Preview

Due Diligence: an Employer’s Responsibility to Monitor Employee Computer Use

Powerful Essays
Open Document
Open Document
1781 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Due Diligence: an Employer’s Responsibility to Monitor Employee Computer Use
Due Diligence:
An Employer’s Responsibility to Monitor Employee Computer Use

Are some employers in denial? Like the frog in the pot story, the gradual introduction of complicated electronics into the workplace has left some employers behind in their knowledge of how computer use potentially affects the workplace. While not completely unaware of these dangers, by the time the water heats up beyond jumping out of trouble, they potentially have put their company at risk, if not already in legal woes. This paper is for the employers who are not monitoring, for whatever reason. The three topics presented here concerning production loss, security threats, and a desire to safeguard company reputation should trigger a change from the status quo. Most employers are mindful of and concerned with the wasting of productive work hours with non-work Internet use. Employees who surf the web outside of work-related tasks, play online computer games, and a myriad of other things for personal use rob their company blind. Many staff are just naive of the monetary toll this takes on the company. Equally, employers are sometimes engrossed with other things to notice. Fortunate companies are able to hire IT professionals who can monitor usage. Now, we tend to think of the Internet as the major culprit, but actually this could be any type of personal use. It does not require the Internet. There are games often resident on a computer just waiting for a taker. It just so happens that in many cases where online access is available, the Internet is the door to company productivity loss. In the working world, it is known as goldbricking, cyberslacking, cyberloafing, to name a few. So how does cyberloafing financially affect the company? Say an employee takes .5 hours a day to surf, shop, or whatever else during work hours. Looking at this cost systematically, we begin with adding up the per day use of .5 hours for an entire week. At the end of the week, we have 2.5 hours



Cited: “How to Protect Against Malicious Software.” UCLA Seasnet Computing Facility. n.d. Web. 5 July 2012 "Sexual Harassment." Title 29 Code of Federal Regulations, Pt. 1604.11. “Breaches Affecting 500 or More Individuals”. Health and Human Services. n.d. Web. 11 Jul 2012 “2007 Electronic Monitoring & Surveillance Survey: Over Half of All Employers Combined Fire Workers for E-Mail & Internet Abuse”. Electronic Discovery Navigator. 29 February 2008. Web. 15 July 2012 “Electronic Monitoring: A Poor Solution to Management Problems.” National Workrights Institute. n.d. Web. 14 July 2012.

You May Also Find These Documents Helpful

  • Better Essays

    Internet and the Workplace

    • 1937 Words
    • 8 Pages

    However, in addition to using the Internet, especially the World Wide Web and e-mail for work-related purposes, employees are also using the Internet for personal use, whether for sending personal e-mail messages, playing games, downloading pornography, ordering goods online, checking stock prices, or gambling. Accordingly, many issues have come to light involving employee e-mail and Internet use. Employers have to question how much, if any, personal use of the Internet and e-mail to permit in the workplace. Employers are also grappling with the question of whether to monitor Internet use and whether to block access to certain…

    • 1937 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Behaviors such as transferring files from a work device to a home computer that is not protected or maintained to IT’s standards, using personal communications that are not as safe as corporate communications, talking about sensitive company matters where others can hear the conversation, and failing to use a laptop privacy guard when working remotely in a public place all invite information theft. Employees also fail to safeguard equipment such as laptop computers and portable storage devices, which can be lost or stolen (Cisco Systems, 2008, p 5).…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    Ghosh, A., & Cigital, M. An Approach to Defending Against New and Unknown Malicious Software. Retrieved Feb 16, 2012, from http://www.cigital.com/resources/papers/…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Case Study

    • 563 Words
    • 3 Pages

    Helen Barnett is a supervisor of 15 customer service representatives for National Insurance, a company specializing in home insurance. Helen was surprised on what she was seeing on the computer screen of one of her employees, James Erskine, a picture of an ongoing sexual act. Customer Service Representatives assist clients with claims, insurance quotes, and other queries. These representatives each have cubicles that are furnished with a computer, a desk, and a phone headset, but of course Helen Barnett, the supervisor has her own office. National Insurance is a company that efforts in making greater use of electronic technology in servicing its clients. One of the representatives named James Erskine had been employed with the company for the last six months and on his 90-day performance review, he got a satisfactory. However, Lorraine Smalls is a co-worker who sat on the cubicle close to Erskine was the one who discovered the pictures when she quickly tried to recover some data to respond to a customer when her computer malfunctioned. It was not unusual for representatives to use another staff member’s computer. Smalls immediately called Barnett and as she viewed the browser, it shows that the website was viewed more than a dozen times that morning. As a supervisor, she wanted to confront him about using company time in such an unproductive manner. When Erskine returned from lunch, he was confronted and he immediately reasoned that he visited the site during break time and felt that it was an invasion of his privacy/ Barnett told him that she would report to the Human Resource Manager but Erskine himself went to the Manager, Dale Gibbons and expressed how he was violated. The HR Manager then told him that every one should have access to the company’s computer for related purposes and on the other…

    • 563 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    The internet 's rapid spread and growth in popularity among the public meant that people were using it for communication and education in their everyday lives. As employees spent more time at the office, the demand to use the internet for personal use was growing. Though the official company policy was that internet usage must be for business purpose, the decision was made to step back from that policy and let employees use search and email functions for personal use. Waterbee chose to monitor employees usage, but the results after the first week were surprising. For example, one employee spent an entire day on playboy.com. This employee did not work in his own office, which meant other employees could see his monitor. The Security team, faced with taking action on a number of employees, and complicated by legal issues, then advised HR to stop monitoring usage. HR, however, stuck to the orignal plan and took action on the employees who misused the Internet.…

    • 827 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Employee monitoring has emerged as a necessity and yet as a very controversial issue due to the widespread use of technology. Employee monitoring is the act of watching and monitoring employees' actions during working hours using employer equipment/property. This phrase can be a little scary as an employee, where is the line? The restroom is their property; thankfully there are employers who know their boundaries. Legally employers are continuing to monitor their employees. The only issue that seems to be addressed is how much they can monitor them.…

    • 1403 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    The Employee handbook plays an important role in communicating the organization's policies as well as rules and regulations. It gives the employee a source to understand some of the responsibilities, benefits, wages, appraisals and restrictions of both the employee and the employer. One of the main areas of the handbook deals with privacy issues in the workplace. There are several areas to consider when writing a privacy policy. These areas include: the privacy rights issues that are addressed, the company's position in response to privacy rights issues, privacy protections to limit the company's liability, privacy protections to enhance employee motivation and productivity, ethical considerations and different ways to address state, federal, and international laws.…

    • 1493 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Technology Within Business

    • 1322 Words
    • 6 Pages

    Firstly, by having technological advancements as the most imperative goal in businesses it can result in a dependency on technology. Dependency means that the company’s main reliance is on technology in order to function. Therefore if the technology fails then the business can become unsuccessful. For example this reliance on technology was made evident when the computers that ran the power for Melbourne tunnels failed in October 2012 and resulted in the Melbourne tunnels being shut down (ABC, 2012, para 1). On the other hand, technology can result in a more efficient workplace and work environment. For example Intel has increased their productivity through wireless notebooks by five percent per employee (Rungta, Tierney, Towles, 2008, p2). However when technology does breakdown it can cause larger problems such as, a loss of customer reliability and data los. This was made evident when a fault occurred in Commonwealth Bank Automated Teller Machines and online banking system in March 2012 and resulted in customers being able to overdraw their account (Zappone, 2012, para). Therefore, organisation’s need to focus on strategies that allow people to work with minimal technology. Hence, it is evident that companies should not depend on technology because it is not always reliable and can negatively affect a businesses performance. Therefore technological advancements should not be imperative for a business today.…

    • 1322 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    There are lots of companies have run the electronic auditing procedures to monitor the computer use of the employees. They perceived this matter seriously because the future achievement is their priority. But is the implementation of the employee monitoring system is necessary is still under a heat debate because it deals with their privacy and individual right. We should make a clear statement that company computing systems are provided as tools for business and all information created, accessed, or stored using these systems are the property of the company and are subject to monitoring, auditing, or review. Even though the management has the authority to do so as the management is their source of income, but it is appropriate for the management to also look into their welfare as equal priority. Therefore, this report will focus on both side of the scale and dwell into both the benefits and the harms on implementing such a major monitoring system. Below (Diagram 1.0) is the finding of a research conducted by The American Management Association as…

    • 2715 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Web page and search engines are very helpful and can provide a lot of information at an employee’s fingertips, however if these programs are not monitored they can be abused by personal use of employees. Managers and other department supervisors should monitor the use of email, instant messaging, web pages, and search engines because it is important to…

    • 346 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cyberslacking is a prominent occurrence amongst the Hammer Wines employees. However, of all employees, the Receptionists spent the longest time on the Internet throughout the one-week trial (see figure 1.0 below). This may or may not be detrimental to Hammer Wines. Often, receptionists complete their work before their set time, meaning that if they’re browsing the Internet, still answering their phone and have completed required work, productivity will remain normal. Studies also show productivity can increase when employees are less restricted with the Internet. This productivity can swing both ways. Negative productivity will be detrimental to Hammer Wines if the receptionist fails to multitask and therefore ineffectively completes required jobs.…

    • 966 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Mla vs. Apa

    • 1237 Words
    • 5 Pages

    Even though many companies now routinely monitor employees through electronic means, “there may exist less intrusive safeguards for employers” (Kesan 293).…

    • 1237 Words
    • 5 Pages
    Good Essays
  • Good Essays

    71% of employers alert employees to e-mail monitoring (AMA/ePolicy Institute 2007 Electronic Monotoring & Surveillance Survey)…

    • 832 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Malware is a danger to our virtual society and appears in a myriad of forms Worms, Viruses, Trojan Horses, Macro viruses, Spyware. More forms of malware are being developed every day known as zero-day attacks since they haven’t been seen before, some of these have the possibility to be a new form of malware and the rest will fit the types previously listed. These high-profile attacks have consumers and companies considering more high-technology defense strategies. There are countless others that don’t want to consider them and they are weak links in virtual security. Some vendors that control programs or features numerous customers use such as: power grid management, shipping software, hospital patient…

    • 1842 Words
    • 8 Pages
    Better Essays