`Whenis e-mail not private?
`TMC RACes eC SeeUC]
`TIMCOMUUSCISM OTT)TA)mICELATCL
`How doesthe Telecommunications Act of 1996 affect
`TERE URETEUeR OUIULLCR CsLe
`
`Panasonic-1017
`Page | of 18
`
`a
`
`a:
`
`ole
`
`oe’
`
`0LLL
`
` 4
`
`Panasonic-1017
`Page 1 of 18
`
`
`
`Co YO vate
`Politics and
`the Onternet
`
`James E. Gaskin
`
`To join a Prentice Hall PTR Internet
`mailing list, point to:
`
`http://www. prenhall.com/register
`
`Wi
`
`Prentice Hall PTR
`
`Upper Saddle River, NJ 07458
`
`Page 2 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 2 of 18
`
`
`
`
`
`
`
`
`
`
`
`
`!
`{
`
`|
`
`3
`
`Includes bibliographical references
`ISBN 0-13-65 1803-6
`2 Business enterprises-Communication systems
`1. Business-Computer network resources,
`4,
`Internet (Computer network)
`4, World Wide Web (information retrieval system)
`I. Title
`HD30.37.G37 1997
`658.4'038-de20
`
`96-46157CrP
`
`Editorial/production supervision: Raymond E Pajek
`Cover design: Anthony Genunellaro
`Coverillustration: Yom Post
`Manufacturing manager: Alexis R, Heydt
`Acquisitions editor: Mary Franz
`
`
`
`©1997 Prentice Hall PTR
`Prentice-Hall, Inc.
`A Simon & Schuster Company
`Upper Saddle River, New Jersey 07458
`
`The publisher offers discounts onthis book when ordered
`in bulk quantities. For more information, contact:
`
`Corporate Sales Department
`PTR Prentice Hall
`One Lake Street
`UpperSaddle River, NJ 07438
`
`Phone: 800-382-3419
`Fax: 201-236-7141
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`mel
`
`emma
`
`E-mail (Internet): corpsales@prenhall.com
`
`All rights reserved. Nopart of this book may be reproduced, in
`anyform or by any means, without permission in writing from
`the publisher.
`
`Printed in the United States ofAmerica
`109 8
`7
`6
`5 43 2
`«1
`
`ISBN 0-13-651803-6
`
`Prentice-Hall International (UK) Limited, Zovcon
`Prentice-Hall ofAustralia Pry. Limited, Sydney
`Prentice-Hall Canada Inc., Toronto
`Prentice-Hall Hispanoamericana, S.A., Mexico
`Prentice-Hall of India Private Limited, New! Delhi
`Prentice-Hall of Japan, Inc., Tokyo
`Simon & SchusterAsia Pte. Ltd., Singapore
`Editora Prentice-Hall do Brasil, Ltda., Rio de Janetro
`
`j
`
`Panasonic-1017
`Page 3 of 18
`
`
`
`Panasonic-1017
`Page 3 of 18
`
`
`
`Ns.
`
`Contents
`
`Acknowledgments
`
`xin
`
`Tntvoduction—xvil
`
`Who Needs This Book?
`
`xx
`
`Xxx
`Network Managers
`Network Department Executives XX
`Executives of Compantes Connected to the Internet xxi
`
`Chapter 1
`
`Past, Present, and Future
`
`1
`
`22
`
`The Primordial Internet
`
`2
`
`Computers, Commies, TCP/IP, and Unix
`The Worm and the Web
`6
`
`The Internet is Dead; Long Live the Internet
`Defining the Problem 8
`MegaNet and Internet Service Providers
`Where Do Commercial Services Fit?
`13
`
`LO
`
`8
`
`iil
`
`Page 4 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 4 of 18
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`More Internet Scrutiny = More Angry People
`Netiquette Fails
`18
`People Split
`19
`
`17
`
`20
`Long Live the New Internet
`21
`The Internet as Pop Culture Panacea
`Information SuperHighway Metaphors Stink 23
`
`Internet Mutations Ahead 25
`Wrap 27
`
`Chapter 29 The National Information
`Infrastructure 29
`
`Posturing With Technology 30
`NU Goals 33
`Promote Private Sector Investment 33
`Extend the Universal Service Concept 33
`Promote NewApplications and Technological Innovation 35
`Promote Seamless, Interactive, User-driven Operation
`of tbe NIT 36
`Ensure Information Security and Network Reliability 36
`Improve Management of the Radio Frequency Spectrum 38
`Protect Intellectual Property Rights 38
`Coordinate With Other Levels of Government and
`Other Nations 39
`Provide Access to Government Information and Improve
`Government Procurement 39
`The NII White Paper and Reactions
`
`40
`
`Intellectual Property Concerns Part
`Information Security Questions 47
`The NI as a Jobs Progra 49
`Wrap 50
`
`142
`
`Chapter 3
`
`Paying for our Snternet Addiction 51
`
`Paying for the New Internet
`How It Was 52
`Replacing Government Funding 54
`
`51
`
`
`
`
`
`
`
`
`
`
`iv Panasonic-1017
`
`Page 5 of 18
`
`Panasonic-1017
`Page 5 of 18
`
`
`
`Centralized Internet Measured Service Billing
`Taxes on Internet Access
`62
`Internet Phones will Cause Regulatory Hassles
`
`61
`
`64
`
`Buy Domain NamesToday, Buy What Tomorrow?
`Domain Name Hijinks
`69
`Advertising on the Ether
`70
`Wrap
`72
`
`67
`
`Chapter 4 The Jnternational Internet 75
`The World Part of the Wide Web 76
`We Don’t Need NoStinkin’ Borders
`Conspiracy Fun and Games
`79
`Governments Attempt to Control the Internet
`Wrap
`82
`
`S80
`
`76
`
`Chapter 5 Managing Internet Cx pectations 85
`
`rm
`
`2
`
`.
`
`1
`
`on 35
`
`36
`H 38
`
`ae
`
`Beware the Backlash 86
`Focus on the Business Advantages ofInternet Access 87
`Structure Internet Introduction to Department Needs
`8&8
`Training for Internet Access
`91
`Structured Training Methods 92
`Informal Training Methods 94
`Power Users to the Rescue 95
`
`Explaining Your Company's Acceptable Use Policy 96
`Management Must Support the Acceptable Use Policy 98
`No Winks and Nudges Allowed 98
`Wrap 99
`
`ddiction 51
`
`Chapter 6
`
`Employee Rules and Jnterna
`Politics 1071
`
`Management Expects Focus on Business
`At-Will Working Conditions
`102
`
`102
`
`Page 6 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 6 of 18
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`|
`
`}
`
`(eeepee
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`109
`Information is Power
`110
`Access Means Advantage
`Defusing a Haves vs. Have-Nots Struggle
`Fair Internet Access Principles
`113
`Handling Exceptions
`114
`
`112
`
`115
`
`Convincing Employees to Behave
`Log Everything
`117
`Handling Pornography and Hate Speech in the Workplace
`The Breakroom Rule
`121
`Spouting Inappropriate Statements As a Company Agent
`Wrap
`124
`
`120
`
`122
`
`Chapter 7
`
`Employee Monitoring and Control 125
`
`Employee Monitoring and Searching is Legal
`First Stop: the Mailroom 127
`Next Stop: the Telepbone
`128
`Last Stop: the Network
`129
`
`126
`
`131
`E-Mail is Not Private
`Employer Can Monitor E-Mail 132
`E-Mail Archives and the Courts
`134
`Wrap
`135
`
`Chapter 8
`
`Internal Computer Security 137
`
`Forget Hackers, Your Bigger Security Problem is Inside
`Lessons from Retail
`139
`
`137
`
`140
`What’s In Must Stay In
`Security Policy Must Be Understood 141
`Hackers are Getting Smarter and More Mercenary
`Password Parables
`143
`145
`Social Engineering and Security
`Desktop Servers Meanthe Death of Security
`
`147
`
`143
`
`
`
`4
`
`148
`Virus Safeguards
`More Internet Connection means More Virus Problems
`Wrap
`150
`
`149
`
`Panasonic-1017
`Page 7 of 18
`
`Panasonic-1017
`Page 7 of 18
`
`€
`
`
`Internet Culture no Longer Restrains Participants
`The Internet Becomes Unruly
`152
`Flame Wars, Crossposting, and Spamming
`Canter and Siegel 156
`Flames Grow into Defamation
`Public Figures and the Internet
`
`158
`161
`
`154
`
`152
`
`ace
`
`120
`
`nt
`
`122
`
`Control 125
`
`ry 137
`
`>
`
`«137
`
`149
`
`The "Politically Correct" Quagmire and the Internet
`You Say It, You Sign It
`163
`165
`User Naming Conventions
`Anonymous Remailers
`166
`Avoid Responding From Work
`
`168
`
`162
`
`168
`“Censorship” From All Angles
`Convictions Bordering on Fanaticism 168
`Can Netiquette Stop the Debate?
`170
`Dealing with The Right
`171
`Dealing with The Left
`172
`Supporting The Middle
`172
`
`173
`Your Newsgroup Policy
`175
`Why Read Newsgroups
`176
`Newsgroup Etiquette
`Flames with the Companyin the Sig 178
`Wrap
`180
`
`Chapter 10 Will Madison Avenue Determine
`Internet Content?
`183
`
`184
`Commercial Web Sites Explode
`Applying Marketing Ethics (Marketing Ethics?) to the Internet 186
`Judging Web Contents Value
`188
`Your Users and Advertising
`189
`
`Advertisements People Pay For
`Via E-mail
`191
`Via Newsgroups
`Wrap
`193
`
`192
`
`190
`
`vii
`
`Page 8 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 8 of 18
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`The Ethical Angle of Ratings
`Active Rating Options
`197
`199
`Who Implements the Ratings?
`Will Netiquette Carry the Day? 200
`
`196
`
`201
`The Legal Angle of Ratings
`What's the Penalty for Non-Compliance? 202
`Can the Authorities Keep Up? 203
`Wrap 205
`
`Chapter 12 19th Century Lawsvs. 21st Century
`Technology
`207
`
`Cyberporn, Intersmut, and Hate Speech
`What's Legal On Paper 211
`What's Legal on the Internet 213
`
`210
`
`214
`
`The Telecommunications Reform Act of 1996
`Cable TV 216
`InterSmut and CyberPorn 216
`Universal Service and Video Dial Tone 216
`Media Ownership 217
`Long Distance and Local Telephone Service 217
`Broadcast Spectrum 218
`The V-Chip 218
`Clean Monopolies No More 219
`
`221
`Communications Decency Act
`What the Communications Decency Act Includes 222
`Ongoing Legal Challenges 223
`Applying Existing Obscenity Lawsto the Internet 225
`Which Community is the ‘Standard’ Community? 227
`How Liable Are ISPs and Connected Companies? 228
`Enforcement Problems Abound 230
`The Court Decision 233
`
`234
`Politics from the Politicians
`Will Washington Ruin the Internet? 234
`Pending Laws on Pornography, Free Speech, and Copyright 236
`
`Panasonic-1017
`Page 9 of 18
`
`Panasonic-1017
`Page 9 of 18
`
`
`
`Chapter 13 Does Intellectual Property Protect
`Anything in Cyberspace?
`241
`
`243
`
`Patents, Trademarks, and Copyrights
`Patents 244
`Trademarks 245
`Copyrights 246
`NII White Paper Attempts New Law 248
`“Tangible Medium OfExpression” 249
`Your Rights From the First Sale Doctrine 252
`Fair Use—the Blurry Line 254
`The Far Side of the Blurry Line 257
`Copyright Rules of the Future? 258
`International Considerations 261
`
`262
`Domain Names are Now Valuable
`The Domain Name Land Rush 264
`Copyright and Trademark Tests Enforced 266
`
`Finding Experts in Cyberlaw 272
`Wrap 274
`
`Chapter 14 Avoiding Discrimination Lawsutts
`
`277
`
`Preventing Hostile Workplace Hassles
`Sexual Harassment Conditions 280
`
`278
`
`Title VII and "Reasonable" People
`282
`Company Protection Against Unreasonable People 283
`Wrap 286
`
`Chapter 15 Politics For Onternet Sewice
`Providers
`289
`
`Ist Centu "y
`
`2
`
`;
`7
`§
`
`yright 236
`
`Are ISPs Responsible for Every Copyright Flowing Across their
`Network?
`291
`
`Page 10 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 10 of 18
`
`
`
`What Model do we Use for Regulation? 299
`Broadcaster 300
`Press 302
`Republisher 303
`Public Forum 304
`Physical Bulletin Board 305
`Mail 306
`CommonCarrier 307
`Implied License 309
`Action After Awareness 312
`Is E-mail Filtering Next? 313
`Should ISPs Lobby In Self-Defense? How? 314
`
`Will Bill Gates, Robert Kavner, or Lou Gerstner Ever be Arrested?
`Unmasking the Cowards 317
`Wrap 319
`
`315
`
`Chapter 16 Politics for Content Providers
`
`321
`
`Intellectual Property and the Content Provider
`Web Implied License for Viewers 323
`Protecting Your Web Contents 324
`Learning From Other Web Sites 327
`Get Permission for All Pieces of Your Web 329
`Publish With Perplexed Permissions: A Tale of Copyright and the Web 329
`Contractors and Your Web Copyright 331
`
`322
`
`Obscenity and the Content Provider
`You KnowIt When You See It 333
`Wrap 334
`
`332
`
`‘
`4
`
`a
`
`“4
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Chapter 17 Defining Your Acceptable Use
`Policy
`337
`
`Current State of Corporate Acceptable Use Policy Implementation 338
`
`|
`
`341
`Reasonable Acceptable Use Policy Guidelines
`Legal Ramifications of Your Acceptable Use Policy 343
`Acceptable Use Policies and Employee Termination 345
`
`Panasonic-1017
`Page 11 of 18
`
`Panasonic-1017
`Page 11 of 18
`
`
`
`349
`
`Writing Your Acceptable Use Policy
`Scope and Overview 351
`E-mail 352
`World Wide Web 356
`Newsgroups 357
`Internet Relay Chat Channels and Multi-User Domains 359
`Your Actions are Monitored 360
`Consequences ofMisuse 362
`Your Signature, Please 366
`
`367
`
`Acceptable Use Policy Examples
`Internet User Companies 368
`Privacy 370
`Sexual Harassment and Discrimination 371
`Trade Secrets and Confidentiality 371
`Employee Productivity 372
`Other Human Resource Issues 373
`Internet Service Providers 373
`Internet America Acceptable Use Policy: 374
`Appropriate Use Policy for OnRamp Technologies, Inc.
`Acceptable Usage of PPP Accounts 376
`Inactivity and Disconnect Inactivity Policy 377
`Usenet Policy and Acceptable Posting Procedures 378
`Customer Responsibility and Cooperation 380
`Acceptable Use Of Onramp Web Servers and Restrictions 381
`Notesfrom Other ISPs 382
`
`375
`
`383
`
`Other Company Policies
`Security Policy 384
`Software Protection Guidelines 385
`Sample Corporate Policy Statement 386
`Wrap 387
`
`Chapter 18 Overview of Control Options
`The Acceptable Use Policy Committee
`390
`Choosing Committee Members 390
`The First Meeting Demonstration 395
`The Acceptable Use Policy Committee’s Mandate 396
`Who Disciplines Policy Violators? 398
`
`389
`
`xi
`
`ye Arrested?
`
`315
`
`le rs 32
`
`ght and the Web 329
`
`Use
`
`lementation 338
`
`43
`45
`
`Page 12 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 12 of 18
`
`
`
`Proxy Servers 401
`PC LAN to Internet Gateways
`WebTrack
`403
`Children’s Protective Software will Become Corporate 404
`
`402
`
`MixedSystems will Be Common
`Wrap 406
`
`405
`
`Chapter 19 Using Firewalls and Proxy Servers to
`Control Your Network
`409
`
`Keeping Outsiders Out
`Keeping Insiders In
`
`410
`412
`
`Blocking Access to Internet Web Sites
`Blocking Access To Newsgroups 415
`Blocking Access By Time
`416
`
`413
`
`Logging Internet Activity
`Wrap
`419
`References 419
`
`417
`
`Chapter 20 Using Internet Gateways to Control
`Your Network
`421
`
`423
`Keeping Outsiders Out
`Keeping Insiders In 425
`
`Blocking Access to Internet Web Sites
`Blocking Access to Newsgroups 428
`Blocking Access by Time
`430
`
`427
`
`Logging Internet Activity
`Wrap
`431
`
`430
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Glossary 433 Index 441
`
`
`
`Panasonic-1017
`Page 13 of 18
`
`Panasonic-1017
`Page 13 of 18
`
`
`
`Each employee should sign the Acceptable Use Policy before they ar.
`allowed on the Internetif at all possible. Not only does this make the coripardtt
`legal stance stronger, it avoids arguing with employees who have had fied a
`© run
`of the Internet prior to the Acceptable Use Policy development. Confront;
`tions
`are fine things to avoid, thank you.
`If you provide Internet training, then the tenets of your Acceptable Use
`Policy should be a part of that training. If you don’t provide training (shame on
`you), then make each employee sign the Acceptable Use Policy before installing
`their Internet access software. Keep copies of the policy available for eve ryone,
`and remind people of the rules on a regular basis. Employee newsletters are
`good reminder options, but not enough. If you have an easy wayto place “Word
`of the Day” on computer screens when users log into the system, put the out.
`line of your Acceptable Use Policy there every month as a reminder.Thisis espe-
`cially helpful in large companies that don’t have employees sign a physical copy
`of their Acceptable Use Policy.
`Noneof this is necessary in the wonderful world of American business,
`however, because each employee reads everything they sign and conscien-
`tiously follows company rules. Now that we’ve broken the tension with a good
`laugh,let’s continue.
`One policy I saw from the California Department of Education requires
`eight initialed sections, the student signature, the parent’s signature, and two
`teacher signatures. Putting students and the Internet together can be a prob-
`lem, as we saw earlier, so the more signatures the merrier. These sections
`neededinitials:
`
`¢ Personal responsibility
`
`* Acceptable use
`
`¢ The privilege of using the system
`
`* Network etiquette and privacy
`* Services (the school is not responsible for data loss or system delay, etc.)
`
`e Security
`
`¢ Vandalism (they’re against it)
`
`
`366
`
`¢ Updating (changesto registration information)
`
`Page 14 of 18
`
`Panasonic-1017
`
`Panasonic-1017
`Page 14 of 18
`
`
`
`before they are
`ce the company’s
`ave had free run
`t. Confrontations
`
`‘ Acceptable Use
`1ining (shame on
`before installing
`ble for everyone,
`> newsletters are
`iy to place “Word
`tem, put the out-
`nder.This is espe-
`na physical copy
`
`nerican business,
`mn and conscien-
`ision with a good
`
`jucation requires
`gnature, and two
`+r can be a prob-
`1. These sections
`
`revised without requiring another marathon signing session, which makeslife
`easier for the network administrators.
`Must your employees sign a dozen times to get Internet access? Probably
`not, but it won’t hurt to ask them to initial something if your managementfeels
`strongly enough about that topic. Good candidates for initialing would be the
`restriction on pornographic images in any form, copyright infringement, copy-
`ing Company software out to another system on the Internet, and protecting
`trade secrets.
`Remember: no signed Acceptable Use Policy onfile Gif your company uses
`signed forms), no Internet access. Tying the last section to this one, how will
`you handle a user who allows an unauthorized employeeInternet access bylet-
`ting them share the PC? Whogets punished? How severely? Should you add that
`to the list of signed items?
`
`Acceptable Use Policy Examples
`
`If you're clever, you’ve already searched the Internet with keywords
`“Acceptable Use Policy” to see what you can find. If you’re devious, you looked
`at this book in the store, then went hometo try the search before coming back
`to buy the book.If you had just bought the bookthefirst time, you would have
`saved yourself a trip.
`After searching the Internet, you werelikely surprised to find that the only
`Acceptable Use Policies you could find were from high schools, universities, or
`Internet Service Providers. Whyis that?
`Because companies don’t put their Acceptable Use Policies on display,
`that’s why.There are two reasonsfor this:
`
`* Policies cost moneyin the form of lawyer’s fees, and management
`doesn’t want to give away expensive documents
`
`system delay, etc.)
`
`* Policies reveal internal information companies may not wish to broad-
`cast to the world
`
`This makes it difficult to copy someoneelse’s policy and replace their
`name with yours, doesn’t it? Yes, people would do that, in spite of the copyright
`
`
`
`367
`
`
`
`Panasonic-1017
`Page 15 of 18
`
`Panasonic-1017
`Page 15 of 18
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Universal Service, 216-17
`Universal Service Working Group, 34
`Unix, 45,7,91, 147
`and AT&T, 5
`BSD Gerkeley Software Distribution)
`Unix, 5
`URL (Uniform Resource Locator), 15
`U.S.Advisory Council for the National
`Information Infrastructure (NID, 31
`Usenet newsgroups, See Newsgroups, 173
`User naming conventions, 165-66
`UUENCODE/UUDEDODE, 231-32
`UUNET Technologies, Inc., 11, 12
`
`V
`
`V-Chip, 218-19
`Video Dial Tone, 216-17
`Violators, ofAcceptable Use Policy,
`discipline of, 398-99
`Viruses, 148-50
`Viakancic, Connor, 238-39
`VON CVoice on the Net), 67
`Voters Telecommunications Watch, 221
`
`W
`
`WAIS (Wide Area Information Service), 7,
`413-14
`Web browsers, 7
`Web contents value, judging, 188-89
`Web pageratings, 195-205
`active rating options, 197-98
`enforcementdifficulties, 203-5
`ethical angle of, 196-200
`implementation of, 199-200
`legal angle of, 201-5
`and netiquette, 200-201
`non-compliance penalties, 202-3
`RSACi (RSAC for the Internet), 199-200,
`202
`
`Webster Network Strategies, 403
`WebTrack, 400, 403-4
`Whinston,Andrew B., 62
`WindowsNTfirewalls, 411
`WinSock (WINdows SOCKets), 425-26, 430
`Wiretap Act, 125
`Workarounds, encryption/decryption, 260
`Working Group on Encryption and
`Telecommunications, 37
`Workplace, censorship in, 120-21
`Workplace policies, See Employee
`rules/internal policies
`World Intellectual Property Organi-
`zation, 39
`World Wide Web (WWW), See WWW
`Worm (November 1988), 6,29, 399
`www.eff.org, 41
`www.ggtech.com, 339, 356
`www.prenhall.com, 15
`wwwspa.org, 385
`WWW CWorld Wide Web), 6-8, 76-78
`Acceptable Use Policy, 356-57
`ad revenue, 22
`HTML, 7
`origin of, 7
`and TCP/IP, 7
`
`X
`
`"X-ON Congress: Indecent Comment on an
`Indecent Subject" (Russell), 224
`
`Y
`
`Yahoo, 111
`Your Rights at Work (McWhirter), 102-3, 280
`
`Panasonic-1017
`Page 16 of 18
`
`Panasonic-1017
`Page 16 of 18
`
`
`
`
`
`INTERNET
`
`Connection Without Comtvorersy
`
`ake no mistake. The Internet—newly discovered by
`politicians and lawyers—presents a minefield of risks and
`potentialliabilities. But you can't walk away from the
`profound competitive opportunities it offers. So what's your
`alternative?
`
`In Corporate Politics and the Internet, leading network consultant
`James Gaskin shows you exactly how to lead your company
`through today’s new jungle ofInternet-related legal, ethical
`and personnel decisions.
`Discover how to make sure you're well-positioned to handle
`the inevitable debates about your Internet presence. Learn
`how to successfully implement an Acceptable Use Policy that
`will significantly reduce yourrisks ofliability to discrimination,
`harassment and copyright infringement lawsuits.
`Whether you're a Webmaster, network administrator, IS
`professional, senior manager, marketer, or lawyer, you need
`to know how to protect your organization's interests in the
`revolutionary Internet environment. Everyone knows the
`Internet is hot: This book will keep you from getting burned!
`
`JAMESE. GASKINis a leading network consultant who has
`authored four popular books, most recently NetWareto Internet
`Gateways (Prentice Hall), and teaches a Networld+Interop
`tutorial on Internet connectivity.
`
`
`LEARN HOW THE
`
`
`INTERNET IS IMPACTING
`YOUR ORGANIZATION,
`AND WALK THROUGH THE
`HUMAN, LEGAL AND
`TECHNOLOGY ISSUES
`
`SURROUNDING
`QUESTIONS LIKE...
`
`
`
`
`
`
`
`
`Whenis your e-mail not
`private?
`
`How do you give people
`Webaccess... and still
`
`keep them productive?
`
`
`Whatcan you do to
`protect your own valuable
`
`content against theft?
`
`
`How can youlimit your
`company’s potential
`
`liabilities in cyberspace?
`
`
`How can you deal with
`your biggest Internet
`
`
`security problems—the
`
`
`ones that come from
`
`
`inside?
`
`
`
`PRENTICE HALL
`Upper Saddle River, NJ 07458
`
`U.S. $24.95
`Canada $34.95
`
`http://www.prenhall.com
`
`ISBN 0-13-b51403-6b
`
`Will5 |1
`Page 17 of 18
`
`|
`
`136°518037
`
`ll
`
`Panasonic-1017
`
`Panasonic-1017
`Page 17 of 18
`
`
`
`
`
`Panasonic-1017
`Page 18 of 18
`
`Panasonic-1017
`Page 18 of 18
`
`