Quantcast
Channel: policy – IT Manager Daily
Browsing all 14 articles
Browse latest View live

Network admin fined $1.5 million for doing his job?

A network administrator accused of sabotaging his employer’s computer system has already been sentenced to prison time — now he’s being ordered to pay a huge fine as well. His crime? According to him,...

View Article



Study busts myths about password policies

Most companies have some sort of password creation policy in place to keep users from choosing simple codes such as “12345″ or “password” to protect sensitive company documents. But not all of those...

View Article

Should worker fired for web use get unemployment?

Taking disciplinary action against an employee for improperly using the Internet at work can bring up some legal questions for companies. Among them: Is wasting time online considered enough of an...

View Article

Users bring their own mobile devices no matter what IT says

Many companies have started coming up with policies regulating employees’ use of personal gadgets for work purposes. But whether there’s a policy or not, employees are using their personal devices. In...

View Article

Could boss read employee’s personal email?

IT must often walk a fine line between protecting employees’ privacy and enforcing IT policies and procedures. Being on the wrong side of the line can get organizations into legal trouble. In one...

View Article


Image may be NSFW.
Clik here to view.

5 ways to make users care more about security

No surprise here, but a recent survey shows just how little many employees care about IT security while they’re at work. How can IT managers get them to change their attitudes?  The good news: It’s...

View Article

Image may be NSFW.
Clik here to view.

5 policy mistakes that sink BYOD programs

A BYOD policy is becoming a requirement for most companies – unfortunately, for many organizations, creating an effective policy involves a lot of trial and error.  Most experts agree that having a...

View Article

Study: 91% of all accounts use one of the 1,000 least secure passwords

Password security requires a delicate balance. Many policies require complex codes, but if IT goes too far, users will end up breaking the rules when they can or keep their passwords written on paper....

View Article


3 hidden costs of BYOD – and what to do about them

When deciding on a mobile strategy, here are three hidden costs of BYOD companies need to consider.  We recently discussed some of the alternatives to BYOD that companies can use to improve user...

View Article


BYOD policy keys to avoid legal trouble

As more employees use their personal computing devices at work, companies have to ask some questions about their rights to manage a gadget that someone else owns.  While many of BYOD’s complex legal...

View Article

While IT sweats BYOD policies, users reject them

Two recent reports show that neither users nor IT are particularly comfortable with BYOD as it stands today. And while IT is working to refine these policies, users are likely to ignore them....

View Article

Image may be NSFW.
Clik here to view.

Sample data transfer and storage policy template

Storing and transferring data has never been easier for workers – or more dangerous. Here is a sample policy you can build off of in order to set rules and best practices for how users can transfer...

View Article

Image may be NSFW.
Clik here to view.

Sample BYOD policy template

Bring your own device (BYOD) programs call for three critical components: a software application for managing the devices connecting to the network, a written policy outlining the responsibilities of...

View Article


Image may be NSFW.
Clik here to view.

Creating an acceptable use policy that’ll be followed and enforceable

You can’t police everything users do on company machines, nor should you try to. But in absence of a Big Brother policy where IT is always watching, you can help users understand what inappropriate...

View Article
Browsing all 14 articles
Browse latest View live




Latest Images