EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton.

Slides:



Advertisements
Similar presentations
Information Security Domains Computer Operations Security By: Shafi Alassmi Instructor: Francis G. Date: Sep 22, 2010.
Advertisements

Rockingham County Public Schools Technology Acceptable Use Policy
Woodland Hills School District Computer Network Acceptable Use Policy.
Health Insurance Portability and Accountability Act HIPAA Education for Volunteers and Students.
1 HIPAA Education CCAC Professional Development Training September 2006 CCAC Professional Development Training September 2006.
HIPAA Implementation. Basic HIPAA Requirements Designating a Privacy Officer Notifying patients about their privacy rights and how their information can.
AUP Acceptable Use Policy Summarized by Mr. Kirsch from the Sioux Falls School District Technology Plan.
CREATED BY: HMIS Security Awareness Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
Uintah School District Acceptable Use for Computer and Network Access.
Boyertown Area School District Acceptable Use Policy.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
Phoenix Union High School District Governing Board Policy In-Service Technology Usage Electronic Information System (EIS) 2014/2015 School Year.
Business Plug-In B7 Ethics.
Acceptable Use Policy (AUP) What does it actually say? Why is it necessary?
ACCEPTABLE An acceptable use policy (AUP), also known as an acceptable usage policy or fair use policy, is a set of rules applied by the owner or manager.
INTERNET and CODE OF CONDUCT
 All employees will be able to communicate with other people in the district, schools, colleges, and various organizations.  Access is provided to hundreds.
HIPAA Basic Training for Privacy and Information Security Vanderbilt University Medical Center VUMC HIPAA Website: HIPAA Basic.
EMPLOYEE USE OF COMPANY MONITORING & PRIVACY ISSUES.
Security Awareness Norfolk State University Policies.
CPS Acceptable Use Policy Day 2 – Technology Session.
RESPONSIBLE USE POLICY. UNCW Information Security Awareness Program RESPONSIBLE USE OF EDPE PURPOSE.
HIPAA PRIVACY AND SECURITY AWARENESS.
Elementary GCCISD Agreement for Computing and Electronic Communications.
Electronic Use Policies.   Social Media  Internet.
 Board Policy GBEAA (The Internet Acceptable Use Policy): › “Employees will have access to the Internet for the purpose of instruction, resources and.
Employee Guidelines for Acceptable Use of Technology Resources.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Charlotte Greene EDTC 630 A document of set rules by the school district that explains what you can and cannot do with district owned information systems.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved ETHICS Business Plug-In 7.
00870B2F.0/Internet%20Safety.jpg.
Use of U.T. Austin Property Computers: Security & Acceptable Use The University of Texas at Austin General Compliance Training Program.
University Health Care Computer Systems Fellows, Residents, & Interns.
Jenkins Independent Schools NETWORK STAFF USER CONTRACT Acceptable Use Policy 2007 – 2008.
Monitoring Employees on Networks: Unethical or Good Business?
EAST HARDIN MIDDLE SCHOOL MR. ERVIN Internet Safety Policy and Acceptable Use Procedures.
What are the rules? Information technology is available to every student, faculty and staff member in support of the essential mission of the University.
Mr. Fleming.  Law passed by Congress in  Right to Privacy ◦ Medical information of patient can only be shared with doctor and professionals administering.
Essential Components: Acceptable Use Policy Presenter: John Mendes.
Security in ERP Systems By Jason Rhodewalt & Marcel Gibson.
Barren County Schools Student Technology Appropriate Use Policy (AUP) “ ”
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Monitoring.
Chapter 2 Securing Network Server and User Workstations.
A Discussion of Student Responsibility and the Upper Merion Area School District’s Acceptable Use Policy.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
ISO/IEC 27001:2013 Annex A.8 Asset management
INTERNET SAFETY.
TRUENORTH TECHNOLOGY POLICIES OVERVIEW. This includes but is not limited to : – Games – Non-work related software – Streaming media applications – Mobile.
A CCEPTABLE U SE P OLICY Adrienne Ochs EDU D EFINITION Set of rules enforced by one who runs a network, website or a large computer system that.
Chichester School District is providing students access to the district’s electronic network. This network includes Internet access, computer services,
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Woodland Hills School District Computer Network Acceptable Use Policy.
A REVIEW OF THE NPSD’S ACCEPTABLE USE POLICIES AND ADMINISTRATIVE REGULATIONS JUNE 17 TH & 20 TH TEACHER IN-SERVICE The Acceptable Use of Technology 1.
Copyright © 2005 Thomson Business & Professional Publishing. All rights reserved.16–1 Learning Objectives  Define employment-at-will and discuss how wrongful.
Proper Internet and Social Media Usage Internet Usage While on Premise Board Policy GBEAA (The Internet Acceptable Use Policy): “Employees will.
Dial-in Access Policy By Matt Lynott. Reasoning The reason for this policy is to define appropriate dial-in access and its use by authorized personnel.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 7 EMPLOYMENT CONTRACTS & CODES OF CONDUCT.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
Effect of Corporate IT Policies on Otherwise Privileged Communication By: Jonathan T. Barton.
Somerset ISD Online Acceptable Use Policy. Somerset Independent School District Electronic Resources Acceptable Use Policy The purpose of this training.
The Acceptable Use of Technology
Internet Safety and Acceptable Use Policies.
Employee Privacy and Privacy of Employee Information
Confidentiality of Information Acknowledgment and Agreement 2018
Confidentiality Agreement
Student User Agreement and Policy 2022
Woodland Hills School District
Protecting Student Data
Presentation transcript:

EFFECT OF CORPORATE IT POLICIES ON OTHERWISE PRIVILEGED COMMUNICATIONS Prepared by Joel P. Hoxie of Snell & Wilmer November 2010 Presented by: Jon Barton

Issue If an employee uses his employer’s corporate IT resources to prepare or send/receive a personal (i.e., non-work related) communication, does that destroy whatever privilege might otherwise attach to the communication?

All employees and other authorized users of computer resources should be aware of ABC’s policies for appropriate use of computing resources. Follow these links to view the IT Acceptable Use Policy and the IT Security Policy. In order to protect the privacy and confidentiality of corporate information assets, ABC has implemented an Internet Monitoring System to identify inappropriate and unauthorized use of ABC computer resources. The System monitors the content of all inbound and outbound Internet traffic and external usage. Questionable activity will be logged and tracked for resolution by ABC management. All information transmitted or stored by the system (including and files) may be subject to public disclosure. By accepting the Accept button below, you acknowledge your understanding and acceptance of ABC’s policies. Otherwise, select Decline to log off this system immediately. ABC COMPANY PRIVACY NOTICE

Asia Global Factors 1.Does the corporation maintain a policy banning personal or other objectionable use; 2.Does the company monitor the use of the employee’s computer or ; 3.Do third parties have a right of access to the computer or s; and 4.Did the corporation notify the employee, or was the employee aware, of the use and monitoring policies?

1. XYZ Company recognizes the business need for some, if not all of its employees to have access to the Internet while on the job, using company computers. As such, XYZ has made the business decision to make the Internet available to employees for XYZ business purposes. 2. XYZ intends for the Internet to be accessed for business purposes and expects that employees will spend no more than 5 minutes per day accessing the Internet for non-business purposes. 3. The company reserves the right to use monitoring software to make sure the company’s IAUP is being adhered to by its employees. The company may record and/or monitor one or more employees’ computer and Internet activity for any reason and without any specific notice. 4. By clicking “Agree” below, you agree that: a. You have had the opportunity to review this agreement and ask any questions regarding this document. b. You will adhere to the company’s IAUP. c. You will be subject to disciplinary measures, including possible termination, if you violate the IAUP. XYZ COMPANY IAUP

Types of Communications  Communications Made Via the Company Account  Communications Made Via a Password- Protected, Web-Based  Documents Saved Locally on a Company- Issued Computer