The dangers of e-mail companies were firstly given serious international attention to Microsoft's anticompetitive testing. Microsoft's legal basis and other cases in which cases have relied on e-mail evidence clarify that companies and individuals are responsible for what is happening in their email system.
For example, in April 2002, KPMG sent an internal e-mail to 33 recipients in a statement stating that the company had deliberately given a missing list of taxpayers to the IRS, sending another KPMG executive to the e-mail vice president Jeffrey Stein: "The sensitivity of this situation, do we need to print this?" The applicant's lawyers revealed the harmful emails that KPMG confessed to the offenses and agreed to pay $ 456 million.
In another case, the Wall Street JP Morgan Chase & Co. investment bank was required to pay $ 2.1 million in fines for failing to keep the e-mails required to investigate the Failure Analyst's misconduct.
However, the most common cases when emails are crucial are a lawsuit against a worker. These lawsuits include Sexual Assault Matters, which often serve as probative emails by supervisors or other staff dealing with strictly and sexually explicit content, discrimination cases that include emails containing e-mail or email containing racial or religious considerations , gender, or pregnancy, as well as in fraudulent issues that comment on the behavior, nature, or performance of employees using emails by employees, such as a person.
The use of emails in litigation has become a serious issue, the industry currently offers Internet and email liability policies. Coverage includes elements such as harm to security breaches, and defamation, defamation, and character scam. But what can you do to protect your business?
Is it possible for the company to perform email verification (sometimes e-mail monitoring) where the email is verified after the current transfer and the eavesdropping is monitored), where the transmission e-mails are captured and verified in employees' email accounts? Well, yes and no. Cases in the United States have proven that both are permitted if (a) reasonably (b) supported by e-mail policy and (c) are documented employee training.
Best Defense is a clear e-mail security policy and procedural document covering all potential threat areas, then well-designed, regular training, involving new employees and new policy updates. The Human Resource Management Company calls on its members to set up a clear training program to ensure that e-mail is used properly and efficiently. One survey claims that 73% of companies do not offer web training and 70% do not have a written content security policy.
Another important security company can accept legal waivers on every email footer. As the content sent by e-mail is legally the same as that sent to corporate letterheads, if the email address contains the name of a company, a statement of liability such as "This e-mail and X Company employees do not necessarily reflect the views of "X Company X" should be included in the corporate e-mail account template.
Another good idea is to emphasize training and periodic emails / reminders reminders that employees should remember that email is used for business purposes, not for personal use, and that their e-mails treat others as respectable as a corporate letter or reminder. It is also a good idea to remind employees in writing that corporate email accounts belong to the company and are therefore not confidential to the employee at the company alone. Employees must also refuse to check their texts before they send their messages or send a message without checking the accuracy of the actual data to be transmitted and to make sure that the information to be sent is not confidential