Describe an effective e-mail and web use policy

Assignment Help Electrical Engineering
Reference no: EM131230376

MONITORING EMPLOYEES ON NETWORKS: UNETHICAL OR GOOD BUSINESS?

When you were at work, how many minutes (or hours) did you spend on Facebook today? Did you send personal e-mail or visit some sports Web sites? If so, you're not alone. According to a Nucleus Research study, 77 percent of workers with Facebook accounts use them during work hours. A Ponemon Institute study reported that the average employee wastes approximately 30 percent of the workday on non-work-related Web browsing, while other studies report as many as 90 percent of employees receive or send personal e-mail at work. This behavior creates serious business problems. Checking e-mail, responding to instant messages, or sneaking in a brief YouTube video creates a series of nonstop interruptions that divert employee attention from the job tasks they are supposed to be performing. According to Basex, a New York City business research company, these distractions result in $650 billion in lost productivity each year! Many companies have begun monitoring employee use of e-mail and the Internet, sometimes without their knowledge. A 2010 study from Proofpoint Plus found that more than one in three large U.S corporations assign staff to read or analyze employee e-mail. Another recent survey from the American Management Association (AMA) and the ePolicy Institute found that two out of three of the small, medium, and large companies surveyed monitored Web use. Instant messaging and text message monitoring are also increasing. Although U.S. companies have the legal right to monitor employee Internet and e-mail activity while they are at work, is such monitoring unethical, or is it simply good business? Managers worry about the loss of time and employee productivity when employees are focusing on personal rather than company business. Too much time on personal business translates into lost revenue. Some employees may even be billing time they spend pursuing personal interests online to clients, thus overcharging them. If personal traffic on company networks is too high, it can also clog the company's network so that legitimate business work cannot be performed. Procter & Gamble (P&G) found that on an average day, employees were listening to 4,000 hours of music on Pandora and viewing 50,000 five-minute YouTube videos. These activities involved streaming huge quantities of data, which slowed down P&G's Internet connection. When employees use e-mail or the Web (including social networks) at employer facilities or with employer equipment, anything they do, including anything illegal, carries the company's name. Therefore, the employer can be traced and held liable. Management in many firms fear that racist, sexually explicit, or other potentially offensive material accessed or traded by their employees could result in adverse publicity and even lawsuits for the firm. Even if the company is found not to be liable, responding to lawsuits could run up huge legal bills. Symantec's 2011 Social Media Protection Flash Poll found that the average litigation cost for companies with social media incidents ran over $650,000. Companies also fear leakage of confidential information and trade secrets through e-mail or social networks. Another survey conducted by the American Management Association and the ePolicy Institute found that 14 percent of the employees polled admitted they had sent confidential or potentially embarrassing company e-mails to outsiders. U.S. companies have the legal right to monitor what employees are doing with company equipment during business hours. The question is whether electronic surveillance is an appropriate tool for maintaining an efficient and positive workplace. Some companies try to ban all personal activities on corporate networks-zero tolerance. Others block employee access to specific Web sites or social sites, closely monitor e-mail messages, or limit personal time on the Web. For example, P&G blocks Netflix and has asked employees to limit their use of Pandora. It still allows some YouTube viewing, and is not blocking access to social networking sites because staff use them for digital marketing campaigns. Ajax Boiler in Santa Ana, California, uses software from SpectorSoft Corporation that records all the Web sites employees visit, time spent at each site, and all e-mails sent. Financial services and investment firm Wedbush Securities monitors the daily e-mails, instant messaging, and social networking activity of its 1,000-plus employees. The firm's e-mail monitoring software flags certain types of messages and keywords within messages for further investigation. A number of firms have fired employees who have stepped out of bounds. A Proofpoint survey found that one in five large U.S. companies fired an employee for violating e-mail policies in the past year. Among managers who fired employees for Internet misuse, the majority did so because the employees' e-mail contained sensitive, confidential, or embarrassing information. No solution is problem free, but many consultants believe companies should write corporate policies on employee e-mail, social media, and Web use. The policies should include explicit ground rules that state, by position or level, under what circumstances employees can use company facilities for e-mail, blogging, or Web surfing. The policies should also inform employees whether these activities are monitored and explain why. IBM now has "social computing guidelines" that cover employee activity on sites such as Facebook and Twitter. The guidelines urge employees not to conceal their identities, to remember that they are personally responsible for what they publish, and to refrain from discussing controversial topics that are not related to their IBM role. The rules should be tailored to specific business needs and organizational cultures. For example, investment firms will need to allow many of their employees access to other investment sites. A company dependent on widespread information sharing, innovation, and independence could very well find that monitoring creates more problems than it solves.

Case Study Question

1. Should managers monitor employee e-mail and Internet usage? Why or why not?

2. Describe an effective e-mail and Web use policy for a company.

3. Should managers inform employees that their Web behavior is being monitored? Or should managers monitor secretly? Why or why not?

Reference no: EM131230376

Questions Cloud

Calculate the price per item for that purchase : Read the information for one purchase into a variable of your struct type. Calculate the price per item for that purchase. Output the data in formatted columns (as in program #1). Add the item cost into a total cost variable.
It has been said there is no bad data, just bad management : To what extent should end users be involved in the selection of a database management system and database design?
Check the given essay and rewrite it : Check the given essay. and rewrite it if needed. - The essay topic is : "Bullying". -  One of the biggest problems that seen these days is bullying.
What are the consequences of an organization : What are the consequences of an organization not having an information policy?
Describe an effective e-mail and web use policy : Should managers inform employees that their Web behavior is being monitored? Or should managers monitor secretly? Why or why not?
Describe physical effects white collar crime has on victims : Compare and contrast the positivistic and humanistic approaches to the study of white collar crime. Why is it more difficult to measure the economic cost of white collar crime as compared to conventional crime?
Describe the features of a simple network : What are the principal components of telecommunications networks and key networking technologies?
How creative process is carried by information technologist : One of Sayers' analogies was illustrating the creative process in the context of a writer. Update the analogy and show how the creative process is carried out by an information technologist.
Define bluetooth wi-fi wimax and 3g and 4g networks : What are the principal technologies and standards for wireless networking, communications, and Internet access?

Reviews

Write a Review

Electrical Engineering Questions & Answers

  Determine what is the order of the given system

c) Find the output y(t) in response to the input x(t) = 6 u(t), where u(t) is the unit step function. d) Find the output y(t) in response to the input x(t) = δ(t) A linear system has the system response function H(s)= -7/(s+4)

  Calculate the mechanical power output and efficiency

The single phase for equivalent circuit parameters for the windings of the motor referred to the stator in (ohms/phase) R1=0.2 R2=0.2 X1=0.3 X2=0.3 .the core losses and the magnetization can be ignored.

  Find the receiving antenna gain in order to secure a c-n

In a line of sight link , the transmitted power = 1 watt at the frequency of 11 GHz and the transmitting antenna has gain of 1000 , the receiving antenna is 40 Km apart from the transmitting station

  How can be use a nand gate to make a not gate

Interface TTL logic to 120 VAC lamp. In this part of the lab, you will interface lowpower solid state electronics to the "outside world" by switching the 120 VAC lamp on and off using the AND gate from the previous experiment.

  Finding the magnetic field intensity phasor

Finding the magnetic field intensity phasor. Answers: a)H˜ =1/µo(-24/ω xˆ +16/ω yˆ)e-j4z d) 191 MHz, 1.57 m

  Compute the equilibrium carrier concentrations

Compute the equilibrium carrier concentrations and the position of the Fermi level with respect to the conduction band edge for a uniformly doped Si region with N_D=1*10^16 cm^-3 and N_A = 1*10^17 cm^-3 at room temperature.

  What is the value of the resistance of the heating element

an electric kettle is required to heat 0.6 litre of water from 10 degrees celcius to boiling point in 5 minutes,the supply voltage being 240 volts. The efficiency of the kettle is 87%. Assume the specific heat capacity of water to be 4190J/kg.K

  Write ladder logic for simple applications

Understand basic ladder logic symbol - Write ladder logic for simple applications

  Determine what is the power factor of the other load

The two loads draw a total average power of 52,800 W at a power factor of 0.8 leading. One of them draws 40K VA at a power factor of 0.96 lagging. What is the power factor of the other load

  Explain what is the input impedance

If we have a 600ohm transmission line terminated with a 1200ohm resistor, how long must the transmission line be if the input impedance is purely real?

  What are the noise margins for the reasonable output ranges

Suppose that a family of logic gates considers the output ranges of [0 - 0.2V] as "0" and [3.1V-3.3V] as "1". What are the reasonable input ranges for "0" and "1"? (a) "0": [0.1 - 0.4V], "1": [2.3V - 3.3V]; (b) "0": [0-0.3V], "1": [2.8V - 3.0V]; (..

  Write formula for the magnetization volume current density

Write the formula for the magnetization volume current density J M and magnetization surface current density JMS in terms of magnetization vector M. 4. A sphere has permanent magnetization where is a positive constant.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd