Identify improper use of business technology and property.

Identification should include

  • cookie usage (i.e., improper data collection)
  • cyber-bullying
  • pornography
  • invasion of privacy
  • hacking
  • viruses
  • plagiarism
  • Internet censorship
  • data collection practices
  • violation of intellectual property rights, patents, and copyrights through illegal downloading (Digital Millennium Copyright Act and fair use).