Академический Документы
Профессиональный Документы
Культура Документы
Gone are the days when executives used to scribble out on a piece of paper the draft of a correspondence, unmindful of the errors it
contained and pass it on to the person capable to correct the piece which otherwise could have drawn the funeral of the
grammarian. After a minor edit at one or two places, that piece of communication could be finalized and the same was sent out of
the organisation within a few days.
commonly ignored by managers, employees and software vendors. However, software publishers and their trade associations have
become more aggressive in pursuing cases of unauthorized software use. A careless practice, which has been ignored by a
company for years, can suddenly become a major problem if a disgruntled ex-employee chooses to report the company's
unauthorized use of computer software. Prudent management would consider auditing a company's current systems, and both
develop and enforce a clear policy forbidding the use of unlicensed or unauthorized computer software.
Employers are to monitor e-mails in an explicit manner and make it clear to the employees about the expected level of privacy in
using the e-mail facility of the company. Company management is to take following actions to monitor the resources:
Employees should clearly understand when and what is being monitored and what will be done with the resulting information and
should also be aware that systems may be audited without prior notice to employees. Employees should understand that use of
company e-mail, computers and voice mail systems is limited to business purposes unless otherwise stated.