Skip to main content

Home/ English 102 Research Convergence: Fall '11 (27242)/ Group items tagged protection

Rss Feed Group items tagged

Mellitta Benning

The McAfee Advantage | McAfee - 0 views

  •  
    McAfee is a good example of an anti-virus protection. I can use this to give example of what some firewalls protect against.
Mellitta Benning

Social Networking by Employees: Is It Any of Your Company's Business? - 0 views

  • There are federal laws in place that control aspects of monitoring employee activity on the Internet, as well as common law and even Constitutional protections in some jurisdictions (such as California) that protect privacy.
  • Confidentiality — Intentionally or unintentionally, network exchanges may reveal confidential company information, as well as confidential information of a company’s customers or clients. Such information could even include trade secrets that a company or its customers/clients have gone to great lengths to protect.
  •  
    This article gives a break down of what the laws are with social networking . Also gives a little information on what the issues are with social networking in a business such as discrimination, time management etc...
Mellitta Benning

Small Businesses Embrace Social Media Background Checks | Fox Small Business Center - 0 views

  •  
    This is jaut a counter arguemnt of the hiring process by business using the social netwrok... There are laws in place to protect people and buisness could be breaking that law
Mellitta Benning

Businesses should consider a social media policy - New Philadelphia, OH - The Times-Rep... - 0 views

  •  
    why business should join the social network but also consider a social media policy to protect the business...
Mellitta Benning

Antivirus Protection | What is a Computer Virus | Microsoft Security - 0 views

  •  
    security for computers and what is a virus.
Mellitta Benning

http://www.pwc.com/en_US/us/it-risk-security/assets/security-social-networking.pdf - 0 views

  •  
    Lots of information on how business can protect personal information from being exsposed on the social network. This report also gives pointers on how the social networl can be utilized to help the business and employees
Billy Gerchick

Narrative of the Life of Frederick Douglass - 0 views

  • The master is frequently compelled to sell this class of his slaves, out of deference to the feelings of his white wife; and, cruel as the deed may strike any one to be, for a man to sell his own children to human flesh-mongers, it is often the dictate of humanity for him to do so; for, unless he does this, he must not only whip them himself, but must stand by and see one white son tie up his brother, of but few shades darker complexion than himself, and ply the gory lash to his naked back; and if he lisp one word of disapproval, it is set down to his parental partiality, and only makes a bad matter worse, both for himself and the slave whom he would protect and defend.
Mellitta Benning

What are Trojan horses (Trojans), and what damage can they do to my system? - 0 views

  •  
    Trojans..what are they? How do you get them? what do they do to your computer?
Amela Duric

Fashion Bullies Attack -- In Middle School - 0 views

  •  
    Fashion can be a quick way to make judgment on a person, & in this article it show that it can start as young as middle school. Although some kids may have designer filled wardrobe, it doesn't protect them from being a victim.
Amela Duric

Organic Fashion - 0 views

  •  
    How material is produced, with natural dyes, & etc. The price, & reasoning on why they want to protect the environment with clothing.
Reyna Martinez

Patient Protection and Affordable Care Act - Wikipedia, the free encyclopedia - 0 views

  •  
    This website informs you on your legal rights as part of the Health Care Reform. It explains what changes will occur, what options you have as an insured and income tiers that will determine what health programs you can be eligibile for.
1 - 11 of 11
Showing 20 items per page