(NOTE: Each chapter contains Wrap and References.) Acknowledgments. Introduction. Who Needs This Book? Network Managers. Network Department Executives. Executives of Companies Connected to the Internet. 1: Past, Present, and Future. The Primordial Internet. Computers, Commies, TCP/IP, and Unix. The Worm and the Web. The Internet Is Dead; Long Live The Internet. Defining the Problem. MegaNet and Internet Service Providers. Where Do Commercial Services Fit? Success is Killing the Internet. Overloaded Routers, Name Servers, and IP Addresses. More Internet Scrutiny = More Angry People. Netiquette Fails. People Split. Long Live the New Internet. The Internet as Pop Culture Panacea. Information SuperHighway Metaphors Stink. Internet Mutations Ahead. 2. The National Information Infrastructure. Posturing With Technology. NII Goals. Promote Private Sector Investment. Extend the Universal Service Concept. Promote New Applications and Technological Innovation. Promote Seamless, Interactive, User-driven Operation of the NII. Ensure Information Security and Network Reliability. Improve Management of the Radio Frequency Spectrum. Protect Intellectual Property Rights. Coordinate With Other Levels of Government and Other Nations. Provide Access to Government Information and Improve Government Procurement. The NII White Paper and Reactions. Intellectual Property Concerns Part 1. Information Security Questions. The NII as a Jobs Program. 3. Paying For Our Internet Addiction. Paying For the New Internet. How It Was. Replacing Government Funding. Internet Access as a Right of Citizenship. Will America Online Become The Internet Model? Centralized Internet Measured Service Billing. Taxes On Internet Access. Internet Phones Will Cause Regulatory Hassles. Buy Domain Names Today, Buy What Tomorrow? Domain Name Hijinks. Advertising on the Ether. 4. The International Internet. The World Part Of The Wide Web. We Don't Need No Stinkin' Borders. Conspiracy Fun and Games. Governments Attempt to Control the Internet. 5. Managing Internet Expectations Beware the Backlash. Focus on the Business Advantages of Internet Access. E-mail. Communication within the company. Communication with customers. Communication with suppliers. Technical computing information. Structure Internet Introduction to Department Needs. Sales. Marketing. Accounting. Human resources. Manufacturing. Research and development. Executive management. Training for Internet Access. Structured Training Methods. Informal Training Methods. Power Users to the Rescue. Explaining Your Company's Acceptable Use Policy. Management Must Support The Acceptable Use Policy. No Winks And Nudges Allowed. 6. Employee Rules and Internal Politics. Management Expects Focus on Business. At-Will Working Conditions. Your Workplace and Civil Rights. Censorship versus Business Restrictions. Information is Power. Access Means Advantage. Defusing A Haves Vs. Have-Nots Struggle. Fair Internet Access Principles. Handling Exceptions. Convincing Employees to Behave. Log Everything. Handling Pornography and Hate Speech In The Workplace. The Breakroom Rule. Spouting Inappropriate Statements As a Company Agent. 7. Employee Monitoring and Control. Employee Monitoring and Searching is Legal. First Stop: the Mailroom. Next Stop: the Telephone. Last Stop: the Network. E-mail is Not Private. E-Mail Archives and the Courts. 8. Internal Computer Security. Forget Hackers, Your Bigger Security Problem is Inside. Lessons from Retail. What's In Must Stay In. Security Policy Must Be Understood. Hackers Are Getting Smarter and More Mercenary. Password Parables. Social Engineering and Security. Desktop Servers Mean the Death of Security. Virus Safeguards. More Internet Connection Means More Virus Problems. 9. The Internet and Free Speech. Internet Culture no Longer Restrains Participants. The Internet Becomes Unruly. Flame Wars, Crossposting, and Spamming. Canter and Siegel. Flames Grow Into Defamation. Public Figures and the Internet. The "Politically Correct" Quagmire and the Internet. You Say It, You Sign It. User Naming Conventions. Anonymous Remailers. Avoid Responding From Work. "Censorship" From All Angles. Convictions Bordering On Fanaticism. Can Netiquette Stop The Debate? Dealing With The Right. Dealing With The Left. Supporting The Middle. Ten Computer Commandments. Your Newsgroup Policy. Why Read Newsgroups. Newsgroup Etiquette. Flames With The Company In The .Sig. 10. Will Madison Avenue Determine Internet Content? Commercial Web Sites Explode. Applying Marketing Ethics (Marketing Ethics?) To The Internet. Judging Web Contents Value. Your Users and Advertising. Advertisements People Pay For. Via E-mail. Via Newsgroups. 11. Rating Web Pages. The Ethical Angle of Ratings. Active Rating Options. Who Implements The Ratings? Will Netiquette Carry The Day? The Legal Angle of Ratings. What's The Penalty For Non-Compliance? Can The Authorities Keep Up? 12. 19th Century Laws vs. 21st Century Technology. Cyberporn, Intersmut, and Hate Speech. What's Legal On Paper. What's Legal on the Internet. The Telecommunications Reform Act of 1996. Cable TV. InterSmut and CyberPorn. Universal Service and Video Dial Tone. Media Ownership. Long Distance and Local Telephone Service. Broadcast Spectrum. The V-Chip. Clean Monopolies No More. Communications Decency Act. What the Communications Decency Act Includes. Ongoing Legal Challenges. Applying Existing Obscenity Laws To The Internet. Which Community is the "Standard" Community? How Liable Are ISPs and Connected Companies? Enforcement Problems Abound. The Court Decision. Politics from the Politicians. Will Washington Ruin The Internet? Pending Laws On Pornography, Free Speech, And Copyright. The Internet Forces California Voting Changes. 13. Does Intellectual Property Protect Anything in Cyberspace? Patents, Trademarks, and Copyrights. Patents. Trademarks. Copyrights. NII White Paper Attempts New Law. "Tangible Medium of Expression". The Your Rights From the First Sale Doctrine. Fair Use-the Blurry Line. The Far Side of the Blurry Line. Copyright Rules of the Future? International Considerations. Domain Names are Now Valuable. The Domain Name Land Rush. Copyright and Trademark Tests Enforced. Finding Experts in Cyberlaw. 14. Avoiding Discrimination Lawsuits. Preventing Hostile Workplace Hassles. Sexual Harassment Conditions. Title VII and "Reasonable" People. Company Protection Against Unreasonable People. 15. Politics For Internet Service Providers. Are ISPs Responsible for Every Copyright Flowing Across their Network? ISP Liability. ISP, Online Service, BBS-What's the Difference? Internet Service Providers. Online Services. Bulletin Board Systems. What Model Do We Use for Regulation? Broadcaster. Press. Republisher. Public Forum. Physical Bulletin Board. Mail. Common Carrier. Implied License. Action After Awareness. Is E-mail Filtering Next? Should ISPs Lobby In Self-Defense? How? Will Bill Gates, Robert Kavner, or Lou Gerstner Ever Be Arrested? Unmasking The Cowards. 16. Politics For Content Providers. Intellectual Property and the Content Provider. Web Implied License for Viewers. Protecting Your Web Contents. Learning From Other Web Sites. Get Permission for All Pieces of Your Web. Publish With Perplexed Permissions: A Tale of Copyright and the Web. Contractors and Your Web Copyright. Obscenity and the Content Provider. You Know It When You See It. 17. Defining Your Acceptable Use Policy. Current State of Corporate Acceptable Use Policy Implementation. Reasonable Acceptable Use Policy Guidelines. Legal Ramifications Of Your Acceptable Use Policy. Acceptable Use Policies and Employee Termination. Good Cause. E-mail Monitoring. Writing Your Acceptable Use Policy. Scope and Overview. E-mail. World Wide Web. Newsgroups. Internet Relay Chat Channels and Multi-User Domains. Your Actions Are Monitored. Consequences of Misuse. Your Signature, Please. Acceptable Use Policy Examples. Internet User Companies. Use of the NASA Internet must be in Support of Official NASA Programs. Privacy. Sexual Harassment and Discrimination. Trade Secrets and Confidentiality. Employee Productivity. Other Human Resource Issues. Internet Service Providers. Internet America Acceptable Use Policy. Appropriate Use Policy for OnRamp Technologies, Inc. Acceptable Usage of PPP Accounts. Inactivity and Disconnect Inactivity Policy. Usenet Policy and Acceptable Posting Procedures. Customer Responsibility and Cooperation. Acceptable Use Of Onramp Web Servers and Restrictions. Notes From Other ISPs. Other Company Policies. Security Policy. Software Protection Guidelines. Sample Corporate Policy Statement. 18. Overview of Control Options. The Acceptable Use Policy Committee. Choosing Committee Members. The First Meeting Demonstration. The Acceptable Use Policy Committee's Mandate. Who Disciplines Policy Violators? Tracking Systems Overview. Firewalls. Proxy Servers. PC LAN To Internet Gateways. WebTrack. Children's Protective Software Will Become Corporate. Mixed Systems Will Be Common. 19. Using Firewalls and Proxy Servers to Control Your Network. Keeping Outsiders Out. Keeping Insiders In. Blocking Access to Internet Web Sites. Blocking Access To Newsgroups. Blocking Access By Time. Logging Internet Activity. 20. Using Internet Gateways to Control Your Network. Keeping Outsiders Out. Keeping Insiders In. Blocking Access to Internet Web Sites. Blocking Access To Newsgroups. Blocking Access By Time. Logging Internet Activity. Glossary.