|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_ocm42328398 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
980602s1999 nyu o 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e pn
|c N$T
|d OCL
|d OCLCQ
|d MUQ
|d OCLCQ
|d YDXCP
|d OCLCQ
|d TUU
|d OCLCQ
|d TNF
|d OCLCQ
|d OCLCF
|d P4I
|d NLGGC
|d OCLCO
|d OCLCQ
|d NAM
|d OCLCQ
|d SCL
|d OCLCQ
|d AGLDB
|d C@V
|d VGM
|d OCLCQ
|d SAV
|d OCLCA
|d LUE
|d WRM
|d VNS
|d INARC
|d VTS
|d CEF
|d OCLCQ
|d TOF
|d WYU
|d BRX
|d YOU
|d TKN
|d STF
|d M8D
|d JX9
|d OCLCQ
|d NJT
|d UKSSU
|d IBQ
|d LDP
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 45816765
|a 649234321
|a 760289250
|a 961577665
|a 962704825
|a 1038651118
|a 1077831463
|a 1154952475
|a 1156850771
|a 1162404306
|a 1241940735
|
020 |
|
|
|a 0585000484
|q (electronic bk.)
|
020 |
|
|
|a 9780585000480
|q (electronic bk.)
|
020 |
|
|
|z 0814479960
|
029 |
1 |
|
|a AU@
|b 000023264762
|
029 |
1 |
|
|a AU@
|b 000051545142
|
029 |
1 |
|
|a DEBBG
|b BV043081334
|
029 |
1 |
|
|a DEBSZ
|b 422613835
|
029 |
1 |
|
|a GBVCP
|b 80048990X
|
035 |
|
|
|a (OCoLC)42328398
|z (OCoLC)45816765
|z (OCoLC)649234321
|z (OCoLC)760289250
|z (OCoLC)961577665
|z (OCoLC)962704825
|z (OCoLC)1038651118
|z (OCoLC)1077831463
|z (OCoLC)1154952475
|z (OCoLC)1156850771
|z (OCoLC)1162404306
|z (OCoLC)1241940735
|
050 |
|
4 |
|a HD30.38
|b .O94 1999eb
|
072 |
|
7 |
|a BUS
|x 097000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 104000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 071000
|2 bisacsh
|
072 |
|
7 |
|a BUS
|x 103000
|2 bisacsh
|
082 |
0 |
4 |
|a 658.4/78
|2 21
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Overly, Michael R.
|
245 |
1 |
0 |
|a E-policy :
|b how to develop computer, E-policy, and Internet guidelines to protect your company and its assets /
|c Michael R. Overly.
|
260 |
|
|
|a New York :
|b AMACOM,
|c ©1999.
|
300 |
|
|
|a 1 online resource (x, 146 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes indexes.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a pt. I. Getting Your Feet Wet -- Ch. 1. E-mail: The Prime Mover -- pt. II. Potential Claims by Employees -- Ch. 2. Employee Privacy Rights: To Peek or Not to Peek, That is the Question -- Ch. 3. Labor Organization Activities: When Can Employees Use Corporate Computers for Labor-Related Activities? -- Ch. 4. Discrimination and Harassment: Avoiding a Hostile Work Environment -- pt. III. Potential Claims by Third Persons -- Ch. 5. Copyright: Think Before You Cut and Paste -- Ch. 6. Defamation: Can I Say That? -- Ch. 7. Spamming: Too Much of a Good Thing -- pt. IV. Protecting Corporate Information and Resources -- Ch. 8. Trade Secrets and Other Confidential Information: Protecting Your Business's Most Valuable Assets -- Ch. 9. Attorney-Client Communications Using E-mail: Are They Protected? -- Ch. 10. Computer Security -- Ch. 11. Preventing Waste of Computer Resources -- pt. V. Putting It All Together: Constructing An E-Mail and Computer Use Policy -- Ch. 12. Six Essentials for Every Good Policy -- Ch. 13. Ensuring Employee Compliance with Policies: Education, Education, Education ... -- App. A. Example Policies -- App. B. Selected Laws and Regulations.
|
546 |
|
|
|a English.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Business enterprises
|x Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Electronic mail systems
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Entreprises
|x Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Courrier électronique
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Workplace Culture.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Corporate Governance.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Leadership.
|2 bisacsh
|
650 |
|
7 |
|a BUSINESS & ECONOMICS
|x Organizational Development.
|2 bisacsh
|
650 |
|
7 |
|a Business enterprises
|x Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Electronic mail systems
|x Security measures
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Overly, Michael R.
|t E-policy.
|d New York : AMACOM, ©1999
|z 0814479960
|w (DLC) 98026077
|w (OCoLC)39269566
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1902
|z Texto completo
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1902
|
938 |
|
|
|a Internet Archive
|b INAR
|n epolicyhowtodeve0000over_u4n4
|
938 |
|
|
|a Internet Archive
|b INAR
|n epolicyhowtodeve0000over
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 2302034
|
994 |
|
|
|a 92
|b IZTAP
|