effect of corporate it policies on otherwise privileged communication

9
Effect of Corporate IT Effect of Corporate IT Policies on Otherwise Policies on Otherwise Privileged Communication Privileged Communication By: Jonathan T. Barton

Upload: lynley

Post on 12-Feb-2016

42 views

Category:

Documents


0 download

DESCRIPTION

Effect of Corporate IT Policies on Otherwise Privileged Communication. By: Jonathan T. Barton. Personal. Corporate. How do You Communicate?. - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Effect of Corporate IT Policies on Otherwise Privileged Communication

Effect of Corporate IT Policies Effect of Corporate IT Policies on Otherwise Privileged on Otherwise Privileged

CommunicationCommunicationBy: Jonathan T.

Barton

Page 2: Effect of Corporate IT Policies on Otherwise Privileged Communication

How do You Communicate?How do You Communicate?

Page 3: Effect of Corporate IT Policies on Otherwise Privileged Communication

Issue:Issue:

If an employee uses his employer’s corporate IT resources to prepare or send/receive a personal (i.e., non-work related) communication, does that destroy whatever privilege might otherwise attach to the communication?

Page 4: Effect of Corporate IT Policies on Otherwise Privileged Communication
Page 5: Effect of Corporate IT Policies on Otherwise Privileged Communication

What Type of Communication?What Type of Communication?

Communications Made Via the Company E-mail Account

Communications Made Via a Password-Protected, Web-Based E-mail

Documents Saved Locally on a Company-Issued Computer

Page 6: Effect of Corporate IT Policies on Otherwise Privileged Communication

ABC Company Privacy Notice:ABC Company Privacy Notice:All employees and other authorized users of computer resources should be All employees and other authorized users of computer resources should be aware of ABC’s policies for appropriate use of computing resources. Follow aware of ABC’s policies for appropriate use of computing resources. Follow these links to view the these links to view the IT Acceptable Use PolicyIT Acceptable Use Policy and the and the IT Security PolicyIT Security Policy..

In order to protect the privacy and confidentiality of corporate information In order to protect the privacy and confidentiality of corporate information assets, ABC has implemented an Internet Monitoring System to identify assets, ABC has implemented an Internet Monitoring System to identify inappropriate and unauthorized use of ABC computer resources. The inappropriate and unauthorized use of ABC computer resources. The System monitors the content of all inbound and outbound Internet traffic System monitors the content of all inbound and outbound Internet traffic and external e-mail usage. Questionable activity will be logged and and external e-mail usage. Questionable activity will be logged and tracked for resolution by ABC management.tracked for resolution by ABC management.

All information transmitted or stored by the system (including e-All information transmitted or stored by the system (including e-mail and files) may be subject to public disclosure.mail and files) may be subject to public disclosure.

By accepting the Accept button below, you acknowledge your By accepting the Accept button below, you acknowledge your understanding and acceptance of ABC’s policies. Otherwise, select Decline understanding and acceptance of ABC’s policies. Otherwise, select Decline to log off this system immediately.to log off this system immediately.

Page 7: Effect of Corporate IT Policies on Otherwise Privileged Communication

XYZ COMPANY IAUPXYZ COMPANY IAUP1. XYZ Company recognizes the business need for some, if not all of its 1. XYZ Company recognizes the business need for some, if not all of its employees to have access to the Internet while on the job, using company employees to have access to the Internet while on the job, using company computers. As such, XYZ has made the business decision to make the computers. As such, XYZ has made the business decision to make the Internet available to employees for XYZ business purposes.Internet available to employees for XYZ business purposes.

2. XYZ intends for the Internet to be accessed for business purposes and 2. XYZ intends for the Internet to be accessed for business purposes and expects that employees will spend no more than 5 minutes per day accessing expects that employees will spend no more than 5 minutes per day accessing the Internet for non-business purposes.the Internet for non-business purposes.

3. The company reserves the right to use monitoring software to make sure 3. The company reserves the right to use monitoring software to make sure the company’s IAUP is being adhered to by its employees. The company may the company’s IAUP is being adhered to by its employees. The company may record and/or monitor one or more employees’ computer and Internet activity record and/or monitor one or more employees’ computer and Internet activity for any reason and without any specific notice.for any reason and without any specific notice.

4. By clicking “Agree” below, you agree that:4. By clicking “Agree” below, you agree that:a. You have had the opportunity to review this agreement and ask any a. You have had the opportunity to review this agreement and ask any questions regarding this document.questions regarding this document.b. You will adhere to the company’s IAUP.b. You will adhere to the company’s IAUP.c. You will be subject to disciplinary measures, including possible termination, c. You will be subject to disciplinary measures, including possible termination, if you violate the IAUP.if you violate the IAUP.

Page 8: Effect of Corporate IT Policies on Otherwise Privileged Communication

Asia Global FactorsAsia Global Factors

1.Does the corporation maintain a policy banning personal or other objectionable use;

2.Does the company monitor the use of the employee’s computer or e-mail;

3.Do third parties have a right of access to the computer or e-mails; and

4.Did the corporation notify the employee, or was the employee aware, of the use and monitoring policies?

Page 9: Effect of Corporate IT Policies on Otherwise Privileged Communication

Ripped from the Headlines:Ripped from the Headlines:

Personal accounts may allow you to maintain a privilege.

Do not confuse privilege with privacy.