Cyberlaw 101

Written by June Campbell

Continued from page 1

5. If linking to another web site, avoid deep linking and avoid capturingrepparttar other site in your frames. Most web site owners welcome links to their site because links generate traffic and increase their ranking with some search engines. Rarely will an owner complain if you link without permission. However, you are not entirely safe. Legal battles have been fought regarding unauthorized linking. To minimize your chances of running into trouble, make sure you link torepparttar 119308 home page instead of to an inner page and coderepparttar 119309 site to open in a new window instead of within your frames.

6. Create an Internet and email policy for your employees. If your employees are charged with sending harassing emails or distributing copyright MP3 files while at work, for example, you can be held responsible. Having a short email policy stating that your employees must use email in a legally responsible manner can go a long way to protecting you in case of problems.

7. If purchasing packaged content for distribution and publication, be sure you are dealing with a reputable company. There have been instances of companies selling packaged content withoutrepparttar 119310 permission or knowledge ofrepparttar 119311 content creators. This is copyright violation, and you could be putting yourself at risk if you use these materials.

Finally, please remember that these tips should not be construed as legal advice. Consult with legal counsel for matters specific to your own situation.

June Campbell, "How-to" Booklets, Guides, Templates, & eBooks -Business proposals -Business plans, -Joint Venture Contracts... More! Visit to Claim Your FREE GIFT! (


Written by Les C. Cseh

Continued from page 1


By protection, I mean reducingrepparttar chance of someone counterfeiting or altering your checks, as well as reducing your liability when it occurs.

Be aware that is is impossible to prevent fraud. But you can significantly minimizerepparttar 119307 risk using a two-prong approach. It is critical that good procedures related to your check processing are put in place, and that you use a check that is difficult to counterfeit or alter (see sidebar).

* Reconcile your bank statement promptly. Now that bank statements are available online, you can do this as frequently as you feel is necessary for your situation. * Restrict access to your checkbook/check stock. Ensure that only trusted staff that need access have it. * Audit your checks. However, this can be difficult because often checks are removed fromrepparttar 119308 bottom or middle ofrepparttar 119309 book or stack. * Use a custom design. While this isn't an affordable option for many businesses, look into it. The next best thing is to ensure that your check supplier uses comprehensive security features. Remember though that a custom design is not a substitue for security features. * Advise your bank branches' officials ofrepparttar 119310 security features in your checks .. in person or in writing (and keep a copy ofrepparttar 119311 letter on file!). * If you issue a large number of checks, particularly with a low amount (eg. rebate checks), open a separate account and alertrepparttar 119312 bank staff of an upper limit for that account.


Don't take unnecessary chances. The more security you have through procedures and choice of check form,repparttar 119313 less likely that someone will tamper with your checks.

Les C. Cseh is the owner of ASAP Checks, Forms & Supplies, a check printer operating out of Alexandria Bay, NY and Perth Road, Ontario. He can be reached at and at 888-85-CHECK. In addition to a variety of secure checks, the ASAP web site ( offers a non-commercial section related to check processing issues called the MICR Repository.

    <Back to Page 1 © 2005
Terms of Use