Group C.  There are about 250 billion emails generated everyday.  There are many problems and risks related to e-mail security like privacy, improper.

Slides:



Advertisements
Similar presentations
Outlook 2010 Quick Guide Table of Contents: Overview of client, Sending/Receiving , Using the address book………..……… Sent Items……………………………………………………………………………………………..…..8.
Advertisements

Barracuda Message Archiver
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
COMPUTER BASICS METC 106. The Internet Global group of interconnected networks Originated in 1969 – Department of Defense ARPANet Only text, no graphics.
Crime and Security in the Networked Economy Part 4.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
Chapter 17 Controls and Security Measures
…your guide through terrain
In Pursuit of Security 250 billion messages are generated every day worldwide Personal s & Corporate s.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
L a r y s s a J a c k i e &. Founded in 2003, DocuSign is committed to transforming the way people like you work, live and connect by providing the freedom.
Masud Hasan Secure Project 1. Secure It uses Digital Certificate combined with S/MIME capable clients to digitally sign and.
How Companies Fight Spamming by Sonya Tormaschy & Marc Eggert E-Commerce: Tuesday & Thursdays; 1:30 – 2:45.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 12 Investigations.
CertifiedMail Secure Messaging “Enterprise Encrypted Messaging… Hosted or In House Flexibility” Confidential – for authorized and internal distribution.
Christopher Chapman | MCT Content PM, Microsoft Learning, PDG Planning, Microsoft.
Networks and Security. Types of Attacks/Security Issues  Malware  Viruses  Worms  Trojan Horse  Rootkit  Phishing  Spyware  Denial of Service.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
C4- Social, Legal, and Ethical Issues in the Digital Firm
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 12 Electronic Mail.
Securing Microsoft® Exchange Server 2010
Instant Messaging – Turning Toys Into Tools Presented by: Marla K. Brock – Bilzin Sumberg Kajetan Koci – Loeb & Loeb Kevin Sullivan – Cohen & Grigsby.
The Internet for Beginners Section Four of Four From the Richard Sugden Library Spencer, MA Jillian M. Parsons.
1 Using Messages sent from machine to machine and stored for later reading. You will use a client to read –Type mail or pine in UNIX to read.
3-Protecting Systems Dr. John P. Abraham Professor UTPA.
Module 9 Configuring Messaging Policy and Compliance.
Archive s By Cameron Harris. What is archiving s Archiving is the act of preserving and making searchable all to/from an individual.
Unit 2—Using the Computer Lesson 14 and Electronic Communication.
Archiving s. How to Manage Auto-Archive in Outlook Your Microsoft Outlook mailbox grows as you create and receive items. To manage the space.
Types of Electronic Infection
© 2007 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Unity Connection 7.1 Accept and Relay Aaron Belcher.
 Searching PST folders for legal discovery is costly  Multiple regulations require complicated archiving processes.
Basic Features and Options Accessing  Means of communicating electronically via the Internet.  Used by individuals, businesses,
Module 7 Planning and Deploying Messaging Compliance.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
CertifiedMail …when privacy matters ™. What CertifiedMail empowers you to achieve Secure …simplified. End-to-end secure messaging From any sender.
Topic 5: Basic Security.
DIGITAL SIGNATURE.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Copyright ©2015 WatchGuard Technologies, Inc. All Rights Reserved WatchGuard Training WatchGuard XCS What’s New in version 10.1.
Microsoft ® Office ® 2010 Office 2010 Security: Protecting your files.
ONE® Pages Training Presentation North York General Hospital.
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
s Protected by Fourth Amendment Right of Privacy By: Xavier Mulligan.
  is a system of electronic communication that allows the user to exchange messages over the internet  Everyone’s address is unique  Two.
Chapter 11 Enhancing an Online Form and Using Macros Microsoft Word 2013.
Managing Electronic Mail ( ) Audrey Terry KDLA.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
 Chances of contracting a Virus › Every time you download software › Every time you accept attachments.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Secure Services Shared Hosted MS Exchange 2010.
TWFG Branch Meeting – 1 st Quarter Logging In AMP was designed for use with Chrome. While some features may work in Internet Explorer, we recommend.
Windows Vista Configuration MCTS : Productivity Applications.
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
Advanced Data governance – labels (data classification)
Encrypted from CDS Office Technologies
Internet Business Associate v2.0
Freedom Independence Transition
Hosted Fax Self-Paced User Training
S/MIME T ANANDHAN.
netprem.com Postal Registered Mail – by Electronic Means
Using Groove Philip S. Vavalides Professor - IT/Networking Guilford Technical Community College Jamestown, NC.
ONE® Pages Training Presentation
Encryption in Office 365 Shobhit Sahay Technical Product Manager
Real World Advanced Threat Protection
Module 7 Questions Prepared by Mr O Seguna next.
Azure Information Protection
Presentation transcript:

Group C

 There are about 250 billion s generated everyday.  There are many problems and risks related to security like privacy, improper or illegal use, Virus attacks and many more.  All the problems related to s are increasing everyday.

 there are a number of free services that allow users to send self destructing s:  1)Big String: recalls and retracts a message after it has been sent based on the number of times the message is read/ the age of the .  it also blocks the recipient from copying, forwarding or printing the message

 Self destructing .com-works with the Web based clients to enable the user to create a one time secure page for the recipient  Kicknotes.com-self-destruct based on times read and age  Stealth meassage.com- stores encrypted messages(the user can set the self destruct options and messages can't be forwarded

 Sdmessage.com(Self Destruct Message)- is wed based and messages self destruct 60 secs after they are viewed  RPost.com-is an add-on to Microsoft Outlook- for a monthly fee of $14.75, RPost alerts the sender that an is received and opened...it can also verify that the content of the is not altered  These and many others can be very useful in protecting your but how is it with the modern corporate law?

 They are compatible in certain cases  The ability to eliminate, delete, destroy, or alter s runs flat against the drift of modern corporate law.  s is increasingly playing a role similar to postal mail and contracts in courts. It is even used as evidence of action, intention, and consequence.

 The Sarbanes-Oxley Act of 2002 requires all public firms to develop a reasonable policy of business record retention, including and instant messages.  A good retention policy cannot be selective, all documents need to be saved  Under the SOX, if you are convicted of changing, altering, or deleting business that is needed for a judicial process, you can be sentenced for up to 20 years in jail.