Table of Contents
ch. 1. E-mail: the prime mover -- ch. 2. Employee privacy rights: to peek or not to peek, that is the question -- ch. 3. Labor organization activities: when can employees use corporate computers for labor-related activities? -- ch. 4. Discrimination and harassment: avoiding a hostile work environment -- ch. 5. Copyright: think before you cut and paste -- ch. 6. Defamation: can I say that? -- ch. 7. Spamming: too much of a good thing -- ch. 8. Trade secrets and other confidential information: protecting your business's most valuable assets -- ch. 9. Attorney-client communications using e-mail: are they protected? -- ch. 10. Computer security -- ch. 11. Preventing waste of computer resources -- ch. 12. Six essentials for every good policy -- ch. 13. Ensuring employee compliance with policies: education, education, education ... appendix A. Example policies -- appendix B. Selected laws and regulations.