Plus d’un million de livres à portée de main !
Bookbot

Stephen Mason

    Email, Social Media and the Internet at Work
    When Bank Systems Fail
    Electronic Signatures in Law
    The Leaders Within: Engagement, Leadership Development, and Succession Planning
    • The Leaders Within: Engagement, Leadership Development, and Succession Planning presents an integrated model for creating an organizational infrastructure in which leadership development acts as a funnel for succession planning. When they follow this guidance, readers can enhance their organization's learning, leadership, and longevity. The authors draw on their real-world experience in a large health system to define the three unique roles in creating a successful leadership development and succession planning program: the Visionary, who helps the organization and its employees see their future potential; the Architect, who oversees the actual implementation of the program; and the Board Advocate, who secures the governing boards support for the process. Readers will recognize which role they personally play and gain a deeper understanding of how their organization can embed leadership development and succession planning in its DNA.

      The Leaders Within: Engagement, Leadership Development, and Succession Planning
    • Electronic Signatures in Law

      • 478pages
      • 17 heures de lecture

      Focusing on the concept of electronic signatures, this fourth edition explores their various forms and the complexities surrounding their legal validity. It delves into the evidentiary challenges associated with electronic signatures, providing insights through analysis of pertinent case law and legislation from diverse common law and civil law jurisdictions. This comprehensive examination serves as a valuable resource for practitioners navigating the evolving landscape of electronic documentation.

      Electronic Signatures in Law
    • When Bank Systems Fail

      • 206pages
      • 8 heures de lecture

      Paal Oiestad's credit card was stolen in 2008 in Rome, and over Nok 50,000 taken. The PIN was not written down, because it had been committed to memory. The bank claimed, without any evidence, that he was grossly negligent by keeping the PIN with the card. The Norwegian Complaints Board and the District Court agreed with the bank. Mr Oiestad was labelled a liar. While waiting for the appeal hearing, the bank wrote to him in June 2012, admitting it was wrong. The aim of this book is to help you deal with your bank if anything like this should happen to you. The interconnected world of online, mobile and ATMs is a ripe hunting ground for thieves. Protecting your rights if you are a victim can be difficult, especially if the banks suspect you have been involved. Stephen Mason is a renowned expert on electronic evidence. Here for the first time, he has provided the information and the tools with which to protect yourself."

      When Bank Systems Fail
    • An updated edition of an excellent guide for professionals involved in IT security, law and in personnel issues relating to the computer in the world of work. Social media has made this a minefield and this new edition contains a simple to use well drafted model policy. Contents: Chapter 1 Networked communications in context Chapter 2 The liability Chapter 3 Types of misuse Chapter 4 Liability and employees Chapter 5 Operational liability Chapter 6 Monitoring networked communications Chapter 7 Personal data: workers, customers and security Chapter 8 Evidence Chapter 9 Content of the networked communications policy Chapter 10 Operational implementation of the policy Chapter 11 Check list for the network communications use policy Appendix 1 Further examples of misuse of networked communications Appendix 2 Sample email, social networking and internet use policy

      Email, Social Media and the Internet at Work