Chapter 4: Information Management Policies Flashcards
What are the six e-policies?
1) Ethical Computer Use Policy
2) Information Privacy Policy
3) Acceptable Use Policy
4) Email Privacy Policy
5) Social Media Policy
6) Workplace Monitoring Policy
1) Ethical Computer Use Policy
Contains general principles to guide computer user behaviour.
Competitive Click Fraud
A computer crime in which a competitor increases a company’s search advertising costs by repeatedly clicking the advertiser’s link.
Bring Your Own Device (BYOD) Policy
Policy that allows employees to use their personal mobile devices and computers to access enterprise data and applications.
2) Information Privacy Policy
Contains general principles regarding information privacy.
Fair Information Practices
General term for a set of standards governing the collection and use of personal data and addressing issues of privacy and accuracy.
3) Acceptable Use Policy for email and internet use
Includes the following:
- Not using the service as part of violating the law
- Not attempting to break the security of any computer network or user
- Not posting commercial messages to groups without prior permission
- Not performing any non-repudiation (denial of online actions)
4) Email Privacy Policy
Details the extent to which email messages may be read by others
Mail Bomb
Sends a massive amount of email to a specific person or system that can cause the user’s server to stop functioning.
Teergrubing
An anti-spamming approach by which the receiving computer launches a return attack against the spammer, sending email messages back to the computer that originated the suspected spam.
5) Social Media Policy
Outlines the corporate guidelines or principles governing employee online communications.
6) Workplace Monitoring Policy
States explicitly how, when, and where the company monitors its employees.