Develop a comprehensive policy statement for internet

Assignment Help Management Theories
Reference no: EM131661035

Question: Most businesses provide their employees with access to computer systems and other electronic devices. Employers that make electronic communications systems (such as access to the Internet and e-mail) available to their employees face some obvious risks, though. An employee could use e-mail to harass other employees or subject the employer to liability by reproducing, without authorization, copyright-protected materials found on the Internet. Another risk is that an outside party might intercept confidential information contained in e-mail messages transmitted via the Internet. Finally, by monitoring employees' Internet use and e-mail in an attempt to avoid these problems, the employer may risk being held liable for violating the employees' privacy rights. If you are an employer and find it prudent to monitor employees' Internet use, you should take certain precautions. Remember that a small company can be bankrupted by just one successful lawsuit against it. Even if your company wins the suit, the legal fees incurred to defend against the claim could be devastating for your profits.

Inform Your Employees of the Monitoring and Obtain Their Consent First, you should notify your employees that you will be monitoring their Internet communications, including their e-mail. Second, you should ask your employees to consent, in writing, to such actions. Generally, as discussed earlier in this chapter, if employees consent to employer monitoring, they cannot claim that their privacy rights have been invaded by such practices. You will find it easier to obtain employees' consent to monitoring if you explain why it is necessary or desirable and let them know what methods will be used to monitor Internet communications. As a rule, when employees are told the reasons for monitoring and clearly understand their rights and duties with respect to the company's communications system, they are less offended by the surveillance. Spell Out Permissible and Impermissible Internet Uses Employees should be told which uses of the firm's communications system are permissible and which uses are prohibited. To make sure that employees understand your policy, develop a comprehensive statement setting forth your standards for Internet use and provide specific examples of impermissible activities. It is also important to let employees know what will happen if they violate the policy. The policy might state, for example, that any employee who violates the policy will be subject to disciplinary actions, including termination.

CHECKLIST FOR THE EMPLOYER

1 Inform employees that their Internet communications will be monitored, explain why monitoring is necessary or desirable, and indicate how it will be conducted.

2 Obtain employees' written consent to having their electronic communications monitored.

3 Develop a comprehensive policy statement explaining how Internet communications should and should not be used and indicating the consequences of misusing the firm's communications system.

Reference no: EM131661035

Questions Cloud

Discuss a health promotion plan for individuals : Discuss what would be included in a health promotion plan for individuals and families based on needs assessment findings, risk factors
Explain the appropriateness of the debt policy : BAFN602: Corporate Finance Assessment. Obtain the financial statements for Woolworths and Telstra. In another word, explain the appropriateness of debt policy
Analyze the network diagram for pureland wastewater : This assignment requires you to analyze the network diagram for PureLand Wastewater and make specific recommendations to improve network security.
Percentage error of water : What would be the percentage error of water if the volume was 5.0 ml, Mass A of the Graduated Cylinder is 19.50, mass B.
Develop a comprehensive policy statement for internet : Develop a comprehensive policy statement explaining how Internet communications should and should not be used and indicating the consequences of misusing.
How to defend against attacker on the web : Even just talking on the phone can be a security risk, according to Harwood, there will be a slight increase in risk due to all the vulnerabilities
Discuss professional education in terms of costs : The various kinds of health professionals are educated in separate schools but with considerable overlap in curricula and training requirements
Analyze project management processes : Examine communication, human resources, procurement, and stakeholder management as project management functions.
What are the concentrations of all ions left in solution : Assuming that the volume is still 1.0 L, what are the concentrations of all ions left in solution?

Reviews

Write a Review

Management Theories Questions & Answers

  The potential to cause injury or illness

Question 1Think about a time when you were required to accomplish a new or nonroutine task at work that had the potential to cause injury or illness. Discuss how a management of change process could be used to reduce the risks. Who would be involved ..

  Yips model with graphs and charts

A detailed information on yips model with graphs and charts.

  Determine maximum loading and unloading times

An overhead trolley conveyor is configured as a continuous closed loop. The delivery loop has a length of 120 m and the return loop 7- 80 m.

  Why is gps important to foursquare

Why is GPS important to Foursquare? How could individuals cheat on providing locations? Why would individuals cheat about their locations?

  What difficulties might confront a manager today

What difficulties might confront a manager today

  Discuss the ethics surrounding the use of indirect strategy

Discuss the ethics surrounding the use of the indirect strategy when organizing a message. Do you think it is manipulative to delay the presentation of the main idea in a message.

  Three types of analysis on schellhammer''s current assets

(b) Perform each of the three types of analysis on Schellhammer's current assets.(Round percentages to 0 decimal places, e.g. 43% and ratios to 2 decimal places, e.g.1.58.)

  Explaion the laplace distribution

The Laplace distribution is discussed in Appendix 5-D. As noted there, the Laplace distribution could be a good choice for describing demand for slow-moving.

  Where is this business in its life cycle

Where is this business in its life cycle?

  Is the project manager acting with integrity

What are the important questions to ask in a situation like this? Follow the ethical decision-making process outlined in the chapter. Does it work in this scenario?

  Employers are shifting more employee healthcare costs

Assignment Background: Employers are shifting more employee healthcare costs to employees. Answer these questions: What are the consequences of that change? Where does social responsibility of employers end and where does the need to operate more eff..

  Cultural differences between canada and japan

Analyzing the cultural differences between Canada and Japan and how those differences are contributing to the communication impasse described in the exercise.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd