Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Use of Email as Court Evidence, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Introduction
According to Oprah Adrianna (2007), Policies in regard to the use of email communications in security management offices are supposed to be taken care of, if the same emails are to be safeguarded against being used as negative legal evidence. Such policies should be best put through in a plan that would involve all the stakeholders in the given office. The policies must be enforced, unlike the general tendencies in most offices where proper policies are formulated but are never enforced mainly because of the general lack of understanding about the value that can be brought about by policies to the organizations.
Email Admissibility and Reliability
According to Louise Townsend (2008), Email, as a form of documentary evidence can be admitted as evidence in a court of law, in a similar manner as the other kinds of documentary evidence. In areas as sensitive as the security offices, its control becomes very vital
The Plan
The plan must begin with the basics on how the said office in organizations handles the what, who, where, when and why questions, as it regards the use of email. In that case, the plan must address the questions like; why is it necessary to put this plan in place? Who does the plan cover? What are the messaging systems covered in the plan? Can personal emails be received or sent? When is the policy plan in use? What is regarded as acceptable email usage? What kind of monitoring will occur? What will happen with the violation of the policy? Where can users go to get more information? Why do you need email policies? (Louise Townsend, 2008)
Email policies can help make users aware of the threats and susceptibilities associated with email, which, in turn, can avoid security breaches and make sure that organizations hold on to regulations. Policies assist in laying the basis. for which all technical and business processes associated to email are carried out. When upper management sets a good example, they help in cultivating a culture in which each person places an importance on email as a corporate asset and endeavors to protect it (Louise Townsend, 2008).
In order that the plan can become a success, it would be critical that a policy committee be formed, which includes people from different departments within the said organization, i.e. legal, operations, Human resources, and upper management. Such participation will ensure that the policies are not necessarily coming from the IT department, thus reduce the chances that the plan will be perceived by the rest of the stakeholders as “just another technical inconvenience” and thus result into0 the other members not taking the policies seriously.
Implementing the Plan
The plan must include development of email policy, management as well as user awareness training. These are the elements that will ensure that the email management plan becomes a success. Increased awareness of the technical and business issues related to the management of the email will help drive forward the policy acceptance and related technologies that might touch on the sensitive issues of security. The overall objective of the plan would be to classify the different kinds of email data, document the creation of the email, its receipt, and email handling and to enable the archiving or deleting of messages. It would therefore be critical to make sure that user awareness training becomes the pivotal point in the plan.
Training of User Awareness
The training of the users as part of the plan will help to communicate secure practices and at the same time promote proper email usage and security in the office. In order to get started with the training, the plan would need that the policy committee strives at keeping the people in that organization posted on the happenings taking place in the organization, and sensitizing the people of the need to be discreet with the sensitive information that would land them or the company in the court of law.
By that, the committee would set the expectations for the users as well as lead by example. Establishing trust with the users will make it certain that the policies in the plan are followed to the letter. During the initiative to train the email users, it will take the form of first going over each and every security policy, in order than everybody understands them. Everyone will also be trained on what to look out for, from the perspective of the security, such as file attachments, odd behaviors on their local computers, and a social engineering description. Moreover, it will be important that the email users knows what to do and what they are not supposed to do in cases involving security matters. That training must be trained well, by the most qualified security consultants.
Creating an Impact
In order that the plan is to become successful, the following list will be used in getting out the message and ensuring that email security awareness stays in the minds of the email users;
- Before a new employee is oriented, he/she will be introduced to the email policies and awareness training
- Distribute a pamphlet of the email survival, bearing FAQs and tips for all employees
- The organization must host periodic lunch as well as learns
- The plan will also entail sending reminder emails and newsletters. Putting on screen savers on the employees’ computers bearing the email security messages will as well go a long way at keeping them reminded at all times of the dangers of failing to keep up with the policies.
- It can also be posted on an intranet website as well as on posters around the security office
- Finally, promotional items like pens, coffee mugs, mouse pads etc. can also keep them reminded of the importance of adhering to the policies.
- In order than the users can comply, email usage will be subjected to monitoring at any time, in which misuse will be assessed by means of content filtering as well as log filtering software and by manual inspection.
- The plan will also entail the clause that anyone who violates the policy will be subject to disciplinary action, which will include termination, and signed to that effect by any new employee that they will comp0ly, to avoid getting on the wrong side with the employment laws.
- In order that the plan remains in place for a long time, its policies will have to be reviewed and re-evaluated at least on a yearly basis, bearing in mind its cost of maintenance, effectiveness and effect on business as well as the technical processes. The policy shall also be revised as needed on the basis of the newly discovered security risks, incidents touching on emails, or the main changes to the organization or systems of information (Oprah Adrianna, 2007).
Such measures will ensure that there are no cases involving improper use of the email that would result to court cases in which the same would be used against the organization. All stakeholders, having understood the importance of maintaining the email-use policies, will embrace the plan and see to it that it becomes a success.
References
Louise Townsend (2008), Email as court evidence, Retrieved, 30th November, 2009, from http://www.out-law.com/page-5537
Oprah Adrianna (2007), The intricacies of Uncontrolled Email Use Journal of Use of Organizational Technology, (13) pp, 54-59
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee