throbber
NTTUALCNRSMULOLCUCM UCUCSE Msegy[eed
`Whenis e-mail not private?
`TMC RACes eC SeeUC]
`TIMCOMUUSCISM OTT)TA)mICELATCL
`How doesthe Telecommunications Act of 1996 affect
`TERE URETEUeR OUIULLCR CsLe
`
`Panasonic-1017
`Page | of 18
`
`a
`
`a:
`
`ole
`
`oe’
`
`0LLL
`
` 4
`
`Panasonic-1017
`Page 1 of 18
`
`

`

`Co YO vate
`Politics and
`the Onternet
`
`James E. Gaskin
`
`To join a Prentice Hall PTR Internet
`mailing list, point to:
`
`http://www. prenhall.com/register
`
`Wi
`
`Prentice Hall PTR
`
`Upper Saddle River, NJ 07458
`
`Page 2 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 2 of 18
`
`

`

`
`
`
`
`
`
`
`
`
`!
`{
`
`|
`
`3
`
`Includes bibliographical references
`ISBN 0-13-65 1803-6
`2 Business enterprises-Communication systems
`1. Business-Computer network resources,
`4,
`Internet (Computer network)
`4, World Wide Web (information retrieval system)
`I. Title
`HD30.37.G37 1997
`658.4'038-de20
`
`96-46157CrP
`
`Editorial/production supervision: Raymond E Pajek
`Cover design: Anthony Genunellaro
`Coverillustration: Yom Post
`Manufacturing manager: Alexis R, Heydt
`Acquisitions editor: Mary Franz
`
`
`
`©1997 Prentice Hall PTR
`Prentice-Hall, Inc.
`A Simon & Schuster Company
`Upper Saddle River, New Jersey 07458
`
`The publisher offers discounts onthis book when ordered
`in bulk quantities. For more information, contact:
`
`Corporate Sales Department
`PTR Prentice Hall
`One Lake Street
`UpperSaddle River, NJ 07438
`
`Phone: 800-382-3419
`Fax: 201-236-7141
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`mel
`
`emma
`
`E-mail (Internet): corpsales@prenhall.com
`
`All rights reserved. Nopart of this book may be reproduced, in
`anyform or by any means, without permission in writing from
`the publisher.
`
`Printed in the United States ofAmerica
`109 8
`7
`6
`5 43 2
`«1
`
`ISBN 0-13-651803-6
`
`Prentice-Hall International (UK) Limited, Zovcon
`Prentice-Hall ofAustralia Pry. Limited, Sydney
`Prentice-Hall Canada Inc., Toronto
`Prentice-Hall Hispanoamericana, S.A., Mexico
`Prentice-Hall of India Private Limited, New! Delhi
`Prentice-Hall of Japan, Inc., Tokyo
`Simon & SchusterAsia Pte. Ltd., Singapore
`Editora Prentice-Hall do Brasil, Ltda., Rio de Janetro
`
`j
`
`Panasonic-1017
`Page 3 of 18
`
`
`
`Panasonic-1017
`Page 3 of 18
`
`

`

`Ns.
`
`Contents
`
`Acknowledgments
`
`xin
`
`Tntvoduction—xvil
`
`Who Needs This Book?
`
`xx
`
`Xxx
`Network Managers
`Network Department Executives XX
`Executives of Compantes Connected to the Internet xxi
`
`Chapter 1
`
`Past, Present, and Future
`
`1
`
`22
`
`The Primordial Internet
`
`2
`
`Computers, Commies, TCP/IP, and Unix
`The Worm and the Web
`6
`
`The Internet is Dead; Long Live the Internet
`Defining the Problem 8
`MegaNet and Internet Service Providers
`Where Do Commercial Services Fit?
`13
`
`LO
`
`8
`
`iil
`
`Page 4 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 4 of 18
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`More Internet Scrutiny = More Angry People
`Netiquette Fails
`18
`People Split
`19
`
`17
`
`20
`Long Live the New Internet
`21
`The Internet as Pop Culture Panacea
`Information SuperHighway Metaphors Stink 23
`
`Internet Mutations Ahead 25
`Wrap 27
`
`Chapter 29 The National Information
`Infrastructure 29
`
`Posturing With Technology 30
`NU Goals 33
`Promote Private Sector Investment 33
`Extend the Universal Service Concept 33
`Promote NewApplications and Technological Innovation 35
`Promote Seamless, Interactive, User-driven Operation
`of tbe NIT 36
`Ensure Information Security and Network Reliability 36
`Improve Management of the Radio Frequency Spectrum 38
`Protect Intellectual Property Rights 38
`Coordinate With Other Levels of Government and
`Other Nations 39
`Provide Access to Government Information and Improve
`Government Procurement 39
`The NII White Paper and Reactions
`
`40
`
`Intellectual Property Concerns Part
`Information Security Questions 47
`The NI as a Jobs Progra 49
`Wrap 50
`
`142
`
`Chapter 3
`
`Paying for our Snternet Addiction 51
`
`Paying for the New Internet
`How It Was 52
`Replacing Government Funding 54
`
`51
`
`
`
`
`
`
`
`
`
`
`iv Panasonic-1017
`
`Page 5 of 18
`
`Panasonic-1017
`Page 5 of 18
`
`

`

`Centralized Internet Measured Service Billing
`Taxes on Internet Access
`62
`Internet Phones will Cause Regulatory Hassles
`
`61
`
`64
`
`Buy Domain NamesToday, Buy What Tomorrow?
`Domain Name Hijinks
`69
`Advertising on the Ether
`70
`Wrap
`72
`
`67
`
`Chapter 4 The Jnternational Internet 75
`The World Part of the Wide Web 76
`We Don’t Need NoStinkin’ Borders
`Conspiracy Fun and Games
`79
`Governments Attempt to Control the Internet
`Wrap
`82
`
`S80
`
`76
`
`Chapter 5 Managing Internet Cx pectations 85
`
`rm
`
`2
`
`.
`
`1
`
`on 35
`
`36
`H 38
`
`ae
`
`Beware the Backlash 86
`Focus on the Business Advantages ofInternet Access 87
`Structure Internet Introduction to Department Needs
`8&8
`Training for Internet Access
`91
`Structured Training Methods 92
`Informal Training Methods 94
`Power Users to the Rescue 95
`
`Explaining Your Company's Acceptable Use Policy 96
`Management Must Support the Acceptable Use Policy 98
`No Winks and Nudges Allowed 98
`Wrap 99
`
`ddiction 51
`
`Chapter 6
`
`Employee Rules and Jnterna
`Politics 1071
`
`Management Expects Focus on Business
`At-Will Working Conditions
`102
`
`102
`
`Page 6 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 6 of 18
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`|
`
`}
`
`(eeepee
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`109
`Information is Power
`110
`Access Means Advantage
`Defusing a Haves vs. Have-Nots Struggle
`Fair Internet Access Principles
`113
`Handling Exceptions
`114
`
`112
`
`115
`
`Convincing Employees to Behave
`Log Everything
`117
`Handling Pornography and Hate Speech in the Workplace
`The Breakroom Rule
`121
`Spouting Inappropriate Statements As a Company Agent
`Wrap
`124
`
`120
`
`122
`
`Chapter 7
`
`Employee Monitoring and Control 125
`
`Employee Monitoring and Searching is Legal
`First Stop: the Mailroom 127
`Next Stop: the Telepbone
`128
`Last Stop: the Network
`129
`
`126
`
`131
`E-Mail is Not Private
`Employer Can Monitor E-Mail 132
`E-Mail Archives and the Courts
`134
`Wrap
`135
`
`Chapter 8
`
`Internal Computer Security 137
`
`Forget Hackers, Your Bigger Security Problem is Inside
`Lessons from Retail
`139
`
`137
`
`140
`What’s In Must Stay In
`Security Policy Must Be Understood 141
`Hackers are Getting Smarter and More Mercenary
`Password Parables
`143
`145
`Social Engineering and Security
`Desktop Servers Meanthe Death of Security
`
`147
`
`143
`
`
`
`4
`
`148
`Virus Safeguards
`More Internet Connection means More Virus Problems
`Wrap
`150
`
`149
`
`Panasonic-1017
`Page 7 of 18
`
`Panasonic-1017
`Page 7 of 18
`
`€
`

`

`Internet Culture no Longer Restrains Participants
`The Internet Becomes Unruly
`152
`Flame Wars, Crossposting, and Spamming
`Canter and Siegel 156
`Flames Grow into Defamation
`Public Figures and the Internet
`
`158
`161
`
`154
`
`152
`
`ace
`
`120
`
`nt
`
`122
`
`Control 125
`
`ry 137
`
`>
`
`«137
`
`149
`
`The "Politically Correct" Quagmire and the Internet
`You Say It, You Sign It
`163
`165
`User Naming Conventions
`Anonymous Remailers
`166
`Avoid Responding From Work
`
`168
`
`162
`
`168
`“Censorship” From All Angles
`Convictions Bordering on Fanaticism 168
`Can Netiquette Stop the Debate?
`170
`Dealing with The Right
`171
`Dealing with The Left
`172
`Supporting The Middle
`172
`
`173
`Your Newsgroup Policy
`175
`Why Read Newsgroups
`176
`Newsgroup Etiquette
`Flames with the Companyin the Sig 178
`Wrap
`180
`
`Chapter 10 Will Madison Avenue Determine
`Internet Content?
`183
`
`184
`Commercial Web Sites Explode
`Applying Marketing Ethics (Marketing Ethics?) to the Internet 186
`Judging Web Contents Value
`188
`Your Users and Advertising
`189
`
`Advertisements People Pay For
`Via E-mail
`191
`Via Newsgroups
`Wrap
`193
`
`192
`
`190
`
`vii
`
`Page 8 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 8 of 18
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The Ethical Angle of Ratings
`Active Rating Options
`197
`199
`Who Implements the Ratings?
`Will Netiquette Carry the Day? 200
`
`196
`
`201
`The Legal Angle of Ratings
`What's the Penalty for Non-Compliance? 202
`Can the Authorities Keep Up? 203
`Wrap 205
`
`Chapter 12 19th Century Lawsvs. 21st Century
`Technology
`207
`
`Cyberporn, Intersmut, and Hate Speech
`What's Legal On Paper 211
`What's Legal on the Internet 213
`
`210
`
`214
`
`The Telecommunications Reform Act of 1996
`Cable TV 216
`InterSmut and CyberPorn 216
`Universal Service and Video Dial Tone 216
`Media Ownership 217
`Long Distance and Local Telephone Service 217
`Broadcast Spectrum 218
`The V-Chip 218
`Clean Monopolies No More 219
`
`221
`Communications Decency Act
`What the Communications Decency Act Includes 222
`Ongoing Legal Challenges 223
`Applying Existing Obscenity Lawsto the Internet 225
`Which Community is the ‘Standard’ Community? 227
`How Liable Are ISPs and Connected Companies? 228
`Enforcement Problems Abound 230
`The Court Decision 233
`
`234
`Politics from the Politicians
`Will Washington Ruin the Internet? 234
`Pending Laws on Pornography, Free Speech, and Copyright 236
`
`Panasonic-1017
`Page 9 of 18
`
`Panasonic-1017
`Page 9 of 18
`
`

`

`Chapter 13 Does Intellectual Property Protect
`Anything in Cyberspace?
`241
`
`243
`
`Patents, Trademarks, and Copyrights
`Patents 244
`Trademarks 245
`Copyrights 246
`NII White Paper Attempts New Law 248
`“Tangible Medium OfExpression” 249
`Your Rights From the First Sale Doctrine 252
`Fair Use—the Blurry Line 254
`The Far Side of the Blurry Line 257
`Copyright Rules of the Future? 258
`International Considerations 261
`
`262
`Domain Names are Now Valuable
`The Domain Name Land Rush 264
`Copyright and Trademark Tests Enforced 266
`
`Finding Experts in Cyberlaw 272
`Wrap 274
`
`Chapter 14 Avoiding Discrimination Lawsutts
`
`277
`
`Preventing Hostile Workplace Hassles
`Sexual Harassment Conditions 280
`
`278
`
`Title VII and "Reasonable" People
`282
`Company Protection Against Unreasonable People 283
`Wrap 286
`
`Chapter 15 Politics For Onternet Sewice
`Providers
`289
`
`Ist Centu "y
`
`2
`
`;
`7

`
`yright 236
`
`Are ISPs Responsible for Every Copyright Flowing Across their
`Network?
`291
`
`Page 10 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 10 of 18
`
`

`

`What Model do we Use for Regulation? 299
`Broadcaster 300
`Press 302
`Republisher 303
`Public Forum 304
`Physical Bulletin Board 305
`Mail 306
`CommonCarrier 307
`Implied License 309
`Action After Awareness 312
`Is E-mail Filtering Next? 313
`Should ISPs Lobby In Self-Defense? How? 314
`
`Will Bill Gates, Robert Kavner, or Lou Gerstner Ever be Arrested?
`Unmasking the Cowards 317
`Wrap 319
`
`315
`
`Chapter 16 Politics for Content Providers
`
`321
`
`Intellectual Property and the Content Provider
`Web Implied License for Viewers 323
`Protecting Your Web Contents 324
`Learning From Other Web Sites 327
`Get Permission for All Pieces of Your Web 329
`Publish With Perplexed Permissions: A Tale of Copyright and the Web 329
`Contractors and Your Web Copyright 331
`
`322
`
`Obscenity and the Content Provider
`You KnowIt When You See It 333
`Wrap 334
`
`332
`
`‘
`4
`
`a
`
`“4
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Chapter 17 Defining Your Acceptable Use
`Policy
`337
`
`Current State of Corporate Acceptable Use Policy Implementation 338
`
`|
`
`341
`Reasonable Acceptable Use Policy Guidelines
`Legal Ramifications of Your Acceptable Use Policy 343
`Acceptable Use Policies and Employee Termination 345
`
`Panasonic-1017
`Page 11 of 18
`
`Panasonic-1017
`Page 11 of 18
`
`

`

`349
`
`Writing Your Acceptable Use Policy
`Scope and Overview 351
`E-mail 352
`World Wide Web 356
`Newsgroups 357
`Internet Relay Chat Channels and Multi-User Domains 359
`Your Actions are Monitored 360
`Consequences ofMisuse 362
`Your Signature, Please 366
`
`367
`
`Acceptable Use Policy Examples
`Internet User Companies 368
`Privacy 370
`Sexual Harassment and Discrimination 371
`Trade Secrets and Confidentiality 371
`Employee Productivity 372
`Other Human Resource Issues 373
`Internet Service Providers 373
`Internet America Acceptable Use Policy: 374
`Appropriate Use Policy for OnRamp Technologies, Inc.
`Acceptable Usage of PPP Accounts 376
`Inactivity and Disconnect Inactivity Policy 377
`Usenet Policy and Acceptable Posting Procedures 378
`Customer Responsibility and Cooperation 380
`Acceptable Use Of Onramp Web Servers and Restrictions 381
`Notesfrom Other ISPs 382
`
`375
`
`383
`
`Other Company Policies
`Security Policy 384
`Software Protection Guidelines 385
`Sample Corporate Policy Statement 386
`Wrap 387
`
`Chapter 18 Overview of Control Options
`The Acceptable Use Policy Committee
`390
`Choosing Committee Members 390
`The First Meeting Demonstration 395
`The Acceptable Use Policy Committee’s Mandate 396
`Who Disciplines Policy Violators? 398
`
`389
`
`xi
`
`ye Arrested?
`
`315
`
`le rs 32
`
`ght and the Web 329
`
`Use
`
`lementation 338
`
`43
`45
`
`Page 12 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 12 of 18
`
`

`

`Proxy Servers 401
`PC LAN to Internet Gateways
`WebTrack
`403
`Children’s Protective Software will Become Corporate 404
`
`402
`
`MixedSystems will Be Common
`Wrap 406
`
`405
`
`Chapter 19 Using Firewalls and Proxy Servers to
`Control Your Network
`409
`
`Keeping Outsiders Out
`Keeping Insiders In
`
`410
`412
`
`Blocking Access to Internet Web Sites
`Blocking Access To Newsgroups 415
`Blocking Access By Time
`416
`
`413
`
`Logging Internet Activity
`Wrap
`419
`References 419
`
`417
`
`Chapter 20 Using Internet Gateways to Control
`Your Network
`421
`
`423
`Keeping Outsiders Out
`Keeping Insiders In 425
`
`Blocking Access to Internet Web Sites
`Blocking Access to Newsgroups 428
`Blocking Access by Time
`430
`
`427
`
`Logging Internet Activity
`Wrap
`431
`
`430
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Glossary 433 Index 441
`
`
`
`Panasonic-1017
`Page 13 of 18
`
`Panasonic-1017
`Page 13 of 18
`
`

`

`Each employee should sign the Acceptable Use Policy before they ar.
`allowed on the Internetif at all possible. Not only does this make the coripardtt
`legal stance stronger, it avoids arguing with employees who have had fied a
`© run
`of the Internet prior to the Acceptable Use Policy development. Confront;
`tions
`are fine things to avoid, thank you.
`If you provide Internet training, then the tenets of your Acceptable Use
`Policy should be a part of that training. If you don’t provide training (shame on
`you), then make each employee sign the Acceptable Use Policy before installing
`their Internet access software. Keep copies of the policy available for eve ryone,
`and remind people of the rules on a regular basis. Employee newsletters are
`good reminder options, but not enough. If you have an easy wayto place “Word
`of the Day” on computer screens when users log into the system, put the out.
`line of your Acceptable Use Policy there every month as a reminder.Thisis espe-
`cially helpful in large companies that don’t have employees sign a physical copy
`of their Acceptable Use Policy.
`Noneof this is necessary in the wonderful world of American business,
`however, because each employee reads everything they sign and conscien-
`tiously follows company rules. Now that we’ve broken the tension with a good
`laugh,let’s continue.
`One policy I saw from the California Department of Education requires
`eight initialed sections, the student signature, the parent’s signature, and two
`teacher signatures. Putting students and the Internet together can be a prob-
`lem, as we saw earlier, so the more signatures the merrier. These sections
`neededinitials:
`
`¢ Personal responsibility
`
`* Acceptable use
`
`¢ The privilege of using the system
`
`* Network etiquette and privacy
`* Services (the school is not responsible for data loss or system delay, etc.)
`
`e Security
`
`¢ Vandalism (they’re against it)
`
`
`366
`
`¢ Updating (changesto registration information)
`
`Page 14 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 14 of 18
`
`

`

`before they are
`ce the company’s
`ave had free run
`t. Confrontations
`
`‘ Acceptable Use
`1ining (shame on
`before installing
`ble for everyone,
`> newsletters are
`iy to place “Word
`tem, put the out-
`nder.This is espe-
`na physical copy
`
`nerican business,
`mn and conscien-
`ision with a good
`
`jucation requires
`gnature, and two
`+r can be a prob-
`1. These sections
`
`revised without requiring another marathon signing session, which makeslife
`easier for the network administrators.
`Must your employees sign a dozen times to get Internet access? Probably
`not, but it won’t hurt to ask them to initial something if your managementfeels
`strongly enough about that topic. Good candidates for initialing would be the
`restriction on pornographic images in any form, copyright infringement, copy-
`ing Company software out to another system on the Internet, and protecting
`trade secrets.
`Remember: no signed Acceptable Use Policy onfile Gif your company uses
`signed forms), no Internet access. Tying the last section to this one, how will
`you handle a user who allows an unauthorized employeeInternet access bylet-
`ting them share the PC? Whogets punished? How severely? Should you add that
`to the list of signed items?
`
`Acceptable Use Policy Examples
`
`If you're clever, you’ve already searched the Internet with keywords
`“Acceptable Use Policy” to see what you can find. If you’re devious, you looked
`at this book in the store, then went hometo try the search before coming back
`to buy the book.If you had just bought the bookthefirst time, you would have
`saved yourself a trip.
`After searching the Internet, you werelikely surprised to find that the only
`Acceptable Use Policies you could find were from high schools, universities, or
`Internet Service Providers. Whyis that?
`Because companies don’t put their Acceptable Use Policies on display,
`that’s why.There are two reasonsfor this:
`
`* Policies cost moneyin the form of lawyer’s fees, and management
`doesn’t want to give away expensive documents
`
`system delay, etc.)
`
`* Policies reveal internal information companies may not wish to broad-
`cast to the world
`
`This makes it difficult to copy someoneelse’s policy and replace their
`name with yours, doesn’t it? Yes, people would do that, in spite of the copyright
`
`
`
`367
`
`
`
`Panasonic-1017
`Page 15 of 18
`
`Panasonic-1017
`Page 15 of 18
`
`

`

`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Universal Service, 216-17
`Universal Service Working Group, 34
`Unix, 45,7,91, 147
`and AT&T, 5
`BSD Gerkeley Software Distribution)
`Unix, 5
`URL (Uniform Resource Locator), 15
`U.S.Advisory Council for the National
`Information Infrastructure (NID, 31
`Usenet newsgroups, See Newsgroups, 173
`User naming conventions, 165-66
`UUENCODE/UUDEDODE, 231-32
`UUNET Technologies, Inc., 11, 12
`
`V
`
`V-Chip, 218-19
`Video Dial Tone, 216-17
`Violators, ofAcceptable Use Policy,
`discipline of, 398-99
`Viruses, 148-50
`Viakancic, Connor, 238-39
`VON CVoice on the Net), 67
`Voters Telecommunications Watch, 221
`
`W
`
`WAIS (Wide Area Information Service), 7,
`413-14
`Web browsers, 7
`Web contents value, judging, 188-89
`Web pageratings, 195-205
`active rating options, 197-98
`enforcementdifficulties, 203-5
`ethical angle of, 196-200
`implementation of, 199-200
`legal angle of, 201-5
`and netiquette, 200-201
`non-compliance penalties, 202-3
`RSACi (RSAC for the Internet), 199-200,
`202
`
`Webster Network Strategies, 403
`WebTrack, 400, 403-4
`Whinston,Andrew B., 62
`WindowsNTfirewalls, 411
`WinSock (WINdows SOCKets), 425-26, 430
`Wiretap Act, 125
`Workarounds, encryption/decryption, 260
`Working Group on Encryption and
`Telecommunications, 37
`Workplace, censorship in, 120-21
`Workplace policies, See Employee
`rules/internal policies
`World Intellectual Property Organi-
`zation, 39
`World Wide Web (WWW), See WWW
`Worm (November 1988), 6,29, 399
`www.eff.org, 41
`www.ggtech.com, 339, 356
`www.prenhall.com, 15
`wwwspa.org, 385
`WWW CWorld Wide Web), 6-8, 76-78
`Acceptable Use Policy, 356-57
`ad revenue, 22
`HTML, 7
`origin of, 7
`and TCP/IP, 7
`
`X
`
`"X-ON Congress: Indecent Comment on an
`Indecent Subject" (Russell), 224
`
`Y
`
`Yahoo, 111
`Your Rights at Work (McWhirter), 102-3, 280
`
`Panasonic-1017
`Page 16 of 18
`
`Panasonic-1017
`Page 16 of 18
`
`

`

`
`
`INTERNET
`
`Connection Without Comtvorersy
`
`ake no mistake. The Internet—newly discovered by
`politicians and lawyers—presents a minefield of risks and
`potentialliabilities. But you can't walk away from the
`profound competitive opportunities it offers. So what's your
`alternative?
`
`In Corporate Politics and the Internet, leading network consultant
`James Gaskin shows you exactly how to lead your company
`through today’s new jungle ofInternet-related legal, ethical
`and personnel decisions.
`Discover how to make sure you're well-positioned to handle
`the inevitable debates about your Internet presence. Learn
`how to successfully implement an Acceptable Use Policy that
`will significantly reduce yourrisks ofliability to discrimination,
`harassment and copyright infringement lawsuits.
`Whether you're a Webmaster, network administrator, IS
`professional, senior manager, marketer, or lawyer, you need
`to know how to protect your organization's interests in the
`revolutionary Internet environment. Everyone knows the
`Internet is hot: This book will keep you from getting burned!
`
`JAMESE. GASKINis a leading network consultant who has
`authored four popular books, most recently NetWareto Internet
`Gateways (Prentice Hall), and teaches a Networld+Interop
`tutorial on Internet connectivity.
`
`
`LEARN HOW THE
`
`
`INTERNET IS IMPACTING
`YOUR ORGANIZATION,
`AND WALK THROUGH THE
`HUMAN, LEGAL AND
`TECHNOLOGY ISSUES
`
`SURROUNDING
`QUESTIONS LIKE...
`
`
`
`
`
`
`
`
`Whenis your e-mail not
`private?
`
`How do you give people
`Webaccess... and still
`
`keep them productive?
`
`
`Whatcan you do to
`protect your own valuable
`
`content against theft?
`
`
`How can youlimit your
`company’s potential
`
`liabilities in cyberspace?
`
`
`How can you deal with
`your biggest Internet
`
`
`security problems—the
`
`
`ones that come from
`
`
`inside?
`
`
`
`PRENTICE HALL
`Upper Saddle River, NJ 07458
`
`U.S. $24.95
`Canada $34.95
`
`http://www.prenhall.com
`
`ISBN 0-13-b51403-6b
`
`Will5 |1
`Page 17 of 18
`
`|
`
`136°518037
`
`ll
`
`Panasonic-1017
`
`Panasonic-1017
`Page 17 of 18
`
`

`

`
`
`Panasonic-1017
`Page 18 of 18
`
`Panasonic-1017
`Page 18 of 18
`
`

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket