Most Popular Technology Content
Due Diligence For Service Providers
06/04/2001
What do we need to do to satisfy the new due diligence requirements for service providers?
Email Retention
06/04/2001
Can you give us some guidance on what our policies should be regarding retention of email, both sent and received? We have some employees who never delete anything, with the result that their email boxes crash occasionally. Lots of emails are just one sentence long and don’t really mean much. How do you decide what to keep and what to delete? Do you recommend printing out emails for retention purposes? Are there programs that allow you to search emails across a network?
Virus Protection Policy Violations
06/04/2001
Does anyone have guidance for what should be the penalty for violation of your in-house virus protection policy? For example, our policy says employees can’t bring software from home and install it, but occasionally someone will do it anyway.
Federal Reserve Goes High Tech
05/21/2001
by Mary Beth Guard
Responsibility for Unauthorized Transactions
05/07/2001
Our customers select their own passwords in order to access their confidential information and transact business on our Web site. Do we have any liability if an unauthorized party obtains the password from our customer without our customer's consent? What if a hacker got into our system or our customer's?