Should managers monitor employee email and internet usage

Assignment Help Basic Computer Science
Reference no: EM131397980

Monitoring Employees or Network: Unethical or God Business?

The Internet has become an extremely valuable business tool, but it's also a huge distraction for workers on the job. Employees are wasting valuable company time by surfing inappropriate websites (Facebook, shopping, sports, etc.), sending and receiving personal email, talking to friends via online chat, and downloading videos and music. According to IT research firm Gartner Inc., non-work-related Internet surfing results in an estimated 40 percent productivity loss each year for American businesses. A recent Gallup Poll found that the average employee spends over 75 minutes per day using office computers for nonbusiness-related activity. That translates into an annual loss of $6,250 per year, per employee. An average mid-size company of 500 employees could be expected to lose $3.25 million in lost productivity due to Internet misuse. Many companies have begun monitoring employee use of email and the Internet, sometimes without employees' knowledge. Many tools are now available for this purpose, including SONAR, Spector CNE Investigator, iSafe, OsMonitor, IMonitor, Work Examiner, Activity Monitor, Mobistealth, and Spytech. These products enable companies to record online searches, monitor file downloads and uploads, record keystrokes, keep tabs on emails, create transcripts of chats, or take certain screen shots of images displayed on computer screens. Instant messaging, text messaging, and social media monitoring are also increasing. Although U.S. companies have the legal right to monitor employee Internet and email activity while employees are at work, is such monitoring unethical, or is it simply good business? Managers worry about the loss of time and employee productivity when employees are focusing on personal rather than company business. Too much time on personal business translates into lost revenue. Some employees may even be billing time they spend pursuing personal interests online to clients, thus overcharging them. If personal traffic on company networks is too high, it can also clog the company's network so that legitimate business work cannot be performed. Procter & Gamble (P&G) found that on an average day, employees were listening to 4,000 hours of music on Pandora and viewing 50,000 five-minute YouTube videos. These activities involved streaming huge quantities of data, which slowed down P&G's Internet connection. When employees use email or the web (including social networks) at employer facilities or with employer equipment, anything they do, including anything illegal, carries the company's name. Therefore, the employer can be traced and held liable. Management in many firms fear that racist, sexually explicit, or other potentially offensive material accessed or traded by their employees could result in adverse publicity and even lawsuits for the firm. An estimated 27 percent of Fortune 500 organizations have had to defend themselves against claims of sexual harassment stemming from inappropriate email. Even if the company is not found liable, responding to lawsuits could run up huge legal bills. Companies also fear leakage of confidential information and trade secrets through email or social networks. Another survey conducted by the American Management Association and the ePolicy Institute found that 14 percent of the employees polled admitted they had sent confidential or potentially embarrassing company emails to outsiders. U.S. companies have the legal right to monitor what employees are doing with company equipment during business hours. The question is whether electronic surveillance is an appropriate tool for maintaining an efficient and positive workplace. Some companies try to ban all personal activities on corporate networks-zero tolerance. Others block employee access to specific websites or social sites, closely monitor email messages, or limit personal time on the web. For example, P&G blocks Netflix and has asked employees to limit their use of Pandora. It still allows some YouTube viewing, and is not blocking access to social networking sites because staff uses them for digital marketing campaigns. Ajax Boiler in Santa Ana, California, uses software from SpectorSoft Corporation that records all the websites employees visit, time spent at each site, and all emails sent. Financial services and investment firm Wedbush Securities monitors the daily emails, instant messaging, and social networking activity of its 1,000-plus employees. The firm's email monitoring software flags certain types of messages and keywords within messages for further investigation. A number of firms have fired employees who have stepped out of bounds. A Proofpoint survey found that one in five large U.S. companies had fired an employee for violating email policies. Among managers who fired employees for Internet misuse, the majority did so because the employees' email contained sensitive, confidential, or embarrassing information. No solution is problem-free, but many consultants believe companies should write corporate policies on employee email, social media, and web use. The policies should include explicit ground rules that state, by position or level, under what circumstances employees can use company facilities for email, blogging, or web surfing. The policies should also inform employees whether these activities are monitored and explain why. IBM now has social computing guidelines that cover employee activity on sites such as Facebook and Twitter. The guidelines urge employees not to conceal their identities, to remember that they are personally responsible for what they publish, and to refrain from discussing controversial topics that are not related to their IBM role. The rules should be tailored to specific business needs and organizational cultures. For example, investment firms will need to allow many of their employees access to other investment sites. A company dependent on widespread information sharing, innovation, and independence could very well find that monitoring creates more problems than it solves.

Case Study Question

1. Should managers monitor employee email and Internet usage? Why or why not?

2. Describe an effective email and web use policy for a company.

3. Should managers inform employees that their web behavior is being monitored? Or should managers monitor secretly? Why or why not?

Reference no: EM131397980

Questions Cloud

Evaluation of a recent business decision : Develop a 700-word evaluation of a recent business decision in your work or desired career.
Do you think walmart raised wages : Do you think Walmart raised wages because of supply and demand in the labor market or because of the pressure of labor activist organizations? Explain your reasoning.
Conduct an analysis of noah : Conduct an analysis of Noah and the Flood and discuss the general plot of this selection. Does it align with your general knowledge of Genesis in regard to the story of Noah's Ark and the animals that were placed on the Ark?
What are the problems facing sg in 2010 : What are the problems facing SG in 2010? How do SG's problems illustrate the relationship between the number of warehouses and inventory levels?
Should managers monitor employee email and internet usage : Should managers inform employees that their web behavior is being monitored? Or should managers monitor secretly? Why or why not?
Driver for the continued existence of organized labor : To what degree do you think that outsourcing has been a driver for the continued existence of organized labor? Do you believe that anxieties about outsourcing have been exaggerated?
What are characteristics of a good group : What are characteristics of a good group?  What are characteristics of a good group member?  What kind of experience do you want to create for your peers this semester when working in a group
Project-leadership styles-approach : use leadership theories, assessment tools, and an understanding of the role of ethics, values, and attitudes to evaluate and enhance personal leadership skills
Examine the features of the mobile handsets : Use your spreadsheet software to determine the wireless service and handset that will offer the best pricing per user over a two-year period. For the purposes of this exercise, you do not need to consider corporate discounts.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Backup domain controller in an existing domain

You install Windows NT Server on a computer, making the computer a backup domain controller in an existing domain. After installation, you discover that you used the wrong domain name. What should you do?

  Explain what happens when the reference to abstract class

Explain what happens when the reference to the abstract class X is used to execute method M1( ). X obj = new Y( ); obj.M1( );

  Specific situations where dividing the ssn is useful

This exercise asks you to think about specific situations where dividing the SSN is useful.

  What do you consider the two most important software innovat

identify and describe what you believe to be the two most important hardware innovations.

  Thermodynamics play in energy economics

What is the roles that the first two laws of thermodynamics play in energy economics.

  What happens next when i/o interrupt occurs

A CPU with interrupt-driven I/O is busy servicing a disk request. While the CPU is midway through...

  Which structure would be the best for the storyboard created

He would like his recipes to be displayed in very simple, step by step pages. Which structure would be the best for the storyboard created for one of his recipes?

  Performance of female entrepreneurs

Read the research study "The performance of female entrepreneurs: Credit, Training and the Moderating Effect of Attitude towards Risk-Taking," which is required reading for this module.

  Improve multimedia search experiences

Assess current multimedia document search techniques and suggest three techniques to improve multimedia search experiences. Explain why you chose to recommend each of the techniques you suggested. paragraph and references

  What is enterprise resource planning

This chapter begins with an architecture checklist. If you had to rank the items, from most important to least important, what would your list look like? Explain your answer.

  Sequences of n integers

Let A and B be two sequences of n integers each, in range [1, n^4]. Given an integer x, describe an O(n) time algorithm for determining if there is an integer a in A and an integer b in N such that x = a+b.

  The difference between operational and strategic data sets

Data Warehousing and the difference between operational and strategic data sets. Data Mining and OLAP (On-Line Analytical Processing) compared with OLTP Systems

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd