1 / 21

Internet Content and e-Policy Strategies Messaging Explosion Brings Risks and Opportunities

Internet Content and e-Policy Strategies Messaging Explosion Brings Risks and Opportunities October 4, 2001 Michelle Drolet Corporate Strategy Winning companies need to leverage the Internet to stay ahead. In doing this, they give their employees every possible advantage.

bernad
Download Presentation

Internet Content and e-Policy Strategies Messaging Explosion Brings Risks and Opportunities

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet Content and e-Policy StrategiesMessaging Explosion Brings Risks and Opportunities October 4, 2001 Michelle Drolet

  2. Corporate Strategy • Winning companies need to leverage the Internet to stay ahead. In doing this, they give their employees every possible advantage. • Empower employees with Internet access • Provide them with corporate e-mail accounts • Encourage them to corroborate on company-confidential documents • Give them laptops to work from home • Provide them with home Internet access

  3. Corporate Strategy • Creating a work environment that is… • Efficient • Productive • Effective • Diligent • Task Oriented • Web Savvy • And what else does that create?

  4. Corporate Strategy • A corporation that is: • insecure • hackers exposing your corporate trade secrets • vulnerable • internal or external attacks upon sensitive corporate information • legally at risk • employees sending out offensive e-mail or browsing to inappropriate web sites

  5. Corporate e-Mail Usage

  6. Employee Internet Access

  7. Industry Facts • 55% of workers exchange potentially offensive messages at least once a month (PC Week) • 30-40% of workplace Internet surfing is not business related (IDC) • In a survey of 13,000 e-mail users, 90% said they received spam at least once a week (Gartner Group) • In a survey of 800 workers, 21-31% admitted to sending confidential information to recipients outside the company via e-mail (PC Week)

  8. Real Companies, Real Problems • The New York Times fired more than 20 employees for sending inappropriate and offensive e-mail. • July 28, 2000 the Associated Press reported that Dow Chemical will fire 50 workers and discipline more than 200 more for sending pornography and violent images through company e-mail. • August 22, 2000, Computerworld reported that Dow Chemical will fire as many as 40 employees for new violations of the company's Internet policy. • September 4, 2000, The Seattle Post Intelligencer reported that 3 high school teachers have been suspended without pay for sending explicit pictures over the schools e-mail system.

  9. Internet Usage Issues • Legality • employers are faced with legal issues: defamation, trade secret protection, sexual harassment, criminal accountability • Productivity • 30 to 40% of productivity is lost due to Internet and e-mail access in the workplace • Security • protection of intellectual property • Bandwidth • clogging your T1 line with what?

  10. Issues - Legality • “Since the company is the one that gave employees access, the company is liable - unless the company can show it took reasonable steps to prevent problems.” • Corporate Politics on the Internet: Connection with Controversy, 1996

  11. Issues - Productivity • Internet access allows your employees to: • Read the news: 72% • Make travel arrangements - 45% • Make purchases - 40% • Search for new jobs - 37% • Check their stock portfolio - 34% • Coordinate social events - 28% • Download music, online chat, play games, visit pornographic sites…. • Send your trade secrets to the competition... Source: September 2000 Vault.com Survey

  12. Issues - Security • Single virus costing company millions of dollars in lost information and downtime • Critical intellectual properties stolen by external or internal resources • Internet and external hacking can ruin a company

  13. Issues - Bandwidth • What are your employees doing on your time and dime? • Downloading… • The Dancing Baby • Holiday Greetings • The Frog in a Blender • Running PointCast • Sending Chain Letters

  14. First Steps... • Review Corporate Policies • Update existing policies • Create new policies (Internet and e-Mail usage) • Understand your Corporate Culture • Make sure your particular culture is communicated in your policies • Test your Corporate Environment • where are the vulnerabilities • what are your strengths, weaknesses

  15. Next Steps… • Policy Education • paper-based policy manual • electronic policy management solution • communicates policy and change in policy • reports compliance • conduct training sessions • create policy video • routine company meetings

  16. Final Steps... • Enforcement Technology • e-mail content scanning • URL filtering • intrusion detection and blocking • anti-virus protection

  17. Electronic Policy Management • e-Minder • Manages, schedules and tracks policy education process • Tamper proof database • Management of multiple policies • Secure central administration • Employee acknowledgment screens, browser based • Employee Infraction Report • Employee status and history

  18. Corporate Policy • Communicating Corporate Policy • Reduces Corporate Liability • Increases Productivity

  19. Who is CONQWEST ? • Leaders in Internet security industry coupling best-of-breed technology with top notch support and customization services • Industry leading partners • Significant customer list of over 300 companies • Seasoned security landscape and technology experts • Patent-pending on new policy management technology

  20. Security Landscape • Firewalls and VPN • NetScreen • Anti-Virus • Trend Micro • Sophos • URL Filtering • WebSense • Trend Web Manager • e-Mail Content • Content Technologies - MimeSweeper • Trend Micro - eManager • Policy Management • CONQWEST - e-Minder • Intrusion Detection and Blocking • Network ICE - ICE Pak • Security Audits • Intrusion Services • Network Architectures • Policy Development • Installation Services

  21. Your Internet Security and Policy Management Partner

More Related