Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Borderlines in Private Law

Borderlines in Private Law

Edited by: William Day, Julius Grower
Price: £90.00

Lord Denning: Life, Law and Legacy



  


Welcome to Wildys

Watch


NEW EDITION
The Law of Rights of Light 2nd ed



 Jonathan Karas


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


E-Mail, Social Media and the Internet at Work: A Concise Guide to Compliance with the Law 7th ed


ISBN13: 9781858117232
Previous Edition ISBN: 9781858113739
Published: January 2015
Publisher: PP Publishing
Country of Publication: UK
Format: Paperback
Price: £29.99



Despatched in 4 to 6 days.

Communicating has become effective and efficient. Sometimes, however, that carries great risks. Immediately computers were connected to the internet, the line between the internal and external world of communications altered forever. Email has become ubiquitous – it is the most commonly used method of corresponding within and without organisations. Social media has extended the way many people connect.

However, problems occur. For instance, some people do not adjust their behaviour when using such technologies, causing themselves, their friends and families, and their employers embarrassment. Others use the technology to steal, commit fraud, bully and continue with unpleasant and illegal activities – and do so when using the corporate infrastructure.

The content of this book is deliberately general in nature, to ensure it is understandable by those setting up a policy, policing it, or defending themselves.

Written by a barrister that has given numerous seminars on the topic over the years, it provides copious examples is to provide the reader with a clear understanding about the nature of the case in order to more fully understand the reason for the decision made. The result is that the law can be easily put into real context.

It will be an invaluable addition to the working library of business and organisation leaders and the professionals who advise them. This new edition contains a simple-to-use well-drafted model policy.

Subjects:
Employment Law, IT, Internet and Artificial Intelligence Law
Contents:
1. Networked communications in context
2. The liability
3. Types of misuse
4. Liability and employees
5. Operational liability
6. Monitoring networked communications
7. Personal data: workers, customers and security
8. Soring Networked Communications
9. Evidence
10. Content of the netwroked communications policy
11. Operational implementation of the policy
12. Check list for the network communications use policy
Appendix 1 Further examples of misuse of networked communications
Appendix 2 Sample email, social networking and internet use policy