Unable to Attend?
To order an audio CD recording of this event, click Recordings on the menu.
Sixty-eight percent of U.S. employees have sent e-mails that expose their companies to risk.
Since 2005, almost 500 million consumer records have been compromised in security breaches, such as stolen laptops or drives, hacked websites, or intentional theft by an employee or contractor.
Every new device or application that promises to make our lives easier or more productive brings with it the risk of misuse -- whether accidental or intentional.
That's why technology dangers consistently rank number one on the list of employers' concerns -- and why it's absolutely critical that you create safe and sensible policies for the use of technology in your workplace. The question is, where and how do you begin?
The first step is to attend Kiplinger's latest 90-minute interactive audio conference on November 18. You'll come away with a step-by-step plan to identify all of the technologies in your workplace that represent potential risk & assess the effectiveness of your existing security policies & revise current guidelines and create new ones as necessary & communicate and enforce your new customized policies to ensure their effectiveness.
Start with the big picture: You'll get a comprehensive overview of the threats posed by technology and the benefits of adopting effective policies to minimize your exposure, including:
- Protecting trade secrets
- Preserving customer and employee privacy
- Avoiding problems caused by employee mistakes--or intentional misconduct
- Managing electronic documents
- Reserving your right to read employee communications, and
- Laying the groundwork for discipline or termination of employees who break the rules.
Then focus on specifics: Best of all, you discover dozens of practical real-world tips and strategies to effectively address the most common technology-related areas of concern, including:
- E-mail: Follow these simple guidelines to set the rules for personal use, privacy issues, monitoring, appropriate vs. inappropriate content, viruses and other security threats.
- Internet Use: Base your Web policy on this model to effectively address personal use, prohibited uses and privacy concerns.
- Blogs and Beyond: See how to spell out restrictions on personal posting, and establish a common sense policy for blogging and tweeting.
- Cell Phones: Include these special considerations to cover company-owned cell phones as well as personal phones, and even address driving safely while using a cell phone -- a far more important concern than you may think, and one that's commonly overlooked in company security policies.
- Computing Devices: When it comes to pricey equipment, you need a unique set of rules to govern acceptable use, security issues, and loss or theft prevention.
- And much more.
BONUS: All registrants for the live event will receive a copy of the book Smart Policies for Workplace Technologies, written by Lisa Guerin, our expert presenter. This 216 - page book -- a $29.99 value -- is yours at NO ADDITIONAL CHARGE.
Lisa Guerin, an editor/author specializing in employment law, is author or co-author of several Nolo books, including The Manager's Legal Handbook, Dealing with Problem Employees, The Essential Guide to Federal Employment Laws, Workplace Investigations, Create Your Own Employee Handbook, and Nolo's Guide to California Law. Guerin has practiced employment law in government, public interest, and private practice where she represented clients at all levels of state and federal courts and in agency proceedings. She is a graduate of Boalt Hall School of Law at the University of California at Berkeley.
Event registrants may cancel their registration without penalty anytime prior to the start of the event.