Академический Документы
Профессиональный Документы
Культура Документы
Reyte On Publishing
http://WritersBlock-Aid.com
2
Email Communication Policy
At the place of employment new subscribers receive an email welcoming them to the services
provided. There will also be information about all of the different services as well as how to
contact someone with questions. At times our company sends by email service announcements to
notify them of changes in price or a problem with a service interruption or how to handle an
issue. If the subscriber has called for an appointment or to add additional features, or a service
call for repairs, they could receive an email to inform them of this news. This is done in order to
ensure the customer is aware of when and how we are responding to their requests or other
needs. It is always an option to opt-out of any emails that are related to their services. However
by email is one way in which the company communicates important service announcements or
This company does reserve the privilege of sending out promotions by email to the extent
allowed by law. There will always be directions to control the number of communications sent
and the frequency including opt-out details. There will most likely be an online site to which the
subscriber can refer for more information or contact number for questions.
The company is allowed to review or update the personal identity of any information that
iscollected and stored about a subscriber receiving service within the business records. This
information is primarily billing and accounting data. This information will be sought out and
verified by official channels to make certain the correct data has been updated on the subscriber.
3
Internet privacy and CPNI issues
An area of the Internet concerning self-regulation being the best way for subscribers to obtain
privacy protection. Internet services will not share your CPNI with third party sources without
your consent. The company abides by the COPPA legislation that was passed by the 105th
Congress. We are in total agreement to protect young children’s privacy. COPPA stands for
What are some of the laws relating to employee e-mail and Internet privacy?
Refers to parameters to establish identity theft agencies and handling of credit card information.
For example posting only the last four digits of credit card and/or bank numbers or accounts on
receipts.
Establishes the terms under which identity theft becomes a violation of the law and a felony and
Enlarges the jurisdiction of law enforcement’s ability to monitor the online activities of
FTC Laws
The FTC has in place several laws at the federal level that are designed to intervene on the
disclosure of public data. It also requires businesses to verify and validate their intent to assure
the Fair Credit Reporting Act (FCRA), and Title V of the Gramm-Leach-Bliley Act.
P.L. 108-159 The FACT Act Has the most sweeping protections against identity theft so far
according to federal regulations. Points covered under this law (FTC Rules, 2004):
• Requires consumer reporting agencies (CRAs) to follow certain procedures concerning when
to place, and what to do in response to, fraud alerts on consumers' credit files;
• Allows consumers one free copy of their consumer report each year from nationwide CRAs
as long as the consumer requests it through a centralized source under rules to be established
by the FTC;
• Allows consumers one free copy of their consumer report each year from nationwide
specialty CRAs (medical records or payments, residential or tenant history, check writing
history, employment history, and insurance claims) upon request pursuant to regulations to
• Requires credit card issuers to follow certain procedures if additional cards are requested
• Requires business entities to provide records evidencing transactions alleged to be the result
of identity theft to the victim and to law enforcement agencies authorized by the victim to
• Requires CRAs to block the reporting of information in a consumer's file that resulted from
identity theft and to notify the furnisher of the information in question that it may be the
to jointly develop guidelines for use by financial institutions, creditors and other users of
• Extends the statute of limitations for when identity theft cases can be brought.
Companies are concerned that employees may put their businesses at risk by opening up access
Employer Policy
The employer may monitor email and Internet use to determine the level of productivity of a
department or individual. There is a concern of whether or not employees should be told they are
being monitored. There is software that allows the employer to record the keystrokes the
employees are entering to determine what type of site the employees’ access. Other programs
monitor email use, inappropriate use of the Internet, and the type of content being downloaded or
Companies may also implement email and Internet policies to gain the trust of consumers to visit
their sites and make purchases. Without buyer confidence, there is no online sales, therefore in
order to gain the trust of the public in taking advantage of the convenience and variety of product
available online, privacy terms are drafted by companies and posted to their sites.
Use policies also help consumers to protect themselves by selecting stronger passwords, and
requiring multiple levels of security to gain access to online accounts. Requesting that phone
numbers and email addresses be verified before personal data such as access id and password be
released. Requiring verification of address by using copy of drivers license or requesting a copy
One method used to obtain Personal Identity and Information (PII) is called "phishing." It refers
order to induce another person to provide PII. Some common phishing scams involve e-mails
that purport to be from financial institutions or ISPs claiming that a person's record has been lost
(Delio, 2005). The email will lead the visitor to site that is a duplicate or replication of the
original legitimate site and request personal info such as credit card numbers in order to capture
this information. In fact, a third party who is attempting to extract information that will be used
in identity theft or other crimes controls the e-mail or website. The FTC issued a consumer alert
on phishing in June 2004. An "AntiPhishing Workgroup" association has been founded to work
on resolutions to phishing.
pharming, a hacker could temporarily take over a legal site's domain, and transfer traffic
redirecting it to an illegal site undercover of the legitimate site. The computer user sees the
intended website's address in the browser's address line, but instead, he or she is connected to the
hacker's site and may unknowingly provide PII to the hacker (Delio, 2005).
Employees can assume there may be software on the PCs or computers that is monitoring their
access to the Internet. They can also assume the keystrokes made are being recorded to
determine what types of information is being viewed on the Internet. Lastly the employee may
7
assume that the material being downloaded is also being recorded by the company with or
These policies affect employees by causing them to be more professional during work hours and
save their personal shopping, Internet browsing, and email communications for non-work hours.
It should improve productivity, as employees are not tempted to use the email or Internet for
personal business. However, employees may feel a bit more exposed by their employees. They
may consider the company as being too intrusive of their privacy and this may lead to a feeling
FTC Rules. (2004). The FTC rules on free credit reports. Retrieved October 10, 2009 from
http://www.ftc.gov/opa/2004/06/freeannual.htm].
Delio, M. (2005). Pharming Out Scams Phishing. Retrieved October 10, 2009 from
http://www.wired.com/news/infostructure/0,1377,66853,00.html
Smith, M. (2005). 105th Congress COPPA. Retrieved October 10, 2009 from
http://www.ftc.gov/opa/2005/04/coppacomments.htm