Why is monitoring important?
Computers
To control access to confidential client data.
To detect the unauthorized downloading of software.
The Internet
E-mail
Phone/voice mail
Be upfront
(Information in this article should not be construed as legal advice.)
Ted Baker is the president of Advan-ced Automation, which for 17 years has offered agency-consulting services addressing a variety of management and agency development issues. He also is an author and frequent conference speaker. Ted can be reached at [email protected] .
Want to continue reading?
Become a Free PropertyCasualty360 Digital Reader
Your access to unlimited PropertyCasualty360 content isn’t changing.
Once you are an ALM digital member, you’ll receive:
- Breaking insurance news and analysis, on-site and via our newsletters and custom alerts
- Weekly Insurance Speak podcast featuring exclusive interviews with industry leaders
- Educational webcasts, white papers, and ebooks from industry thought leaders
- Critical converage of the employee benefits and financial advisory markets on our other ALM sites, BenefitsPRO and ThinkAdvisor
Already have an account? Sign In Now
© 2024 ALM Global, LLC, All Rights Reserved. Request academic re-use from www.copyright.com. All other uses, submit a request to [email protected]. For more information visit Asset & Logo Licensing.