Search
Related Links

 

 

Informative Articles

12 Tips For Writing Winning E-mail
Learning to write more effective e-mail is a valuable skill when you are trying to build an online business. Here are a few tips to get you started. SUBJECT LINE Capitalize The First Letter of each word in your subject line NOT...

Blogging - A Critical Part of Your Web Business Strategy
Copyright 2005 Stephen Wright The methods by which we use to contact each other, especially in internet marketing activities continue to undergo dramatic transformation. In the not to distant past (only a couple of years ago!) we kept in...

Corporate Email Policies Lower Unnecessary Legal and Security Risks
What comes to your mind when you think about your email? Email makes possible almost instant communication with your co-workers without leaving your desk, a quick note to a family member who lives far away, but also has a very annoying...

The 5 biggest SEO Myths Debunked
Search Engine Optimization or SEO, has a bit of a reputation for having a lot of hype or scams associated with it. Why? Well, particularly because people want the results of what the service does, which is rank your website very high and in...

Traffic Scams & Warnings
Traffic Scams & Warnings borught to you by http://www.nerdlib.com/ What is a Traffic Scam? A traffic scam is designed to give a false sense that you can spend any amount of money and you will magically begin to get high quality traffic....

 
Corporate Email Policies Lower Unnecessary Legal and Security Risks

What comes to your mind when you think about your email? Email makes possible almost instant communication with your co-workers without leaving your desk, a quick note to a family member who lives far away, but also has a very annoying downside such as junk mail. Since the introduction of the Internet, email has been one of its primary uses. The fact that it is a fast, cheap and easy means of communication, makes email a great business tool. But there are also a series of threats for employers associated with email usage. Email threats such as confidentiality breaches, legal liability, lost productivity and damage to reputation cost organizations millions of dollars each year.

In the majority of cases, companies are held responsible for all the information transmitted on or from their systems. As a result, inappropriate emails can result in multi-million dollar penalties in addition to other costs. For example, a Federal Communications Commission (FCC) employee unintentionally sent a dirty joke entitled ‘Nuns in Heaven’ to 6,000 journalists and government officials on the agency's group email list. This employee's lapse in judgment and electronic mistake resulted in negative publicity and national embarrassment for the FCC. In the US, Chevron settled a case filed by four female employees for $2.2 million. The employees alleged that sexually harassing emails sent through the company’s email system caused a threatening work environment. One of the sexually offensive messages was a joke sheet titled ’25 reasons why beer is better than women’. A company can also be liable if one of its employees sends an email containing a virus.

Confidentiality breaches can be accidental, for instance when an employee selects a wrong contact name in the ‘To:’ field, or intentional, such as the case where an employee uses his corporate email account to send confidential information to one of the company’s competitors. In the latter case, both the employee and the recipient could be charged with trade secret theft. Nonetheless, whether it is by mistake or on purpose, the result of the loss of confidential data is the same.

Lost productivity due to inappropriate use of a firm’s email system is becoming a growing area of concern. A recent survey revealed that 86 per cent of workers used their company email to send and receive personal emails. Given that it has become very hard in our modern world to segregate people's personal lives outside of the workday, companies struggle to find effective ways of balancing employee freedoms and corporate protection. In addition to personal emails, unwanted spam messages are a significant time waster. Spam and personal abuse of email can also cause a corporation’s email system to waste valuable bandwidth resources. A Gartner Group study held under 13,000 email users found that 90 percent receive spam at least once a week, and almost 50 percent get spammed more than 6 times a week. Personal emails cause network congestion since they are not only unnecessary, but tend to be mailed to a large list of recipients and often include large attachments such as mp3, executable or video files that users do not zip. Adopting an anti-spam system alone has not proven effective to stop spam. The combination of spam- blockers with other methods of spam control technologies such as SIDF, SPF, Bayesian Filters, Blacklists, Whitelists, Anomaly Detection, and Spam Signatures has proven to be much more effective. There are also special organizations such as the AntiSPAMLeague.org that give Internet users the chance to report those individuals and companies that are responsible of spamming. You can become a member for free and learn how to control the spam problem by visiting their website at www.antispamleague.org. For more details on how to deal with spam, read the article ‘How Can I Stop It? - The Challenging Task of Controlling Spam’.

How can a company protect itself from these threats? The first step in securing your organization is to create an email usage policy. Every company needs to establish a policy regarding use of and access to company email systems, and then tell all employees what its policy is. After you have created your email policy you must make sure it is actually implemented. This can be done by providing regular trainings and by monitoring employees’ email using some type of email security software. The email policy should be made available and easily accessible to all employees and should be included in employee handbooks and company intranets. It is best to include the email policy, or a short statement regarding the policy, in employment contracts. In this way the employee must acknowledge in writing that he/she is aware of the email policy and of the obligation to adhere to it.

What are some of the benefits of having a clear and effective email policy? First, it helps prevent email threats, since it makes your staff aware of the corporate rules and guidelines. Second, it can help stop any misconduct at an early stage by asking employees to come forward as soon as they receive an offensive email. Keeping the incidents to a minimum can help avoid legal liability. For example, in the case of Morgan Stanley, a US investment bank that faced an employee court case, the court ruled that a single email communication - a racist joke, in this case - cannot create a hostile work environment and dismissed the case against them. Third, if an incident does occur, an email policy can minimize the corporation’s liability for the employee’s actions. Previous cases have proven that the existence of an email policy can prove that the company has taken steps to prevent inappropriate use of the email system and therefore can be freed of liability. Fourth, if you are going to use email filtering software to check the contents of your employee’s emails, you must have an email policy that states this clearly. Some employees may argue that by


monitoring their emails, companies are violating their privacy rights. However, court cases have shown that if the employer has warned the employee beforehand that their email might be monitored, the employer has a right to do so. People usually respond better when they know where they stand and what is expected of them.

The recent spike in the volume of spam traveling across the Internet, combined with the dangers of phishing and virus attacks that frequently accompany these messages, has forced corporations to reconsider how they determine which messages will be allowed into their network. For years, companies have addressed their email security needs through a mixture of third party software solutions designed to address specific areas of vulnerability. Today, however, this approach appears to be ineffective. New threats adapt to even the latest security technology, helping hackers and spammers stay a step ahead of most stand-alone protective measures. System administrators remain in a reactionary mode, waiting for the next attack and hoping their mixed bag of security software is up to the test.

The role of email in Sarbanes-Oxley compliance cannot be overstated. The Sarbanes-Oxley Act of 2002 and associated rules adopted by the Securities and Exchange Commission (SEC) require certain businesses to report on the effectiveness of their internal controls over financial reporting. Effective internal controls ensure information integrity by mandating the confidentiality, privacy, availability, controlled access, monitoring and reporting of corporate or customer financial information. Companies that must comply with Sarbanes-Oxley include U.S. public companies, foreign filers in U.S. markets and privately held companies with public debt. U.S. companies with market cap greater than $75M and on an accelerated (2004) filing deadline are required to comply for fiscal years ending on or after Nov. 15, 2004. All others are required to comply for fiscal years ending on or after April 15, 2005.

Because the bulk of information in most corporations is created, stored, transmitted and maintained electronically, IT departments are responsible for ensuring that sound practices, including corporate wide information security policies and enforced implementation of those policies, are in place for employees at all levels. Information security policies should govern the following items:

  • Network security

  • Access controls

  • Authentication

  • Encryption

  • Logging

  • Monitoring and alerting

  • Pre-planning coordinated incident response

  • Forensics

Most of us would agree that today email is the primary internal and external communication tool for corporations. Unfortunately, it is also one of the most exposed areas of a technology infrastructure. Email systems are critical to ensuring effective internal control over financial reporting, encryption of external messages and active policy enforcement, all essential elements of compliance. Companies must install a solution that actively enforces policy, stops offending mail both inbound and outbound and halts threats before internal controls are compromised, as opposed to passively noting violations as they occur. An effective email security solution must address all aspects of controlling access to electronically stored company financial information. Given the wide functionality of email, ensuring appropriate information access control for all of these points requires:

  • A capable policy enforcement mechanism to set rules in accordance with each company’s systems of internal controls;

  • Encryption capabilities to ensure privacy and confidentiality through secure and authenticated transport and delivery of email messages;

  • Secure remote access to enable remote access for authorized users while preventing access from unauthorized users;

  • Anti-spam and anti-phishing technology to prevent malicious code from entering a machine and to prevent private information from being provided to unauthorized parties.

On a final note, some clear guidelines for a good and effective email policy include the following points: a) Emails should comply with the proper RFC protocols for email, 2) Employees should not attempt to obscure content or messages in emails, 3) Companies should post privacy policies where they can be read and understood, prior to submission of a request, 4) Employees should not send email to unverified or nonexistent email addresses, 5) Companies should offer users opportunities to opt-out of programs.

Given that developments in email and the Internet are changing so rapidly, it is essential to review the email policy at least once every quarter. Keep an eye on new developments in email and Internet law so that you are aware of any new regulations and opportunities. When you release new updates, it is preferable to have each user sign as acknowledgment of their receipt of the policy.

With all of this said, if you want to reduce electronic risks in the workplace you must take the initiative. Electronic disasters can ruin businesses, sink careers, send stock prices plummeting, and generate public relations nightmares. Do not wait for a disaster to strike; prevention is always your best defense. Visit www.AntiSpamLeague.org and they will help you develop and implement written email usage and privacy policies that clearly reflect your organization's expected standards of electronic behavior, along with privacy and monitoring policies.

About The Author

The purpose of the Anti SPAM League is to help consumers and business owners reduce the amount of SPAM they receive. In addition, our Anti SPAM organization believes that educating site owners in the area of SPAM prevention and ways to successfully and responsibly market their sites, is key in making a difference.


mike@anti-spam-league.org



 

Mailwasher Anti Spam Software: The Reliable Free Spam Blocker
Reliable anti spam and spam blocker software, protect your computer from unwanted email spam. Control spam and stop viruses before you download them.
www.mailwasher.net
 
EarthLink® spamBlocker - For Windows Users
Anytime, anywhere, EarthLink connects people to the power and possibilities of the Internet. Connect to the Internet with High Speed, DSL, Cable, Satellite, ...
www.earthlink.net
 
FREE Spam Blocker and Email Filter Software to Stop Spam in ...
A plugin for Outlook that works for a POP3 account. Available for 2000/XP.
www.openfieldsoftware.com
 
Spam Blocker - the best spam blocking/filtering software
Spam Blocker - the best spam blocking/filtering software.
www.adscleaner.com
 
Microsoft Outlook SPAM Blocker -- filter spam and junk email with ...
Spam Blocker features VBA-enabled filtering technology that integrates tightly with Microsoft Outlook 2000/2002.
www.programmingmsaccess.com
 
SPAM BLOCKER COALITION – Join the anti-spam fight!
The SPAM BLOCKER COALITION is a new grass roots anti spam effort created to fight ... <a href="http://www.killersites.com/antiSpam.php">spam blocker - help ...
www.killersites.com
 
Free Spam Blocker Download - SpamButcher
SpamButcher's spam blocker filter will solve your spam problem. Its advanced spam filtering software can stop spam with up to 98% effectiveness.
www.spambutcher.com
 
Spam Filter Review 2007
Spam Filter Review - Top Spam Filter Software Reviewed.
spam-filter-review.toptenreviews.com
 
Cloudmark - Intelligent Messaging Security for Service Providers ...
A toolbar for Internet Explorer which blocks sites containing spyware, viruses and worms, and helps protect against identity theft and phishing.
www.cloudmark.com
 
spamgourmet - free disposable email addresses, spam blocker
spamgourmet provides spam protection using on-the-fly self-destructing disposable email addresses. Users can also set up rulesets for trusted or permitted ...
www.spamgourmet.com
 
Spam Filter for Outlook - Outlook Express and Servers - SPAMfighter
Block Spam - Spam Blocker - Anti Spam Software - Block Email Junk - Exchange anti spam - Enterprise Spam Filter - Email Server Spam Filter - Spam and virus ...
www.spamfighter.com
 
Free Spam Blocker Solutions
Free Spam Blocker Solutions: Polesoft Provides You the Safe Solutions: ... Lockspam Outlook is a safe and efficient Free Spam Blocker Solutions which is ...
www.polesoft.com
 
spamBlocker for Unified Threat Management | WatchGuard ...
spamBlocker for Unified Threat Management on WatchGuard Firebox appliances blocks incoming spam.
www.watchguard.com
 
Msn spamblocker software by MSN Content Plus and others
Msn spamblocker. latest reviews ... Reviews newsletter. Free Downloads Msn spamblocker. SpyLOG. catalogue. msn spamblocker at Free Downloads Center ...
www.freedownloadscenter.com
 
to Give an Answer » WordPress Trackback Spam Solution
Enter my new “Mod_Rewrite Trackback Spam Blocker” WordPress plugin (yes, I know, ... Mod Rewrite Trackback Spam Blocker - Gives a line of code to add […] ...
blog.mytechaid.com
 
Download free applications - WeOnlyDo! Software
Click to download SpamBlocker - Challenge-Response anti spam software ... SpamBlocker is a 'proof of concept' application that uses wodPop3 and wodSmtp ...
www.weonlydo.com
 
SpamBlocker free download Spam Blocker blocks unwanted messages on ...
Spam Blocker works with several mailboxes and allows configuring user setting for ... Spam Blocker blocks unwanted advertising messages on the mail server. ...
3d2f.com
 
Wired News: Spam Blocker Has Opposite Effect
Spam Blocker Has Opposite Effect. [Print story] · [E-mail story] [Rants + Raves]. Page 1 of 1. *. See Also. How and Why the Internet Broke ...
www.wired.com
 
Home - Spamfo
Organized collection of news, reviews and links about unsolicited bulk email (spam).
www.spamfo.co.uk
 
Open-source spam-blocker gets high marks at Cornell
Cornell University's management school is getting ready to deploy an open-source antispam tool that its CIO claims is 99% effective in blocking unwanted ...
www.computerworld.com
 
 

 

Content Menu
  • 10 facts about search engines

  • 10 key strategies for success in a home based business

  • 10 steps to joint venture setup and success

  • 10 tips for effective email sales letters

  • 10 ways to screw up your list

  • 12 tips for writing winning e mail

  • 30 seconds to a new customer

  • 3 keys to success with your affiliate program

  • 3 ways of search engines indexing flash websites

  • 5 keys to a successful internet home based business

  • 6 secrets to preventing email overload

  • 7 steps to managing your time better

  • adsense heresy revealing the lies youre fed every day and how you could be eating caviar instead

  • adsense sandbox

  • an affiliate program that did not work

  • are spam filters crippling ezines

  • are you losing sales because of your email link

  • are you making these email mistakes

  • are you submitting your articles

  • avoid search engine blacklisting

  • a common frustration when operating a home based business

  • a review of webposition gold v2 0 beta part 2

  • a simple guide to analyzing all those web traffic ideas part 3

  • a typical frustration in a home based business

  • a use for junk mail

  • a web traffic secret guaranteed to give you 16 807 visitors to your blog on a regular basis

  • bad seo and google penal

  • become an instant seo forum expert

  • blogging a critical part of your web business strategy

  • blogging spamming and blog spam

  • blogging you gotta do if for your business

  • blogpingopt insig fileezine

  • boost your ranking with search engine optimization

  • can a ping really help your blog get top search engine rankings

  • can one really get through those spam filters

  • can pinging really help your blog get top search engine rankings

  • computer viruses the new it arms race

  • corporate email policies lower unnecessary legal and security risks

  • cyber crooks go phishing

  • designing a website so the search engines will like you

  • designing your web site to maximize traffic

  • developing an effective email subject line

  • dispelling the myths will webposition get my site banned from google

  • does your web host affect search engine optimization

  • do what i tell you or your web site will never be found

  • do you know whos in your computer

  • email deliverability tips

  • email market without getting persecuted

  • emerging methods for effective search engine ranking

  • five solid reasons to publish your ezine in a blog

  • five ways to increase website traffic through online message boards and blogs

  • free advertising for ezine owners

  • frustration is typical when operating a home based business

  • future blended threats

  • getting your website noticed

  • get paid to read email tips tricks 9 simple steps

  • give me quality over quantity every time

  • go with quality over quantity and your business will prosper

  • home based businesses have their share of frustrations

  • how to avoid having filters eat your emails

  • how to do effective email marketing

  • how to fail faster then a speeding bullet

  • how to get celebrities to endorse your product

  • how to get indexed by search engines fast

  • how to reel in website visitors by building your own blog

  • how to respond after identity theft occurs

  • how to start an internet business meta tags and keyword density

  • how to use a tell a friend script to drive traffic today

  • how to use content to improve search engine placemtent

  • how to write your own profitable ebook

  • how you can avoid the new dangers of spam

  • if you build it will they come

  • ill take quality over quantity every time

  • importance of meta tags optimization

  • improve your emails deliverability

  • independent back linking network

  • index

  • ineffective and unethical web site promotion methods

  • internet freebies and cheapies to help you grow your business

  • internet marketing is dead

  • introduction to rss

  • is blogging necessary to your internet business

  • is permission email marketing in trouble and is rss the answer

  • is there a future for spam

  • is your website blacklisted

  • junk mail

  • keywords importance and uses

  • kyewords importance and uses

  • latest bytes on search engine marketing

  • learn simple strategies that will stop spammers from bombarding your inbox

  • link building in light of vision based page segmentation

  • message board and forum advertising

  • new insites into the fast search engine an interview with stephen baker of fast part 1

  • not knowing this explosive email secret can kill your mailing list

  • popup ads redesign them and explode your sales

  • pop up blockers before you decide to fight ads you better know what youre up against

  • promote your web store

  • promoting your website

  • proper opt in email marketing step by step

  • publishing e zines via rss

  • quality beats quantity every time

  • rotator

  • rss explained

  • rss is not only for blogs

  • rss the amazing profit potential

  • rss the intelligent marketing medium

  • search engine cloaking

  • search engine secrets get top listings on google yahoo

  • should bloggers be helping google fix their pagerank system

  • sick of wading through spam

  • speleotherapy and asthma allergy and other respiratory diseases

  • stop spam how to escape the spam hell hole

  • succees with a 1930s computer

  • that s not spam that s my newsletter

  • the 5 best revenue models in e commerce history

  • the 5 biggest seo myths debunked

  • the budget webmasters guide to increased credibility part one

  • the death of internet e mail

  • the importance of blogging rss to your home business

  • the new web accountability

  • the opt in secret

  • the power of viral marketing

  • the secret weapon of successful web marketing is

  • things ezine publishers wished their subscribers knew

  • tips for smb web site promotion and optimization

  • top 10 reasons why

  • top 10 reasons why rss autoresponders are becoming a permission email marketers best friend

  • traffic driven method using tell a friend script

  • traffic scams warnings

  • unleash a thundering non stop traffic stampede to your site practically overnight

  • unlocking the keys to your web site traffic web site promotion and search engine strategies

  • use email marketing wisely stand out from junk mail

  • using newsletters to jack up revenues

  • using paid autosurf programs to effectively advertise your website

  • using robots txt files to feed the spiderbots

  • want free targeted traffic craigslist can help

  • want publicity for your company forget traditional press releases heres what works now

  • want publicity for your company forget traditional press releases here s what works now

  • what is blogging

  • what you can publish via rss

  • why blogging is essential to your business

  • why every site needs rss

  • why this is the perfect time to start charging for website subscriptions

  • why your site needs fresh relevant content

  • write a newsletter to get site visitors to return and more

  • your business has an unlisted telephone number

  • your home biz store

  • youve got a new website but how do you get folks to look at it