On Fri, 20 Feb 2004, Matt Alexander wrote:
> Things like this are used as proof for dismissing an employee that has
> violated the company's computer use policy. To avoid messy legal
> complications, make sure such software is deployed company-wide and that
> all monitoring is done equally, otherwise an employee could come back and
> claim that they were singled out.
1) Documented Policy and Procedure on monitoring.
2) Employee signed statement that they have no expectation of privacy on
your network.
3) Documented Policy and Procedure on digital evidence discovery.
4) Follow best-practices on evidence collection, storage,
chain-of-custody, etc (should this be a criminal matter).
Lawyers have a *field day* with this stuff.
---------------------------------------------------
PLUG-discuss mailing list -
PLUG-discuss@lists.plug.phoenix.az.us
To subscribe, unsubscribe, or to change you mail settings:
http://lists.PLUG.phoenix.az.us/mailman/listinfo/plug-discuss