Cyberspace and Insurance | ||
|
||
|
||
Risk management checklist Computer system Written agreements Written agreements should be signed with independent contractors who contribute in any way to media content. These agreements should specify that all aspects of any work performed for the client is made "for hire" for the client and the client has all rights to the work. Agreements should require the contractor to be insured against 3rd party direct or indirect loss due to their actions or of any other party within their control. The agreements should also hold harmless the client against any infringement of patent, copyright, or trade dress, created in whole or in part by the independent contractor. The agreements should hold harmless the contractor from infringement issues created by use of trademarks, service marks, or material reproduced from an outside source at the request of the client. The written license agreements for all software or other media content purchased must clearly allow the assignment of cyber-publishing rights to the client. These rights include rights to store, reproduce, or permit copying in online, digital print format. Online content Have outside or in-house legal counsel review content of online material prior to publication, looking for: For chat rooms, post a prominent user agreement on the boot screen. Clearly insist that the chat room participant does not pre-screen, censor, or edit messages posted by users. Reserve the right to terminate or suspend users privileges. Chat room participants should be clearly directed not to: Include a hold harmless clause and limitation of liability in favor of the provider, and warn users that the provider takes no responsibility for content that is upsetting, defamatory, or morally reprehensible. The chat room host should have a predetermined response system in place for complaints posted by users about derogatory or defamatory material or material claiming to be copyright infringement. Intranet users Employee access guidelines, similar to Internet user guidelines, should be provided. Provide strong electronic security. Post notice that any and all information or material posted or transmitted on the Intranet is at the sole discretion of the employer. The employer reserves the right to remove, change, or edit any material, and the employee agrees that such an act would not be a violation of privacy. Warehousing and distribution operations Review the company's shipping procedures. Are they all done by computer? What audit procedures are in place to discover fraud from hackers or impersonation? If located only in the U.S. but shipping worldwide, review shipping contracts and talk to a lawyer skilled in corporate law as regards international shipping terms. Internet use policy Develop and implement a comprehensive Intranet, Extranet, and Internet policy for the workplace. It would be good to have an Internet use policy for employees as part of employee handbook that includes: Cyberlaw Review whether any product sales violate local, state, federal, or international law. Consider site jurisdiction as well as end user jurisdiction, for example: Cyberspace audit Conduct a cyberspace audit of Internet systems: Registration issues Ensure that proper registration is taken care of: Key elements of an email risk management program Employees should consistently apply the company's information management policies regarding emails. The company's guidelines should be to: An email management program might include: Remember that voicemails and Websites are electronic records. Websites and different versions of Websites must be maintained pursuant to records management policies. Websites are fast becoming the subject of discovery, hence the need for considering records retention policies for Websites. In dealing with electronic records retention matters, don't forget "spoliation" issues, which concerns the intentional destruction of documents. Spoliation liabilities may result from unauthorized destruction of electronic records that should have been kept to satisfy discovery requirements. Encrypted email can create real problems in discovery if, for example, a company is unable to decrypt encrypted email. |
||
Next Page >
|
||
| ||
© Copyright CEfreedom.com and Insurance Skills Center. All Rights Reserved. |
||
Not only are policy forms, clauses, rules and court decisions constantly changing, but forms vary from company to company and state to state. This material is intended as a general guideline and might not apply to a specific situation. The authors, LunchTimeCE, Inc., CEfreedom, and Insurance Skills Center, and any organization for whom this course is administered will have neither liability nor responsibility to any person or entity with respect to any loss or damage alleged to be caused directly or indirectly as a result of information contained in this course. |