Papers

Research and Policy Papers on Filtering 

This section is intended as a comprehensive index of research, policy, and legal papers on filtering software created by government entities, filtering companies, advocacy groups, academic publications, and other organizations.   The papers are divided into eight general areas:
Education – Research on the impact of filtering on educational environments
Governments – Research about the use of filtering software by national governments
Industry Analyst Research papers on the filtering industry by industry analyst firms such as Gartner and IDC
Legal Papers on the legal implications of filtering software
Research Papers that focus on design and effectiveness of filtering software
Society & Policy Papers that focus on the societal and policy impacts of filtering software
Security – Papers that focus on the use of filtering software in information security
Vendor White Paper White papers by filtering software vendors, generally focusing on specific filtering technology
Workplace  Papers that examine the use of filtering software in the workplace. 

 For a pdf version of this database, click here. 

Date Publisher Title Summary
    Education  
2003 National Telecommunications and Information Administration Children’s Internet Protection Act Study of Technology Protection Measures NTIA’s report concludes that the currently available technology measures have the capacity to meet most of the needs and concerns of educational institutions. 50 pages.
2001 Consortium for School Networking Safeguarding the Wired School House: A Briefing Paper on School District Optionsfor Providing Access to Appropriate Internet Content Overviews the various options, including filtering, for protecting children from inappropriate Internet content in public schools.
2000 Electronic Privacy Information Center Mandated Mediocrity:Blocking Software Gets a Failing Grade This report examines a software filtering product called “Bess,” manufactured by N2H2, Inc. The purpose of this report is to determine whether the software, as used in a typical school setting, blocks access to political and educational webpages that are appropriate for schoolchildren.  5 pages.
    Governments  
2008 Northern College of Leeuwarden Filtering of child pornography on the Internet : An exploration of techniques and regulations at home and abroad (Automatic English translation here) This project has as objective to the Lower House about whether the application of technical ability to block, filter or shutdown of child pornography on the Internet “useful and effective” and may also involve the experiences that are in some other countries have gained.  In the wake of this objective is what legal possibilities and opportunities for self-regulation there.
2006 Open Net Initiative Internet Filtering in Vietnam in 2005-2006 This study by the OpenNet Initiative (ONI) finds that the Vietnamese state attempts to block citizens from accessing political and religious material deemed to be subversive along various axes. 55 pages.
2006 First Monday The filtering matrix: Integrated mechanisms of information control and the demarcation of borders in cyberspace Documents the increasing prevalence of use of filtering software by governments, and the associated free speech problems. 21 pages.
2005 Open Net Initiative Internet Filtering in Tunisia in 2005: A Country Study The Tunisian Republic implements an Internet filtering regime that aggressively targets and blocks substantial on-line material on political opposition, human rights, methods of bypassing filtering, and pornography. 26 pages.
2005 Open Net Initiative Internet Filtering in Singapore in 2004-2005: A Country Study In our testing, the OpenNet Initiative (ONI) found extremely minimal filtering of Internet content in Singapore, as only eight sites of 1,632 tested (.49%) were blocked.  22 pages
2005 Open Net Initiative Internet Filtering in the United Arab Emirates in 2004-2005: A Country Study The UAE uses the SmartFilter filtering software to block nearly all pornography, gambling, religious conversion, and illegal drugs sites tested. The state also blocks access to all sites in the Israeli top-level domain.  35 pages.
2005 Open Net Initiative Internet Filtering in Iran in 2004-2005: A Country Study Iran has adopted one of the world’s most substantial Internet censorship regimes. Iran, along with China, is among a small group of states with the most sophisticated state-mandated filtering systems in the world. 29 pages.
2005 Open Net Initiative Internet Filtering in China in 2004-2005: A Country Study China’s Internet filtering regime is the most sophisticated effort of its kind in the world. Compared to similar efforts in other states, China’s filtering regime is pervasive, sophisticated, and effective. It comprises multiple levels of legal regulation and technical control. 59 pages
2005 Open Net Initiative Internet Filtering in Burma in 2005: A Country Study The OpenNet Initiative (ONI) tested its global list of Web sites and a high-impact list of sites with material known to be sensitive to the Burmese state. On the global list, we found nearly 11% of pages tested blocked.  25 pages.
2005 Open Net Initiative Internet Filtering in Bahrain in 2004-2005 The OpenNet Initiative’s (ONI) testing of more than 6,000 targeted sites revealed only eight sites blocked from those seeking access from within Bahrain. 19 pages.
2005 Open Net Initiative Internet Filtering in China in 2004-2005 Documents the scope and pervasiveness of  Internet filtering in People’s Republic of China.  59 pages.
2004 Open Net Initiative Internet Filtering in Saudi Arabia in 2004 The Kingdom of Saudi Arabia controls the information its citizens can readily access on the World Wide Web through a sophisticated filtering system that draws upon commercial software from the United States.  35 pages.
    Industry Analyst  
2007 Gartner Magic Quadrant for Secure Web Gateway, 2007 Secure Web gateway solutions protect Web-surfing PCs from infection and enforce company policies. Incumbent providers have been slow to respond, while new vendors are struggling to get the product mix right.
2006 IDC Content Filtering: Multiple Layers of Threat Protection An overview of the trends driving the adoption of e-mail and web filtering as well as antispyware software.
2005 IDC The Evolution of Content Filtering: Multiple Layers of Threat Protection The recent onslaught of blended threats not only highlights the importance of content filtering, it also shines a spotlight on the growing need for multiple layers of protection
2005 IDC Worldwide Secure Content Management 2005-2009 Forecast Update and 2004 Vendor Shares Provides market share data and market analysis of the content security market, including web filtering.
2004 IDC Thinking Inside the Box: Benefits of an Internet Filtering Appliance This white paper describes the implementation and management issues of traditional software security solutions and discusses the critical elements that make for lower cost and easier-to-manage Internet filtering solutions.
2003 IDC Content Security: The Business Value of Blocking Unwanted Content – The top methods and technologies corporations need to stop unwanted content and manage Internet risks.
2003 IDC Employee Internet Management 2001: Getting More out of Less This white paper focuses primarily on Internet Access Management in the corporate market, and briefly addresses its use in the home and education markets.
2003 IDC Worldwide Secure Content Management Software Market Forecast and Analysis, 2002-2006: This IDC bulletin examines the SCM market and leading market vendor performance for 2001 and provides a forecast for the market through 2006.
2003 Ovum The Role of Information Filtering in Raising Business Efficiency: The Web is bringing new opportunities to businesses, but it can easily be misused.
    Legal  
2008 Bloxx Guide to Web Access Management What are the legal implications of Web Filtering? How can I be sure that I am compliant and protected? The Guide to Web Access Management in the UK will set you on the right path.
2004 Open Net Initiative A Starting Point: Legal Implications of Internet Filtering “Considers some of the legal implications of controlling access to Internet content through filtering. ” 17 pages.
2004 First Monday Lawfully Surfing the Net: Disabling Public Library Internet Filters to Avoid More Lawsuits in the United States Discuss the legal and public policy implications of filtering policies regarding disabling filter in public libraries in light of CIPA.  32 pages
2004 First Monday Potential legal challenges to the application of the Children’s Internet Protection Act (CIPA) in public libraries This paper discusses potential problems related to the implementation of CIPA that could affect the exercise of free speech in public libraries. It also suggests possible legal challenges to the application of the law. 24 pages.
2003 First Amendment Center Internet Filters and Public Libraries Discusses the legal, policy, and technological context of filtering in libraries in the aftermath of the US Supreme Court decision ALA v. U.S. 20 pages
2003 Concerned Women for America Library Procedures for Disabling Software Filtering and Unblocking Web Sites Discusses the legal practicalities for libraries implementing CIPA, including unblocking and disabling web filters.
2003 Cato Institute United States v. American Library Association: A Missed Opportunity for the Supreme Court to Clarify Application of First Amendment Law to Publicly FundedExpressive Institutions Argues that existing legal doctrines such as  public forums and unconstitutional conditions are not adequate to address the legal issues surrounding the use of filtering software in public libraries.
2002 ACLU Censorship in a Box: Why Blocking Software is Wrong for Public Libraries “Provides an in depth look at why mandatory blocking software is both inappropriate and unconstitutional in libraries.” 6 pages
2002 Fordham Law Journal Like A Sieve: The Child Internet Protection Act and Ineffective Filters in Libraries “Analyzes the constitutional implications of CIPA and shows how the statute runs afoul of both the First and Fourteenth amendments.” 
2002 ACLU Fahrenheit 451.2: Is Cyberspace Burning? Originally published in 1997 and updated in 2002, this paper examines the various potential threats to Internet free speech, including filtering software.  11 pages.
1999 Family Research Council Filtering and Blocking Technology: The Most Effective Methods of Protecting Children from Internet Pornography Documents the problem of children being exposed to Internet pornography, and argues that filtering software is a key part of the solution. 18 pages
1998 Harvard Law School What Things Regulate Speech: CDA 2.0 vs. Filtering Discuss the legal landscape and advisability of filtering software versus government regulation.
    Libraries  
2008 San Jose Public Library Report to San Jose City Council Rules Committee Options and Staff Report relating to Internet Filtering Proposal and Computer Use at San José Public Libraries
2005 Public Library Association Plain Facts About Internet Filtering Software Overview of filtering technologies and their limitations in a public library setting.  15 pages.
2005 ACLU Reader’s Block: Internet Censorship in Rhode Island Public Libraries Assess the state of Internet filtering in Rhode Island public libraries, including the results of a survey.  21 pages.
2004 Information Use Management & Policy Institute Public Libraries and the Internet 2004: Survey Results and Findings Overall, the survey results show high levels of public access computing in public libraries but signs of cracks in the quality of service and the ability to sustain programs.  Nearly 40% of all public libraries filter their public access Internet connectivity in some way.  119 pages
2004 First Monday Lawfully Surfing the Net: Disabling Public Library Internet Filters to Avoid More Lawsuits in the United States Discuss the legal and public policy implications of filtering policies regarding disabling filter in public libraries in light of CIPA.  32 pages
2004 First Monday Potential legal challenges to the application of the Children’s Internet Protection Act (CIPA) in public libraries This paper discusses potential problems related to the implementation of CIPA that could affect the exercise of free speech in public libraries. It also suggests possible legal challenges to the application of the law. 24 pages.
2003 First Amendment Center Internet Filters and Public Libraries Discusses the legal, policy, and technological context of filtering in libraries in the aftermath of the US Supreme Court decision ALA v. U.S. 20 pages
2003 Concerned Women for America Library Procedures for Disabling Software Filtering and Unblocking Web Sites Discusses the legal practicalities for libraries implementing CIPA, including unblocking and disabling web filters.
2003 Cato Institute United States v. American Library Association: A Missed Opportunity for the Supreme Court to Clarify Application of First Amendment Law to Publicly FundedExpressive Institutions Argues that existing legal doctrines such as  public forums and unconstitutional conditions are not adequate to address the legal issues surrounding the use of filtering software in public libraries.
2002 ACLU Censorship in a Box: Why Blocking Software is Wrong for Public Libraries “Provides an in depth look at why mandatory blocking software is both inappropriate and unconstitutional in libraries.” 6 pages
2002 Fordham Law Journal Like A Sieve: The Child Internet Protection Act and Ineffective Filters in Libraries “Analyzes the constitutional implications of CIPA and shows how the statute runs afoul of both the First and Fourteenth amendments.” 
2002 ACLU Fahrenheit 451.2: Is Cyberspace Burning? Originally published in 1997 and updated in 2002, this paper examines the various potential threats to Internet free speech, including filtering software.  11 pages.
2000 Family Research Council Dangerous Access, 2000 Ed: Uncovering Internet Porn in America’s Libraries Research report documenting incidents of pornography in libraries, and recommending the use of filtering software.  65 pages.
2000 Tacoma Public Library Internet Use at the Tacoma Public Library: Our Findings and Experience This paper offers data collected in the course of day-to-day use of the Internet in all ten branches of the Tacoma Public Library, covering the period from October 1, 1999, to June 30, 2000. 19 pages.
1999 Family Research Council Filtering and Blocking Technology: The Most Effective Methods of Protecting Children from Internet Pornography Documents the problem of children being exposed to Internet pornography, and argues that filtering software is a key part of the solution. 18 pages
    Research  
2007 Progress & Freedom Foundation Parental Controls and Online Child Protection: A Survey of Tools and Methods Survey of technologies for protecting children, including TV, Movies, the Internet, and video games.  139 pages.
2006 VISAPP 2006: Proceedings Large scale image-based adult-content filtering This paper presents a practical and scalable method to efficiently detect many adult-content images, specifically pornographic images.
2006 Brennan  Center for Justice at NYU School of Law Internet Filters: A Public Policy Report “A detailed survey of tests and studies documenting how the widespread use of filters limits the free exchange of ideas necessary in a healthy democracy. The report shows that filters are an unreliable and inefficient means of preventing children.” 87 pages.
2005 University of Cambridge Failures in a Hybrid Content Blocking System A British ISP has deployed such a system to prevent access to child pornography. However, circumvention techniques can now be employed at both system stages to reduce effectiveness; there are risks from relying on DNS data supplied by the blocked sites and unhappily, the system can be used as an oracle to determine what is being blocked.  15 pages
2005 Universidad Europea de Madrid Named Entity Recognition for Web Content Filtering We have developed a lexical Named Entity Recognition system, and used it to improve the effectiveness of statistical Automated Text Categorization methods. We have performed several experiments that confirm this fact, and encourage the integration of other shallow linguistic processing techniques in intelligent Web content filtering.
2004 Multimedia and Expo, 2004. ICME Blocking Objectionable Images: Adult Images and Harmful Symbols This paper describes a practical objectionable image filtering system, aimed at children’s safer Web access. It includes two image filters: adult image filter and harmful symbol filter. In the adult image filter, we adopt a statistical model for skin detection and a neural network for adult image classification.
2004 Communications of the CACM Calculating Error Rates for Filtering Software This paper presents a framework to guide the design and interpretation of evaluation studies. While the framework applies with only minor modifications to evaluation of spam filters, the examples and discussion here focus on pornography filters. 13 pages.
2003 School of Information TechnologyUniversity of Wollongong Web Filtering Using Text Classification In this paper we review a number of existing approaches and point out the shortcomings of each. We then propose a Web filtering system that uses text classification approach to classify Web pages into desirable and undesirable ones, and propose a text classification algorithm that is well suited to this application.
2003 Università degli Studi di Milano Bicocca On the detection of pornographic digital images The paper addresses the problem of distinguishing between pornographic and non-pornographic photographs, for the design of semantic filters for the web.
2003 National Telecommunications and Information Administration Children’s Internet Protection Act Study of Technology Protection Measures NTIA’s report concludes that the currently available technology measures have the capacity to meet most of the needs and concerns of educational institutions. 50 pages.
2002 Intelligent Systems, IEEE Neural networks for web content filtering We propose using artificial neural networks to classify Web pages during content filtering. We focus on blocking pornography because it is among the most prolific and harmful Web content. However, our general framework is adaptable for filtering other objectionable Web material.
2002 National Research Council Youth, Pornography, and the Internet Extensive research and analysis report on the problem of protecting children from Internet pornography.  445 pages.
2002 Electronic Frontiers Foundation Blacklisting Bytes EFF’s thesis is simple: The quest for a technical solution to the alleged problem of minors’ access to “harmful” material on the Internet is both misguided and dangerous to civil liberties.
2000 University of British Columbia Controlling Access to the Internet: The Role of Filtering Overview of efforts to rate and filter the Internet.
2000 University of Pennsylvania Cyberporn, Filters, and Public Policy: A Content Analysis Research Proposal Discusses the problems associated with conducting filtering research, and proposed solutions.  39 pages.
2000 Electronic Privacy Information Center Mandated Mediocrity:Blocking Software Gets a Failing Grade This report examines a software filtering product called “Bess,” manufactured by N2H2, Inc. The purpose of this report is to determine whether the software, as used in a typical school setting, blocks access to political and educational webpages that are appropriate for schoolchildren.  5 pages.
2000 Commission on Child Online Protection COPA Commission Report to Congress Detailed report by a congressionally appointed commission of industry experts on Internet safety for children.   95 pages.
1999 Censorware Project Passing Porn, Banning the Bible N2H2’s Bess in public schools Bess is made by N2H2, who also makes Searchopolis. Our analysis shows that not only does the software block a great many valuable webpages, but also allows through a startlingly large amount of pornography. 8 pages.
1999 University of Pennsylvania  Filtering the Future?: Software Filters, Porn, Pics, and the Internet Content Conundrum Master’s thesis on the practicality of filtering and rating systems, and their impact on civil liberties. 212 pages.
1998 Censorware Project Protecting Judges Against Liza MinnelliThe WebSENSE Censorware at Work Like all other censorware we have examined, WebSENSE contains numerous bad blocks. Contrary to the marketing claims, clearly no human being examined these sites before they were added to the blacklist. 5 pages.
1998 Censorware Project The X-Stop Files: Deja Voodoo Examination of the flaws of X-Stop filtering software.  22 pages.
1997 Censorware Project Blacklisted by Cyber Patrol: From Ada to Yoyo Our conclusion is that Cyber Patrol blocks a great many sites which do not deserve to be, and that furthermore, looking at past reports of the product’s accuracy, fixing these errors is a low priority.  12 pages. 
    Vendor White Papers  
2006 IDC Content Filtering: Multiple Layers of Threat Protection An overview of the trends driving the adoption of e-mail and web filtering as well as antispyware software.
2005 IDC The Evolution of Content Filtering: Multiple Layers of Threat Protection The recent onslaught of blended threats not only highlights the importance of content filtering, it also shines a spotlight on the growing need for multiple layers of protection
2007 Secure Computing In today’s Web 2.0 environment, proactive security is paramount. Are you protected? This paper outlines those new threats, discusses the limited effectiveness of legacy Web security solutions against those threats, and outlines a new proactive security paradigm that is necessary for securing Web 2.0
2007 Fortient The Importance of FortiGuard Web Filtering as part of a Multi-Threat Security System To address network and web based threats, Fortinet offers several technologies to help customers secure their corporate networks.
2007 Websense Phishing and Pharming: Providing multi-layered, enterprise-wide protection from phishing and pharming exploit Organizations and their employees are increasingly targeted in phishing attacks.  This paper describes phishing and pharming and explains how Websense® software can be used to combat them.
2007 SurfControl Raising the Level of Protection Against Today’s More Complex Internet Threats As Internet-borne threats proliferate and evolve at an unprecedented rate, even the most diligent company can have their defenses penetrated by one unanticipated threat.
2005 Websense Avoiding the Newest Security Threats FromWeb-Based Attacks Recent web-based attacks illustrate clearly the inadequacies of most existing security measures. This paper examines some of these recent threats in detail and explains how Websense software can be used to combat them.
2005 St. Bernhard Filtering the Spectrum of Internet Threats: Defending Against Inappropriate Content, Spyware, IM and P2P at the Perimeter Because of the proliferation of Web-based threats, you can no longer rely on basic firewalls as your sole network protection.
2002 Clearswift Guide to establishing acontent security e-Policyfor Email and the Web Setting up an email and Web usage e-Policy for the first time can be a complicated business and so thise-Policy guide will help you define a content security e-Policy specific to your needs.
    Society & Policy  
2007 Progress & Freedom Foundation Parental Controls and Online Child Protection: A Survey of Tools and Methods Survey of technologies for protecting children, including TV, Movies, the Internet, and video games.  139 pages.
2006 Brennan  Center for Justice at NYU School of Law Internet Filters: A Public Policy Report “A detailed survey of tests and studies documenting how the widespread use of filters limits the free exchange of ideas necessary in a healthy democracy. The report shows that filters are an unreliable and inefficient means of preventing children.” 87 pages.
2005 Pew Internet & American Life Protecting Teens Online More than half of American families with teenagers use filters to limit access to potentially harmful content online. But both teens and parents believe that teens do things on the internet that their parents would not approve of.  27 pages.
2002 Responsible Netizen Filtering Software: The Religious Connection This report reviews the relationships of eight filtering companies whose products are currentlybeing used in U.S. public schools, and their relationships with conservative religious organizations.
2002 National Research Council Youth, Pornography, and the Internet Extensive research and analysis report on the problem of protecting children from Internet pornography.  445 pages.
2000 Gay & Lesbian Alliance Against Defamation Access Denied, Version 2.0: The Continuing Threat Against Internet Access and Privacy and Its Impact on the Lesbian, Gay, Bisexual and Transgender Community Update to the original 1997 report documenting instances of the filtering of gay-related sites by libraries and schools, as well as online privacy concerns.  58 pages.
2000 Peacefire Blind Ballots: Web Sites of U.S. Political Candidates Censored by Censorware Two blocking software, or censorware, products were tested to see if they filter out political candidates. Numerous politicians were found to be censored by this software, which collectively is used in tens of thousands of schools and libraries across the country.  5 pages.
2000 Commission on Child Online Protection COPA Commission Report to Congress Detailed report by a congressionally appointed commission of industry experts on Internet safety for children.   95 pages.
1999 Yale Law School Filtering the Internet: A Best Practices Model Argues that “industry self-regulation and technological facilitation of end-user choice offer a better solution to the problem of harmful Internet content.” 38 pages.
1997 Gay & Lesbian Alliance Against Defamation Access Denied, Version 1.0: The Impact of Internet Filtering Software on the Lesbian and Gay Community Discusses the risks of discrimination against sexual minorities by filtering software companies. 62 pages.
1997 Center for Democracy & Technology Internet Family Empowerment White Paper: How Filtering Tools Enable Responsible Parents to Protect Their Children Online Discuses the uses of filtering software by parents to protect children, and explores various options. 28 pages.
    Workplace  
2008 Bloxx Understanding Web Filtering Technologies This whitepaper discusses some of the technology options available for web filtering and reviews the benefits and limitations of each. 5pgs.
2008 Bloxx Productivity, Internet Abuse, and How to Improve One by Eliminating the Other This white paper  will discuss the effect of Internet abuse on employee productivity, then examine the best strategies and technologies to combat abuse so that organizations can enhance the Internet as a tool.
2008 Bloxx Anonymous Proxy: A Growing Trend in Internet Abuse, and How to Defeat it Anonymous proxies are an unseen threat-a student’s or employee’s backdoor to malicious or productivity-sapping sites on the Internet.
2008 Bloxx Guide to Web Access Management What are the legal implications of Web Filtering? How can I be sure that I am compliant and protected? The Guide to Web Access Management in the UK will set you on the right path.
2007 St. Bernard Safety Net: Internet Filtering  
2007 Secure Computing In today’s Web 2.0 environment, proactive security is paramount. Are you protected? This paper outlines those new threats, discusses the limited effectiveness of legacy Web security solutions against those threats, and outlines a new proactive security paradigm that is necessary for securing Web 2.0
2007 Dan’s Guardian “Meeting the Challenges of Web Content Filtering”. This paper discusses some of the problems associated with web content filtering, and poses potential solutions
2007 Fortient The Importance of FortiGuard Web Filtering as part of a Multi-Threat Security System To address network and web based threats, Fortinet offers several technologies to help customers secure their corporate networks.
2007 Websense Phishing and Pharming: Providing multi-layered, enterprise-wide protection from phishing and pharming exploit Organizations and their employees are increasingly targeted in phishing attacks.  This paper describes phishing and pharming and explains how Websense® software can be used to combat them.
2007 8e6 Web-Based Proxies:Today’s Leading Threat to Internet-Assisted Learning Web-based  proxies have increased exponentially, dramatically impacting child safety in schools.
2006 Aladdin URL Filtering White Paper Describes the Aladdin eSafe web filtering solution
2006 Barracuda Networks CIPA Compliance and the Barracuda Web Filter The use of Barracuda Network’s web filter to ensure compliance with the Children’s Internet Protection Act
2005 Forsite Group for 8e6 Complying with CIPA and Keeping Children Safe on the Internet Discusses methods for complying with the Children’s Internet Protection Act, focusing on web filtering software.
2005 ContentWatch Web Filtering and Monitoring for Small Business The following report addresses the unique challenges small organizations face in addressing the issues of Internet filtering.
2005 ContentWatch Internet Filtering Solution: ContentWatch Internet Filtering This white paper explains the pros and cons of various deployment options and analysisTechnologies.
2005 Websense Avoiding the Newest Security Threats FromWeb-Based Attacks Recent web-based attacks illustrate clearly the inadequacies of most existing security measures. This paper examines some of these recent threats in detail and explains how Websense software can be used to combat them.
2005 Forsite Group Web Filtering Appliances Heat Up the Hardware vs. Software Debate The hardware vs. software debate continues. Web filters are the latest products to be caught in this war of words.
2005 Blue Coat Blue Coat WebFilter Technology  This document examines the requirements for dynamic content filtering solution to perform an effective policy enforcement and gateway security role, and details Blue Coat WebFilter’s approach
2005 St. Bernhard The Powerful Technologies behind Best-of-Breed Internet Filtering This white paper, written for system administrators and IT professionals, outlines the available filtering and classification technologies that can be deployed to secure your Internet access.
2005 St. Bernhard Filtering the Spectrum of Internet Threats: Defending Against Inappropriate Content, Spyware, IM and P2P at the Perimeter Because of the proliferation of Web-based threats, you can no longer rely on basic firewalls as your sole network protection.
2004 Forsite Group Use or Abuse? Why Your Company Needs A Web Policy The ultimate goal of Web-use policies is protection. They safeguard the companies that implement and enforce them from legal actions, investigations, HR problems, and much more
2004 Secure Computing Best Practices for Monitoring and Filtering Internet Access in the Work Place Discusses the reasons that support making content filtering a strong part of your organization’s security policy from legal, productivity, and practical perspectives.
2002 N2H2 The Facts on Filters: A Comprehensive Review of 26 Independent Laboratory Tests of the Effectiveness of Internet Filtering Software The general finding of filter effectiveness by nearly three-quarters of these 26 tests, combined with the steady growth leading to widespread adoption of filters, leads to the conclusion that filters are, in general effective blocking tools — and are here to stay. 19 pages.
2002 Clearswift Guide to establishing acontent security e-Policyfor Email and the Web Setting up an email and Web usage e-Policy for the first time can be a complicated business and so thise-Policy guide will help you define a content security e-Policy specific to your needs.
     
2008 Bloxx Productivity, Internet Abuse, and How to Improve One by Eliminating the Other This white paper  will discuss the effect of Internet abuse on employee productivity, then examine the best strategies and technologies to combat abuse so that organizations can enhance the Internet as a tool.
2004 Forsite Group Use or Abuse? Why Your Company Needs A Web Policy The ultimate goal of Web-use policies is protection. They safeguard the companies that implement and enforce them from legal actions, investigations, HR problems, and much more
2004 Secure Computing Best Practices for Monitoring and Filtering Internet Access in the Work Place Discusses the reasons that support making content filtering a strong part of your organization’s security policy from legal, productivity, and practical perspectives.
2003 SurfControl Developing an Internet Access Policy: A Guide As companies rush onto the Web to stake a claim in exciting new digital territory, they find the unbounded Internet environment can be a pretty tough place
2003 SurfControl Internet Abuse at Work: Corporate Networks are Paying the Price How can your company maximize the Internet’s strengths while guarding against the high costs of misuse? Through Internet content management.
2003 SurfControl Internet Content Management: Standard Operating Procedure for the Digital Workplace There is a viable way to maximize the benefits and minimize the pitfalls of the digital workplace. It’s called Internet content management.
2003 SurfControl
 

Surfing the Web at Work: Corporate Networks Are Paying the Price

To track compliance with a corporate AUP, employers can supplement their policy with software that filters Internet access and/or monitors employee use.
%d bloggers like this: