Académique Documents
Professionnel Documents
Culture Documents
7-1
7-4
7-5
7-6
7-7
7-8
Privacy of Employees
Email
Consider that most email messages are not private 1986 Electronic Communications Privacy Act: employers can consider email messages as corporate property www.enronemail.com 515,000 emails have become public documents Many users are inexperienced or lack understanding Vague or nonexistent policies exist
7-10
Costs
Offensive communications Frivolous use Information overload
7-11
7-13
Telephone Monitoring
1986 Electronic Communications Privacy Act allows monitoring of business related phone calls If the phone call is personal in nature, the monitoring must cease, but if told that personal calls are prohibited, the calls can be monitored Cell phones create even further issues
Copyright 2009 Pearson Education, Inc. publishing as Prentice Hall 7-14
Privacy of Customers
Companies employ technology that allows them to make inferences about customers that many may not even know the company is making Companies use business intelligence systems: monitor what kinds of products are ordered, how much is being spent and how often the customer makes purchases
Copyright 2009 Pearson Education, Inc. publishing as Prentice Hall 7-15
7-16
7-18
Phishing
Use of email to try to mimic a legal, legitimate company to fish for personal or financial information from individuals May even contain computer viruses in the emails Could be committing: identity theft, wire fraud, credit card fraud, bank fraud, computer fraud
Copyright 2009 Pearson Education, Inc. publishing as Prentice Hall 7-19
Internet Attacks
Cyber terrorism: the use of computer technology to commit terrorism crimes Vulnerable industries: defense contractors, medical and health care companies, pharmaceutical companies, financial institutions Spyware: software that can be loaded onto a computer so the computer operations can be monitored by an outside party without the consent of the computer user
Copyright 2009 Pearson Education, Inc. publishing as Prentice Hall 7-22
Provides expanded government authority over electronic communications and the use of compute and monetary transactions Designed to monitor the activities of financial institutions broadly defined
Copyright 2009 Pearson Education, Inc. publishing as Prentice Hall 7-23