexis R. Hey!"
`Acquisitions editor: Mary Fran:
`
`
`
`©1997 Prentice Hall PTR
`Prentice-Hall, Inc.
`A Simon & Schuster Company
`
`Upper Saddle River, New Jersey 07458
`
`The publisher offers discounts on this book when ordered
`in bulk quantities. For more information, contact:
`
`Corporate Sales Department
`PTR Prentice Hall
`()ne Lake Street
`
`Upper Saddle River, NJ 07458
`
`Phone: 800-382-3419
`Fax12U1-256-7I41
`
`E—mail (Internet): corpsales@prenhall com
`
`All rights reserved. No part of this book may be reproduced, in
`any form or by any means, without permission in writing from
`the publisher.
`
`Printed in the United States ot‘America
`10987654321
`
`{
`
`I '
`
`ti
`
`Panasonic-1017
`Page 3 of 18
`
`
`
`m5
`
`Co Hie n+5
`
`ficknowledgments
`
`xln
`
`Unit/valuation
`
`xvii
`
`Who Needs This Book?
`
`xx
`
`Network Managers xx
`Nettvorle Department Erec‘atives xx
`Executives of Companies Connected to the Internet xxi
`
`Chapter ’1
`
`past present and Future
`
`’1
`
`The Primordial Internet
`
`2
`
`Computers, Commies, TCP/IP, and Unix 3
`The Worm and the Web
`6
`
`The Internet is Dead; Long Live the Internet
`Defining the Problem 8
`MegaNet and Internet Service Providers
`Where Do Commercial Services Fit?
`13
`
`10
`
`8
`
`iii
`
`Page 4 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 4 of 18
`
`
`
`
`
`
`
`
`
`
`'
`
`'2
`.
`
`‘
`
`1'
`
`I
`
`'
`
`.
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`More Internet Scrutiny = More Angr)! People
`Netiquette Fails
`18
`People Split
`19
`
`I 7
`
`20
`Long Live the New Internet
`21
`The Internet as Pop Culture Panacea
`Information SuperHighzvay Metaphors Stink 23
`
`Internet Mutations Ahead 25
`
`Wrap 27
`
`Ckap+er 2 The Naiiomal Jmformation
`Unfras’rrucmre 29
`
`Posturing With Technology 30
`
`N11 Goals 33
`Promote Private Sector Investment 33
`
`Extend the Universal Service Concept 33
`Promote New Applications and Technological Innovation 35
`Promote Seamless, Interactive, User-driven Operation
`of the N11 36
`Ensure Information Security and Netzvorle Reliability 36
`Improve Management of the Radio Frequency Spectrum 38
`Protect Intellectual Property Rights 38
`Coordinate With Other Levels of Government and
`Other Nations 39
`
`Provide Access to Government Information and Improve
`Government Procurement 39
`
`The N11 White Paper and Reactions
`
`40
`
`Intellectual Property Concerns Part
`Information Security Questions 47
`The N11 as a jobs Program 49
`Wrap 50
`
`142
`
`Ckap’rer 3
`
`paying for our JnJrerneJr Addiction 51
`
`Paying for the New Internet
`How It Was
`5.2
`
`51
`
`Replacing Government Funding 54
`
`iV
`
`
`
`Panasonic-1017
`
`Page 5 of 18
`
`Panasonic-1017
`Page 5 of 18
`
`
`
`Centralized Internet Measured Service Billing 6]
`Taxes on Internet Access
`62
`Internet Phones will Cause Regulatory Hassles
`
`64
`
`Buy Domain Names Today, Buy What Tomorrow?
`Domain Name Hijinles
`69
`Advertising on the Ether
`70
`Wrap
`72
`
`67
`
`Charmer /+ The Jmiernaiional Jther‘neJr 75
`
`The World Part of the Wide Web 76
`We Don’t Need No Stinkin’ Borders
`
`76
`
`79
`Conspiracy Fun and Games
`Governments Attempt to Control the Internet 80
`Wrap 82
`
`Chaerer‘ 5 Managing Jerer‘meJr Expectations 85
`
`Beware the Backlash 86
`
`Focus on the Business Advantages of Internet Access 87
`Structure Internet Introduction to Department Needs 88
`
`91
`Training for Internet Access
`Structured Training Methods 92
`Informal Training Methods 94
`Power Users to the Rescue 95
`
`Explaining Your Company's Acceptable Use Policy 96
`Management Must Support the Acceptable Use Policy 98
`No Winks and Nudges Allowed 98
`Wrap 99
`
`'on 35
`
`3 6
`
`ve
`
`:ldidion 5’]
`
`Chapter 6
`
`employee Rules and Jmterna
`poliJrics
`’lO’l
`
`Management Expects Focus on Business
`At—Will Working Conditions
`I ()2
`
`102
`
`Panasonic-1017 Page 6 of 18
`
`Panasonic-1017
`Page 6 of 18
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Information is Power
`
`109
`
`I 10
`Access Means Advantage
`Defusing a Haves vs. Have-Nots Struggle
`Fair Internet Access Principles
`113
`Handling Exceptions
`1 14
`
`I 12
`
`Convincing Employees to Behave
`Log Everything
`11 7
`Handling Pornography and Hate Speech in the Workplace 120
`The Breakroom Rule
`121
`
`1 15
`
`Spouting Inappropriate Statements As a Company Agent
`Wrap
`124
`
`122
`
`Chapter 7
`
`Employee Monitoring and Control 125
`
`Employee Monitoring and Searching is Legal
`First Stop: the Mailroom 127
`Next Stop: the Telephone
`128
`Last Stop: the Network
`129
`
`126
`
`E-Mail is Not Private
`
`131
`
`Employer Can Monitor E-Mail
`E-Mail Archives and the Courts
`
`132
`134
`
`Wrap
`
`I35
`
`Chapter 8
`
`Juternat Computer Security 1337
`
`Forget Hackers, Your Bigger Security Problem is Inside
`Lessons from Retail
`139
`
`137
`
`140
`What’s In Must Stay In
`Security Policy Must Be Understood I41
`Hackers are Getting Smarter and More Mercenary
`Password Parables
`I 43
`
`143
`
`145
`Social Engineering and Security
`Desktop Servers Mean the Death of Security
`
`147
`
`148
`Virus Safeguards
`More Internet Connection means More Virus Problems
`
`149
`
`Wrap
`
`I5 0
`
`
`
`Panasonic-1017
`
`Page 7 of 18
`
`Panasonic-1017
`Page 7 of 18
`
`
`
`Internet Culture no Longer Restrains Participants
`The Internet Becomes Unruly
`152
`Flame Wars, Crossposting, and Spamming
`Canter and Siege]
`15 6
`Flames Grow into Defamation
`Public Figures and the Internet
`
`158
`161
`
`154
`
`152
`
`'ace
`
`120
`
`nt
`
`[22
`
`Co Miro]
`
`“125
`
`ly 137
`
`:
`
`137
`
`149
`
`The "Politically Correct" Quagmire and the Internet
`You Say It, You Sign It
`165
`165
`User Naming Conventions
`Anonymous Remailers
`166
`Avoid Responding From Work
`
`168
`
`162
`
`168
`“Censorship” From All Angles
`Convictions Bordering on Fanaticism 168
`Can Netiquette Stop the Debate?
`1 70
`Dealing with The Right
`I 7]
`Dealing with The Left
`1 72
`Supporting The Middle
`1 72
`
`173
`Your Newsgroup Policy
`I 75
`Why Read Newsgroups
`I 76
`Newsgroup Etiquette
`Flames with the Company in the .Sig
`Wrap
`180
`
`I 78
`
`Chapter 10 Will Madison Avenue Determine
`JVVI’BV‘HGJF Com’reni?
`“183
`
`184
`Commercial Web Sites Explode
`Applying Marketing Ethics (Marketing Ethics?) to the Internet 186
`judging Web Contents Value
`188
`Your Users and Advertising
`I 89
`
`Advertisements People Pay For
`Via E—mail 19]
`
`190
`
`Via Newsgroups
`Wrap
`I 93
`
`I92
`
`Vii
`
`Panasonic-1017 Page 8 of 18
`
`Panasonic-1017
`Page 8 of 18
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The Ethical Angle of Ratings
`Active Rating Options
`197
`199
`Who Implements the Ratings?
`Will Netiquette Carry the Day? 200
`
`196
`
`201
`The Legal Angle of Ratings
`What’s the Penalty for Non-Compliance? 202
`Can the Authorities Keep Up? 203
`Wrap 205
`
`Chapter ”IQ ’IQHA Century Laws vs. 215+ CeHIMl/‘y
`TecIAHOIogy
`207
`
`Cyberporn, Intersmut, and Hate Speech
`What’s Legal On Paper 211
`What’s Legal on the Internet 213
`
`210
`
`The Telecommunications Reform Act of 1996
`Cable TV 216
`
`214
`
`InterSmut and CyberPorn 216
`Universal Service and Video Dial Tone 216
`
`Media Ownership 217
`
`Long Distance and Local Telephone Service 21 7
`Broadcast Spectrum 218
`The V-Chip 218
`Clean Monopolies No More 219
`
`221
`Communications Decency Act
`What the Communications Decency Act Includes 222
`Ongoing Legal Challenges 223
`Applying Existing Obscenity Laws to the Internet 225
`Which Community is the 'Standard' Community? 227
`How Liable Are ISPs and Connected Companies? 228
`
`Enforcement Problems Abound 230
`The Court Decision 233
`
`Politics from the Politicians
`
`234
`
`Will Washington Ruin the Internet? 234
`Pending Laws on Pornography, Free Speech, and Copyright 236
`
`
`
`Panasonic-1017
`
`Page 9 of 18
`
`Panasonic-1017
`Page 9 of 18
`
`
`
`CkapieV 13 Ewes Jn’reilcclmtni proper’ry proieci
`73\nyi-ir\in9 in Cyberspace?
`24’!
`
`Patents, Trademarks, and Copyrights
`Patents 244
`Trademarks 245
`Copyrights 246
`
`2435
`
`NH White Paper Attempts New Law 248
`“Tangible Medium OfExpression” 249
`Your Rights From the First Sale Doctrine 252
`Fair Use—the Blurry Line 254
`The Far Side of the Blurry Line 257
`Copyright Rules of the Future? 258
`International Considerations 261
`
`262
`Domain Names are Now Valuable
`The Domain Name Land Rush 264
`
`Copyright and Trademark Tests Enforced 266
`
`Finding Experts in Cyberlaw 272
`Wrap 274
`
`Ciaopier 14 Avoiding Discriminaiion Lawsuits
`
`277
`
`Preventing Hostile Workplace Hassles
`Sexual Harassment Conditions 280
`
`278
`
`Title VII and "Reasonable" People
`282
`Company Protection Against Unreasonable People 283
`Wrap 286
`
`Ciaopier ’15 poii’rics For Jn’rerne’r Service
`providers
`289
`
`l 5+ Cal/\er ”Y
`
`2
`
`)
`' 7
`8
`
`yright 236
`
`Are ISPs Responsible for Every Copyright Flowing Across their
`Network?
`29 1
`
`iX
`
`Page 10 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 10 of 18
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`What Model do we Use for Regulation? 2799
`Broadcaster 300
`Press 302
`
`Republisher 303
`Public Forum 304
`
`Physical Bulletin Board 305
`Mail 306
`Common Carrier 307
`
`Implied License 309
`Action After Awareness 3 12
`Is E—mail Filtering Next? 313
`Should ISPs Lobby In Self-Defense? How? 314
`
`Will Bill Gates, Robert Kavner, or Lou Gerstner Ever be Arrested?
`Unmasking the Cowards 31 7
`Wrap 319
`
`315
`
`Chaerer 16 politics for Covfierfi providers
`
`321
`
`Intellectual Property and the Content Provider
`Web Implied License for Viewers 323
`Protecting Your Web Contents 324
`Learning From Other Web Sites 327
`Get Permission forAll Pieces of Your Web 329
`Publish With Perplexed Permissions: A Tale of Copyright and the Web 329
`Contractors and Your Web Copyright 331
`
`322
`
`Obscenity and the Content Provider
`You Know It When You See It 333
`
`332
`
`Wrap 334
`
`Chapter ’l7 Defining Your )Acceptable (Ase
`policy
`337
`
`
`
`
`341
`Reasonable Acceptable Use Policy Guidelines
`Legal Ramzfications of Your Acceptable Use Policy 343
`Acceptable Use Policies and Employee Termination 3 45
`
`Current State of Corporate Acceptable Use Policy Implementation 338
`
`Panasonic-1017
`
`Page 1 l of 18
`
`Panasonic-1017
`Page 11 of 18
`
`
`
`349
`
`Writing Your Acceptable Use Policy
`Scope and Overview 351
`Email 352
`World Wide Web 356
`Newsgroups 35 7
`Internet Relay Chat Channels and Multi-User Domains 359
`Your Actions are Monitored 360
`Consequences ofMisuse 362
`Your Signature, Please 366
`
`Acceptable Use Policy Examples
`Internet User Companies 368
`Privacy 3 70
`Sexual Harassment and Discrimination 3 71
`Trade Secrets and Confidentiality 3 71
`
`367
`
`Employee Productivity 3 72
`Other Human Resource Issues 3 73
`Internet Service Providers
`3 73
`
`3 74
`Internet America Acceptable Use Policy:
`Appropriate Use Policy for OnRamp Technologies, Inc.
`Acceptable Usage of PPP Accounts 3 76
`Inactivity and Disconnect Inactivity Policy 3 77
`Us‘enet Policy and Acceptable Posting Procedures 3 78
`Customer Responsibility and Cooperation 380
`Acceptable Use Of Onramp Web Servers and Restrictions 381
`Notes from Other ISPs 382
`
`3 75
`
`383
`
`Other Company Policies
`Security Policy 384
`Software Protection Guidelines 385
`Sample Corporate Policy Statement 386
`Wrap 387
`
`Ckap’rer ’18 Overview of Cot/\Jrrol Opiions
`
`389
`
`The Acceptable Use Policy Committee
`Choosing Committee Members 390
`The First Meeting Demonstration 395
`The Acceptable Use Policy Committee ’s Mandate 396
`Who Disciplines Policy Violators? 398
`
`390
`
`Xi
`
`)e Arrested?
`
`315
`
`Jews
`
`321
`
`ght and the Web 329
`
`- (Ase
`
`)lementation
`
`338
`
`43
`3 45
`
`Page 12 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 12 of 18
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`1
`'
`
`.
`f
`
`1
`
`PC IAN to Internet Gateways
`WebTrack
`405
`
`40.2
`
`Children’s Protective Software will Become Corporate 404
`
`Mixed Systems Will Be Common
`Wrap 406
`
`405
`
`Clwufier19 LAQn91:WemmMs(mwip%oxy53emmws+o
`Control Your Ne+WOrl<
`409
`
`Keeping Outsiders Out
`Keeping Insiders In
`
`410
`412
`
`Blocking Access to Internet Web Sites
`Blocking Access To Newsgroups 415
`Blocking Access By Time
`416
`
`415
`
`Logging Internet Activity
`Wrap
`419
`References 419
`
`417
`
`Chapter 20 Using Juternet Gateways to Control
`Your NeJrWOrk
`42’]
`
`425
`Keeping Outsiders Out
`Keeping Insiders In 425
`
`Blocking Access to Internet Web Sites
`Blocking Access to Newsgroups 428
`Blocking Access by Time
`430
`
`427
`
`
`
`
`
`Logging Internet Activity
`Wrap
`431
`
`430
`
`'
`
`Glossary 433
`
`
`
`deex 44/]
`
`
`
`Panasonic-1017
`
`Page 13 of 18
`
`Panasonic-1017
`Page 13 of 18
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`'
`
`
`
`
`
`
`
`.
`
`l'se Policy lit-rim,- my} :lre
`Each employee should sign the :‘\t‘t't;‘|)l;l|“llt'
`allowed on the Internet if at all possible. Nut only th‘lt’h this make the emnmmr's
`legal stance stronger, it avoids arguing with employees who hm e hail mat. rim
`of the Internet prior to the Acceptable lise l’ulie} (kW(.‘ltll'll‘llt.‘l‘l1.(.IUI’III-I‘U'nfI
`II it 1:15
`are fine things to avoid, thank you.
`If you provide Internet training, then the tenets of your Acceptable Use
`Policy should be a part of that training. If you don’t provide training (Shame on
`you).1l1en make each employee sign theAceeptnhle Ilse Poliei hel'nrc installing
`ll‘ltfil' Internet access software. Keep copies ol' the policy available for ""L‘I‘l'nne,
`and remind people of the rules on a regular basis. Employee newsletters are
`good reminder options, but not enough. If you have an easy way to place “Word
`of the Day” on computer screens when users log into the system, put the out-
`line of yourAcceptable Use Policy there every month as a reminder.This is espe-
`cially helpful in large companies that don’t have employees sign a physical c0py
`of their Acceptable Use Policy.
`
`None of this is necessary in the wonderful world of American business,
`however, because each employee reads everything they sign and conscien-
`
`tiously follows company rules. Now that we’ve broken the tension with a good
`
`laugh, let’s continue.
`
`One policy I saw from the California Department of Education requires
`
`eight initialed sections, the student signature, the parent’s signature, and two
`
`teacher signatures. Putting students and the Internet together can be a prob-
`
`lem, as we saw earlier, so the more signatures the merrier. These sections
`needed initials:
`
`- Personal responsibility
`
`- Acceptable use
`
`- The privilege of using the system
`
`- Network etiquette and privacy
`
`0 Services (the school is not responsible for data loss or system delay, etc.)
`
`0 Security
`
`- Vandalism (they’re against it)
`
`- Updating (changes to registration information)
`
`366
`
`
`
`Panasonic-1017
`
`Page 14 of 18
`
`Panasonic-1017
`Page 14 of 18
`
`
`
`before they are
`(e the company‘s
`ave had free run
`
`t. Confrontations
`
`:Acceptable Use
`
`aining (shame on
`
`' before installing
`ble for everyone,
`3 newsletters are
`
`1y to place “Word
`
`tem, put the out-
`
`nder.This is espe-
`
`n a physical copy
`
`nerican business,
`
`;n and conscien-
`
`lSiOl’l with a good
`
`iucation requires
`
`gnature, and two
`
`:r can be a prob-
`-r. These sections
`
`revised without requiring another marathon signing session, which makes life
`easier for the network administrators.
`
`Must your employees sign a dozen times to get Internet access? Probably
`not, but it won’t hurt to ask them to initial something if your management feels
`strongly enough about that topic. Good candidates for initialing would be the
`restriction on pornographic images in any form, copyright infringement, copy-
`ing company software out to another system on the Internet, and protecting
`trade secrets.
`
`Remember: no signed Acceptable Use Policy on file (if your company uses
`signed forms), no Internet access.Tying the last section to this one, how will
`you handle a user who allows an unauthorized employee Internet access by let-
`ting them share the PC? Who gets punished? How severely? Should you add that
`to the list of signed items?
`
`Acceptable Use POIiCV Examples
`
`If you’re clever, you’ve already searched the Internet with keywords
`“Acceptable Use Policy” to see what you can find. If you’re devious, you looked
`at this book in the store, then went home to try the search before coming back
`to buy the book. If you had just bought the book the first time, you would have
`saved yourself a trip.
`
`After searching the Internet, you were likely surprised to find that the only
`Acceptable Use Policies you could find were from high schools, universities, or
`Internet Service Providers.Why is that?
`
`Because companies don’t put their Acceptable Use Policies on display,
`that’s why.There are two reasons for this:
`
`0 Policies cost money in the form of lawyer’s fees, and management
`doesn’t want to give away expensive documents
`
`system delay, etc.)
`
`0 Policies reveal internal information companies may not wish to broad—
`cast to the world
`
`This makes it difficult to copy someone else’s policy and replace their
`name with yours, doesn’t it? Yes, people would do that, in spite of the copyright
`
`
`367
`
`
`
`Panasonic-1017
`
`Page 15 of 18
`
`Panasonic-1017
`Page 15 of 18
`
`
`
`Webster Network Strategies, 403
`WebTrack, 400, 403-4
`Whinston,Andrew B., 62
`Windows NT firewalls, 411
`WinSock (WINdows SOCKets), 425-26, 430
`Wiretap Act, 125
`Workarounds, encryption/decryption, 260
`Working Group on Encryption and
`Telecommunications, 37
`Workplace, censorship in, 1 20-2 1
`Workplace policies, See Employee
`rules/internal policies
`World Intellectual Property Organi-
`zation, 39
`World Wide Web (WWW), See WWW
`Worm (November 1988), 6, 29, 399
`www.eff.0rg, 41
`www.ggtech.com, 339, 356
`www.prenhall.c0m, 15
`www.spa.org, 385
`WWW (World Wide Web), 68, 76-78
`Acceptable Use Policy, 356-57
`ad revenue, 22
`HTML, 7
`origin of, 7
`and TCP/IP, 7
`
`X "
`
`X-ON Congress: Indecent Comment on an
`Indecent Subject" (Russell), 224
`
`Y Y
`
`1 1 1
`ahoo,
`Your Rights at Work (McWhirter), 102-3, 280
`
`U U
`
`niversal Service, 216-17
`Universal Service Working Group, 34
`Unix, 4-5,7,91, 147
`and AT&T, 5
`BSD (Berkeley Software Distribution)
`Unix, 5
`URL (Uniform Resource Locator), 15
`U.S.Advisory Council for the National
`Information Infrastructure (N11), 31
`Usenet newsgroups, See Newsgroups, 173
`User naming conventions, 165-66
`UUENCODE/UUDEDODE, 231-32
`UUNET Technologies, Inc., 11, 12
`
`V V
`
`—Chip, 218-19
`Video Dial Tone, 216-17
`Violators, ofAcceptable Use Policy,
`discipline of, 39899
`Viruses, 148-50
`Vlakancic, Connor, 238-39
`VON (Voice on the Net), 67
`Voters Telecommunications Watch, 22 1
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`W W
`
`
`
`
`
`
`
`
`AIS (Wide Area Information Service), 7,
`413-14
`Web browsers, 7
`Web contents value, judging, 188-89
`Web page ratings, 195-205
`active rating options, 197-98
`
`enforcement difficulties, 203-5
`ethical angle of, 196200
`
`implementation of, 199-200
`
`legal angle of, 201-5
`
`and netiquette, 200-201
`
`non-compliance penalties, 202-3
`RSACi (RSAC for the Internet), 199—200,
`
`202
`
`
`
`Panasonic-1017
`
`Page 16 of 18
`
`Panasonic-1017
`Page 16 of 18
`
`
`
`INTERNET
`
`Wm Wow
`
`
`
`
`
`
`
`
`
`
`ake no mistake. The lnternet—newly discovered by
`politicians and lawyers—presents a minefield of risks and
`potential liabilities. But you can't walk away from the
`profound competitive opportunities it offers. So what's your
`alternative?
`
`ln Corporate Politics and the Internet, leading network consultant
`James Caskin shows you exactly how to lead your company
`through today's new jungle of Internet—related legal, ethical
`and personnel decisions.
`
`Discover how to make sure you're well-positioned to handle
`the inevitable debates about your Internet presence. Learn
`how to successfully implement an Acceptable Use Policy that
`will significantly reduce your risks of liability to discrimination,
`harassment and copyright infringement lawsuits.
`
`Whether you're a Webmaster, network administrator, IS
`professional, senior manager, marketer, or lawyer, you need
`to know how to protect your organization's interests in the
`revolutionary lnternet environment. Everyone knows the
`Internet is hot: This book will keep you from getting burned!
`
`JAMES E. CASKIN is a leading network consultant who has
`authored four popular books, most recently NetWare to Internet
`Gateways (Prentice Hall), and teaches a Networld+lnterop
`tutorial on Internet connectivity.
`
`
`
`
`
`II
`
`I
`
`I
`I
`'
`I
`
`'l
`
`|
`
`I
`
`I
`'
`
`|
`
`| I
`
`PRENTICE HALL
`
`Upper Saddle River, NJ 07458
`
`U.S. $24.95
`Canada $34.95
`
`http://www.prenhall.com
`
`0
`
`70‘—D—13——N——G—G—4—U1—
`
`ISBN EI-lEl-ESLBDEI -l:.
`
`llll
`
`llll
`
`6 51303?
`
`90000
`
`9 78013
`
`1
`
`Panasonic-1017 Page 17 of 18
`
`
`LEARN HOW THE
`
`
`INTERNET IS IMPACTING
`YOUR ORGANIZATION,
`AND WALK THROUGH THE
`HUMAN, LEGAL AND
`TECHNOLOGY ISSUES
`SURROUNDING
`QUESTIONS LIKE...
`
`
`
`
`When is your e-mail not
`private?
`
`How do you give people
`Web access... and still
`
`keep them productive?
`
`What can you do to
`protect your own valuable
`content against theft?
`
`How can you limit your
`company's potential
`liabilities in cyberspace?
`
`
`
`
`
`
`
`
`
`
`
`
`
`How can you deal with
`
`your biggest Internet
`
`security problems—the
`
`ones that come from
`
`inside?
`
`
`Panasonic-1017
`Page 17 of 18
`
`
`
`
`
`Panasonic-1017
`
`Page 18 of 18
`
`Panasonic-1017
`Page 18 of 18
`
`