Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

Home > EdgeWave > E-Policy Best Practices

E-Policy Best Practices

White Paper Published By: EdgeWave
Published:  Oct 15, 2011
Type:  White Paper
Length:  15 pages

This newly updated handbook from The ePolicy Institute and EdgeWave, is an invaluable tool for IT and HR professionals who need to establish rules and guidelines for electronic communications at their organizations. This clear and thorough document gives you the dos and don'ts of e-policy best practices and covers the electronic activities that can seriously affect your organization including the Internet, Instant Messaging (IM), Peer-to-Peer (P2P), email, social media and blogs. These tested and proven guidelines will help you begin writing the policies that best support your organization's business goals. Discover how accurate and detailed policies are part of an overall security strategy that includes comprehensive Internet and email filtering to protect your networks and employees from emerging threats.

Topics covered include:

  • Put Best Practices to Work With the 3-Es of Electronic Risk Management
  • Keep Online Employees In Line
  • Manage P2P Risk with Policy and Technology
  • Control E-Mail Risk By Controlling Written Content

Don't wait until your employees or networks have been compromised, start building a foundation for secure communication throughout your organization with this valuable handbook.

Tags : 
e-policy best practices, web filter for enterprise, web security, email security, messaging security, best practices, handbook, edgewave, human resources, p2p, social media, blogging, blog, instant message, instant messaging, peer-to-peer, peer-2-peer, policies, filtering, security