PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
July 2004

Acceptable use policies will minimize email risks

Where would business be without email? It's an essential tool that, in many cases, has displaced phones, "snail mail" and faxes as the primary means of communication. The ubiquity and standardization of email has also made it one of the most exploited applications: It's a perfect vehicle for propagating viruses, spam, directory harvesting attacks, spyware and phishing scams. And, email has become the digital archive of corporate America, retaining (or capturing) evidence for regulatory compliance, contractual obligations and civil and criminal proceedings. Enterprises can mitigate email risks through sound and enforceable security and acceptable use policies, which define user and corporate restrictions and responsibilities. A Privilege, Not a Right Users rarely think about ownership when sending photos, party invitations or gossip from their company email accounts. This makes the establishment of ownership an essential element of an enterprise's email policy. While it may seem elementary, the first step in creating an email ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue