Business and industry organizations may also incorporate posts and threaded discussions but often under
a password-protected design on a company’s intranet or other limited-access platform. Employees may
use their business-provided computer equipment to access sites that are not business related (if not
specifically blocked), but all information associated with each business’s computer is subject to
inspection, archival, and supervision.
Every computer is assigned an Internet protocol or IP address. The IP address can be specifically traced
back to the original user, or at least to the computer itself and to who is responsible for its use. From an e-
mail via one of the free sites (e.g., Juno, Google’s Gmail, or Yahoo! Mail) to cloud computing and wikis,
your movements across the web leave clear “footprints.”
Whether you maintain a personal web page or a blog or engage with peers and colleagues via Twitter, take
care when considering what personal information to make public. Privacy is an increasing issue online
and your safety is a priority. Always represent yourself and your organization with professionalism,
knowing that what you search for and how you use your business computer can and often is subject to
inspection.