CheckPoint Week 4

CheckPoint Week 4 - CheckPoint Week 4 E-mail used by...

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CheckPoint Week 4 E-mail used by corporations is both useful and at the same time can also be harmful. E- mail allows a member of any corporation to send and receive information that may be vital to the operation of the company when time is a factor. Many corporations have established policies that limit the use that employees e-mails and internet use due to the ramifications that can result in legal action for improper use of the internet for illegal activities such as downloading music and videos. When an e-mail is created, its path is the user’s computer, to the company server, to the receiving server and finally to the user’s computer. This path allows any e-mail to be retained by both servers for future reference as well as to take appropriate actions should an employee be in violation of company policy. Aside from legal action, E-mail can also be used to employee be in violation of company policy....
View Full Document

This note was uploaded on 04/17/2011 for the course IT 205 taught by Professor Kurts during the Fall '08 term at University of Phoenix.

Ask a homework question - tutors are online