Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.

Slides:



Advertisements
Similar presentations
Rockingham County Public Schools Technology Acceptable Use Policy
Advertisements

Woodland Hills School District Computer Network Acceptable Use Policy.
HIPAA Implementation. Basic HIPAA Requirements Designating a Privacy Officer Notifying patients about their privacy rights and how their information can.
CREATED BY: HMIS Security Awareness Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013.
Uintah School District Acceptable Use for Computer and Network Access.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Business Plug-In B7 Ethics.
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
INTERNET and CODE OF CONDUCT
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
CPS Acceptable Use Policy Day 2 – Technology Session.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
HIPAA PRIVACY AND SECURITY AWARENESS.
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Employee Guidelines for Acceptable Use of Technology Resources.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.
00870B2F.0/Internet%20Safety.jpg.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
Barren County Schools Student Technology Acceptable Use Policy (AUP)
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Security in ERP Systems By Jason Rhodewalt & Marcel Gibson.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Monitoring.
Chapter 2 Securing Network Server and User Workstations.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
INTERNET SAFETY.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Woodland Hills School District Computer Network Acceptable Use Policy.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
ACCEPTABLE USE POLICY: INFORMATION TECHNOLOGY RESOURCES IN THE SCHOOLS The school's information technology resources, including and Internet access,
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Dial-in Access Policy By Matt Lynott. Reasoning The reason for this policy is to define appropriate dial-in access and its use by authorized personnel.
HR SECURITY  EGBERT PESHA  ALLOCIOUS RUZIWA  AUTHER MAKUVAZA  SAKARIA IINOLOMBO
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Alexander County Schools Review of Board of Education Policies Technology Responsible Use 3225/4312/7320 Internet Safety 3226/4205 Technology In The Educational.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
HIPAA Training Workshop #3 Individual Rights Kaye L. Rankin Rankin Healthcare Consultants, Inc.
Properly Safeguarding Personally Identifiable Information (PII) Ticket Program Manager (TPM) Social Security’s Ticket to Work Program.
The Acceptable Use of Technology
Indiana Access to Public Records Act (APRA) Training
Student Privacy in an Ever-Changing Digital World
HIPAA Privacy & Security
Privacy & Confidentiality
Internet Safety and Acceptable Use Policies.
Current Privacy Issues That May Affect Your Credit Union
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
Employee Privacy and Privacy of Employee Information
A+ A+ CORPORATION PRESENTS: INFORMATION TECHNOLOGY DEPARTMENT
Confidentiality of Information Acknowledgment and Agreement 2018
Health Insurance Portability and Accountability Act
HIPAA Privacy & Security
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Good Spirit School Division
Data Security Awareness
Student User Agreement and Policy 2022
COMPUTER USE AGREEMENTS
Move this to online module slides 11-56
Students will not engage in any illegal activity including copyright infringement, vandalism, or harassment on the computer.
Woodland Hills School District
Protecting Student Data
This presentation document has been prepared by Vault Intelligence Limited (“Vault") and is intended for off line demonstration, presentation and educational.
Provider Maintenance—Accreditation Module
Presentation transcript:

Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton

How do You Communicate? You Voice Mail Text E- Mail IMTweet

Issue: If an employee uses his employer’s corporate IT resources to prepare or send/receive a personal ( i.e., non-work related) communication, does that destroy whatever privilege might otherwise attach to the communication?

What Type of Communication?  Communications Made Via the Company Account  Communications Made Via a Password-Protected, Web-Based  Documents Saved Locally on a Company-Issued Computer

ABC Company Privacy Notice: All employees and other authorized users of computer resources should be aware of ABC’s policies for appropriate use of computing resources. Follow these links to view the IT Acceptable Use Policy and the IT Security Policy. In order to protect the privacy and confidentiality of corporate information assets, ABC has implemented an Internet Monitoring System to identify inappropriate and unauthorized use of ABC computer resources. The System monitors the content of all inbound and outbound Internet traffic and external usage. Questionable activity will be logged and tracked for resolution by ABC management. All information transmitted or stored by the system (including and files) may be subject to public disclosure. By accepting the Accept button below, you acknowledge your understanding and acceptance of ABC’s policies. Otherwise, select Decline to log off this system immediately.

XYZ COMPANY IAUP 1. XYZ Company recognizes the business need for some, if not all of its employees to have access to the Internet while on the job, using company computers. As such, XYZ has made the business decision to make the Internet available to employees for XYZ business purposes. 2. XYZ intends for the Internet to be accessed for business purposes and expects that employees will spend no more than 5 minutes per day accessing the Internet for non- business purposes. 3. The company reserves the right to use monitoring software to make sure the company’s IAUP is being adhered to by its employees. The company may record and/or monitor one or more employees’ computer and Internet activity for any reason and without any specific notice. 4. By clicking “Agree” below, you agree that: a. You have had the opportunity to review this agreement and ask any questions regarding this document. b. You will adhere to the company’s IAUP. c. You will be subject to disciplinary measures, including possible termination, if you violate the IAUP.

Asia Global Factors 1. Does the corporation maintain a policy banning personal or other objectionable use; 2. Does the company monitor the use of the employee’s computer or ; 3. Do third parties have a right of access to the computer or s; and 4. Did the corporation notify the employee, or was the employee aware, of the use and monitoring policies?

Ripped from the Headlines: Personal accounts may allow you to maintain a privilege. Do not confuse privilege with privacy.