Identify improper use of business technology and property.
Identification should include
- cookie usage (i.e., improper data collection)
- cyber-bullying
- pornography
- invasion of privacy
- hacking
- viruses
- plagiarism
- Internet censorship
- data collection practices
- violation of intellectual property rights, patents, and copyrights through illegal downloading (Digital Millennium Copyright Act and fair use).