Summarize the benefits of using automated software tools

Assignment Help Case Study
Reference no: EM13946540

Case study

Prevention better than litigation? Monitoring of employee computer use

Summarizes the extent of non-work related, computer-related activities in the workplaces and explores approaches to limit these activities.

A quarter of UK companies have dismissed employees for internet misconduct, with the vast majority of sackings related to accessing or transmitting online pornography, according to Websense, a provider of internet management solutions.

Misuse of the internet in the workplace is so widespread that 72 per cent of UK companies have had to deal with it, mostly by having a quiet word with the employee, followed by verbal warnings.

The company's research also shows that time wasting on the internet is an issue. In the US, workers spend more than one entire workday each week surfing non-work-related websites, with 18 per cent admitting that pornography sites were a big draw, only just behind shopping sites and online news.

Websense's products are now used by more than half of the Fortune 500, one third of the Nikkei 225, and half of the FTSE 100 companies, indicating that online porn in the workplace is a fast-growing problem. But for employers, dealing with the issue is not always as straightforward as buying some software.

Ray Stanton, director of security at Unisys, has faced the problem head-on in previous jobs. He relates how an employee was caught sending e-mails around the organisation with 127MB (megabytes) of pornography attached, in the shape of games, pictures and text. The sheer size of the attachments caused the e-mail server to crash.

Of greater concern to Mr Stanton was that the volume of material was not coming into the organisation from the internet even with broadband it would have taken too long to download. These megabytes of pornography were already on the corporate network.

When the business unit where that individual worked upgraded its desktops, an exercise which required the monitoring of file transfers, engineers discovered 20GB (gigabytes or billion bytes) of unacceptable material in corporate storage systems, the result of perhaps dozens of people's online activity. ‘Apart from anything else, that represents a serious management cost, perhaps $250,000 worth', Mr Stanton says. The individual who sent the 127MB email was disciplined under usual procedures.

Mr Stanton believes that the problem of online pornography is not going to go away and that it needs to be treated as a special case. In part, that is because it does not usually stop just with individuals looking at pornography.

‘From experience in investigating many such cases, most start off as a joke and rapidly turn into a real problem', says Clifford May, principal forensic consultant at Integralis, the IT security solutions vendor. ‘The immediacy of e-mail is the biggest danger, supported by the ease with which a large audience can be accessed people attach images, hit send and think about it later so-called clicker's remorse.'

Mr May adds that the circulation of explicit images as a joke is also a very real problem and in some cases has brought multi-million pound projects to a halt while development staff are investigated for circulating ever more outrageous material.

While measures such as filtering and blocking websites can help, it does not stop internet misuse.

‘Companies need a policy in place to know how and when employees use the internet, with guidelines that they stick to', says Stephanie Slanickova, a solicitor at Tarlo Lyons, a law firm that specialised in IT issues.

‘It is also important that companies get employee consent for monitoring, perhaps by [including] a clause in their contract. If a company just goes ahead with surveillance it could be in breach of the law. But they will be OK if they clearly set out what they are going to do', she adds.
The legal situation varies in different parts of the world, and is still evolving. The general principle is that if a citizen's right to privacy is enshrined in a written constitution, companies need to be more careful about any surveillance they wish to carry out. A good indicator of what the European Commission (EC) is currently thinking is provided by a working party document released in May this year [2002]. Personal e-mails are where the issue gets particularly thorny. ‘The document announces that employees don't abandon their right to privacy and data protection at the door to the workplace', explains Michael Clinch, a partner at Picton Howell, the London law firm.

‘They have a legitimate expectation of a certain degree of privacy. The EC recognises, however, that this has to be balanced with the employer's right to run a business', he says.

However, he believes that employers will not like the document, since the European Union has consistently taken the side of the individual on data protection issues.

The topic will be reviewed during 2002 and 2003 with a view to harmonising national laws on e-mail monitoring at the end of that period [see the sites listed at the end of the chapter for the latest developments in employee monitoring.

Questions

1 Summarize the benefits of using automated software tools to manage staff access to Internet content and e-mail.

2 What practices does the article suggest organizations should adopt to counter misuse of computer resources by employees? Can you suggest further measures?

3 Do you think it is ethical for organizations to monitor employees to detect access to pornography and then sack them if they have accessed it?

Of course, if a company has to resort to the law, it already represents a breakdown in communication between employer and employee. This is why everyone advising on the matter stresses the need for clearly advertised and enforced policies and guidelines. Prevention is far better than litigation.

‘Dismissing an employee for internet misuse is a substantial cost to the employer', says Jonathan Naylor, a barrister in the employment, pensions and benefits group of Morgan Cole, the UK law firm.

A study in 2001 by Incomes Data Services found that the costs of replacing key staff could be as much as 150 per cent of the employee's annual salary.

In addition, if the dismissal process is handled poorly by the employer, the organisation could also face employment tribunal proceedings, incurring further management time and costs.

Mr Stanton does not believe companies should panic, although they do need to be sensible and pragmatic since doing nothing is not an option.

‘Any director of a large company can assume he has a problem', he says. ‘It comes with the people.' But over time, through education, monitoring and some disciplinary action, companies can learn to deal with it.

Source: Mark Vernon, Legal and ethical issues, Financial Times; 2 October 2002.

Reference no: EM13946540

Questions Cloud

What percent of the welders make less than $20.00 per hour : The following chart shows the hourly wages of a sample of certified welders in the Atlanta, Georgia, area. How many welders were studied? What is the class interval?
Chez fred bakery estimates : Chez Fred Bakery estimates the allowance for uncollectible accounts
Frasqutta acquired equipment : Frasqutta acquired equipment from the manufacturer gave a noninterest-bearing note in exchange
Construct requency distribution table for the above majors : A sample was taken of 25 high school seniors who were planning to go to college. Each of the students was asked which of the following majors he or she intended to choose: business, economics, management information systems (MIS), behavioral scien..
Summarize the benefits of using automated software tools : Summarize benefits of using automated software tools to manage staff access to Internet content. What practices does article suggest organizations should adopt to counter misuse of computer resources by employees?
Transactions of a new company : the transactions of a new company called Pose-for-pics
Is the main program a function? : What are the advantages and disadvantages of using functions, in your software code, in a software development project? Give some examples.
Was the support representative courteous and professional : Did the support representative explain the process for resolving your problem? Did the support representative keep you informed about the status of progress in resolving your problem?
Determine power output and the thermal efficiency of plant : The mixing process is adiabatic and the mixture is expanded to a condenser pressure of 0.10 bar in a low pressure turbine of 78% internal efficiency. Determine the power output and the thermal efficiency of the plant.

Reviews

Write a Review

Case Study Questions & Answers

  Describe new product development process utilized by cisco

Briefly describe the new product development process utilized by Cisco. Compare and contrast Cisco's specific process to the generic new product development process we've discussed in class

  Explore corruption scandal in terms of issue-related factors

Explore the corruption scandals in terms of the issue-related factors discussed in Chapter 4, namely moral intensity and moral framing.

  Choice point case

Choice Point Case;  Itemize the nature of the information security breach at ChoicePoint and how this adversely affected the organization.  Be sure to include both tangible and intangible losses in preparing your response.

  How goals are measurable for the client

A problem-solving strategy and a goal for each problem and the services, resources, and supports the client may need and why - how goals are measurable and realistically attainable for the client

  Who has the stronger argument alden or jasons children

Who has the stronger argument, Alden or Jason's children? Why? If you were the judge or jury hearing this case, for whom would you decide? Why?

  Explain the differences in the water level

Explain the differences in the water level, 80% of the nonconservers in the pairs reached conservation, whereas only 50% reached conservation in general education classroom instruction.

  Explain the levels of non-conformity with the ism code

Describe how the introduction of the ISM code has affected the safety of International Shipping and describe the importance of the marine surveyor to the ship owner in relation to the ISM audit

  Case study personal computer security threats

Case Study Personal Computer Security Threats

  Does cost of goods sold increase or decrease

Write a one page memorandum to your instructor with three parts that answers the three following requirements and does Cost of Goods Sold increase or decrease when closing a favorable variance?

  What purpose does culture serve for an organization

What purpose does culture serve for an organization? Describe the Mayo Clinic's culture from the perspective of espoused values and enacted values. Using the perspective of the functions of organizational culture, explain the impact of Mayo's values ..

  Commercial and corporation law

Administrative bodies be further harmonized to create one ‘super' regulator for design and enforcement of regulation for all business entities?

  Write a xml with database with book details book id title

write a xml with database with book details book id title author subject publisher year language vendor and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd