Email Internet Use Policies CSH 6 Chapter 48

  • Slides: 21
Download presentation
Email & Internet. Use Policies CSH 6 Chapter 48 “Email and Internet-Use Policies” M.

Email & Internet. Use Policies CSH 6 Chapter 48 “Email and Internet-Use Policies” M. E. Kabay & Nicholas Takacs 1 Copyright © 2020 M. E. Kabay. All rights reserved.

Plan for Today Ø Video: The Plugged-in Mailbox Ø Discussion Ø Chapter Review 2

Plan for Today Ø Video: The Plugged-in Mailbox Ø Discussion Ø Chapter Review 2 Copyright © 2020 M. E. Kabay. All rights reserved.

Topics in CSH 6 Ch 48 Ø Damaging the Reputation of the Enterprise Ø

Topics in CSH 6 Ch 48 Ø Damaging the Reputation of the Enterprise Ø Disseminating and Using Incorrect Information Ø Hoaxes Ø Threats Ø Viruses and Other Malicious Code Ø Junk Email Ø Chain Letters and Ponzi Schemes Ø Get-Rich-Quick Schemes Ø Mail Storms Ø Stolen Intellectual Property 3 Ø Plagiarism Ø Criminal Hacking and Hacktivism Ø Online Auctions Ø Online Gambling Ø Buying on the Web Ø Games Ø Spyware Ø Internet Addiction Ø Online Dating and Cybersex Ø Hate Groups Ø Pornography Ø Pedophiles Copyright © 2020 M. E. Kabay. All rights reserved.

Training Video The Plugged-In Mailbox Commonwealth Films Followed by Class Discussion 4 Copyright ©

Training Video The Plugged-In Mailbox Commonwealth Films Followed by Class Discussion 4 Copyright © 2020 M. E. Kabay. All rights reserved.

Damaging the Reputation of the Enterprise Ø Principle: q. The USENET is forever q.

Damaging the Reputation of the Enterprise Ø Principle: q. The USENET is forever q. Email is almost forever Ø Violating netiquette Ø Violating laws Ø Ill-advised email q. Creating hostile work environment q. Libeling people or organizations Ø Inappropriate use of corporate identifiers q. Corporate email = corporate letterhead 5 Copyright © 2020 M. E. Kabay. All rights reserved.

Disseminating and Using Incorrect Information Ø Disintermediation and quality Ø Libel Ø Practical guidelines

Disseminating and Using Incorrect Information Ø Disintermediation and quality Ø Libel Ø Practical guidelines q. Judge credibility of source q. Do not pass on information without checking validity X 6 Copyright © 2020 M. E. Kabay. All rights reserved.

Hoaxes Ø Urban myths Ø Virus myths Ø Clues q. Style q. No date

Hoaxes Ø Urban myths Ø Virus myths Ø Clues q. Style q. No date q. No authoritative source q. Demand to disseminate widely q. Claims of prizes / money q. Threats of bad consequences for failing to circulate 7 Copyright © 2020 M. E. Kabay. All rights reserved.

Threats Ø Do not take lightly q. NEVER destroy email of this type q.

Threats Ø Do not take lightly q. NEVER destroy email of this type q. Need evidence Ø Should usually contact internal security q. Security personnel will call law enforcement according to established procedures Ø Threats of terrorist action (bombs, poison) particularly serious and may require immediate action as part of incident response plan 8 Copyright © 2020 M. E. Kabay. All rights reserved.

Viruses and Other Malicious Code Ø Policies forbid all voluntary involvement with malware q.

Viruses and Other Malicious Code Ø Policies forbid all voluntary involvement with malware q. No Vx sites q. No writing, exchange, distribution q. No disabling of AV software Ø Safety guidelines known to all q. Automatic updates q. Don’t use illegal / rogue software q. Don’t accept executable attachments to email 9 Copyright © 2020 M. E. Kabay. All rights reserved.

Junk Email Ø The SPAM®* skit (Monty Python)! Ø Major problem – 80% of

Junk Email Ø The SPAM®* skit (Monty Python)! Ø Major problem – 80% of all email in world Ø Guidelines q. No employee to create / send spam q. Never allow response to spam q. Never buy anything from spammers q. Don’t click on addresses in spam q. Make sure your SMTP server forbids spam relay * SPAM® is a registered TM. Use Spam or spam but not SPAM for junk email. 10 Copyright © 2020 M. E. Kabay. All rights reserved.

Chain Letters and Ponzi Schemes Ø Pyramid fraud q. Send money to people higher

Chain Letters and Ponzi Schemes Ø Pyramid fraud q. Send money to people higher (earlier) on list q. Amounts increase as long as new victims recruited q. When no more new victims, pyramid collapses q. Last in lose all their money q. Originators run away rich Ø Illegal in USA (USPS regs) Ø No employee should be allowed to participate 11 Copyright © 2020 M. E. Kabay. All rights reserved.

Get-Rich-Quick Schemes Ø Infinite variety of schemes for suckers Ø Too good to be

Get-Rich-Quick Schemes Ø Infinite variety of schemes for suckers Ø Too good to be true = not true Ø Nigerian 4 -1 -9 (advance-fee) scams a plague q. I have lots of stolen/unclaimed money q“I’ll give you some if you help me steal it” Ø Policy: constant awareness q. Ensure employees know about scams q. Make fun of scams in your newsletters q. Tell employees about gullible (stupid) victims 12 Copyright © 2020 M. E. Kabay. All rights reserved.

Mail Storms Ø Autoforwarding between 2 email addresses Ø List servers that allow autoresponse

Mail Storms Ø Autoforwarding between 2 email addresses Ø List servers that allow autoresponse to entire list q. Full mailboxes q. Out-of-office replies Ø Reply to entire list instead of to single person Ø Quoting entire messages instead of extracts q. Especially quotations üOf quotations § Of quotations • Of quotations…. 13 Copyright © 2020 M. E. Kabay. All rights reserved.

Stolen Intellectual Property Ø Serious legal issues for employers q. RIAA has threatened companies,

Stolen Intellectual Property Ø Serious legal issues for employers q. RIAA has threatened companies, universities with lawsuits q. SPA / BSA have sued organizations Ø Webmasters get employers into trouble by posting materials without permission q. Embarrassing, risky q. Politicians have found stolen text on competitors’ Websites Ø Must train employees to respect legal restrictions for software, music, text 14 Copyright © 2020 M. E. Kabay. All rights reserved.

Plagiarism Ø Unattributed / misattributed information Ø Copyright violation Ø Extreme embarrassment Ø Discredits

Plagiarism Ø Unattributed / misattributed information Ø Copyright violation Ø Extreme embarrassment Ø Discredits organization Ø Policies q. Absolutely forbidden q. Check materials using GOOGLE etc. q. Tools available for automated checking üE. g. , < http: //doccop. com > 16 Copyright © 2020 M. E. Kabay. All rights reserved. See next page

Doc. Cop 17 Copyright © 2020 M. E. Kabay. All rights reserved.

Doc. Cop 17 Copyright © 2020 M. E. Kabay. All rights reserved.

Criminal Hacking and Hacktivism Duhhh… 18 Copyright © 2020 M. E. Kabay. All rights

Criminal Hacking and Hacktivism Duhhh… 18 Copyright © 2020 M. E. Kabay. All rights reserved.

Other Risks to Employees and Families Ø Online Auctions Ø Online Gambling Ø Buying

Other Risks to Employees and Families Ø Online Auctions Ø Online Gambling Ø Buying on the Web Ø Games Ø Spyware Ø Internet Addiction Ø Online Dating and Cybersex Ø Hate Groups Ø Pornography Ø Pedophiles 19 Copyright © 2020 M. E. Kabay. All rights reserved.

Review Questions (1) 1. Why should an organization expend any effort at all in

Review Questions (1) 1. Why should an organization expend any effort at all in teaching employees how to protect themselves and their families against Internet & Email dangers? What does this have to do with information assurance? 2. How can something as minor as violating customs in discussion groups cause harm to an organization? 3. Why do we say that USENET and corporate email have a potentially permanent lifespan? 4. Should corporate email be used for non-professional messages? Why or why not? 5. How can someone reasonably decide whether to forward an email containing alarming information? 6. What does “disintermediation” mean in discussions of information quality on the Internet? 20 Copyright © 2020 M. E. Kabay. All rights reserved.

Review Questions (2) 7. What are some key signs that message is a hoax?

Review Questions (2) 7. What are some key signs that message is a hoax? 8. How can you check a message to find out if it is a hoax? 9. How should employees respond to threats of violence received in email? 10. What are the most important principles to teach employees about preventing virus / worm infections? 11. How should employees respond to junk email? 12. What is a Ponzi scheme and how should employees respond to one? 13. Explain how mail storms can arise from autoreplies and mailing lists. 14. Why should organizations ban the use or exchange of pirated music, software and text? 21 Copyright © 2020 M. E. Kabay. All rights reserved.

DISCUSSION 22 Copyright © 2020 M. E. Kabay. All rights reserved.

DISCUSSION 22 Copyright © 2020 M. E. Kabay. All rights reserved.