Justification Report to Installed Electronic Auditing Procedures to Monitor the Computer Use of Employees

Topics: Computer, Surveillance, Privacy Pages: 7 (2715 words) Published: June 24, 2013
1.0 INTRODUCTION
Imagining weight on a scale, when one goes up, the other one goes down. The natural order of life is the balance signaling there is always a price to pay for an achievement. In line with the explosion of the information and technology development, the quality of life has been literally perceived as jumping onto a higher level of realm. But on the other side of the scale is the humanity, the price to pay for such an advance achievement. Consequently there is the need to look into the matter on whether the technology should advance the humanity or it should be the otherwise. Therefore, this report will focus on the causes and the effects of the problems arisen, thus outlined few suggestions to overcome the issue before the spark triggered the fire. This report has been designed structurally from identifying the problem, the effect and subsequently discuss on the measurements to balance the order. There are lots of companies have run the electronic auditing procedures to monitor the computer use of the employees. They perceived this matter seriously because the future achievement is their priority. But is the implementation of the employee monitoring system is necessary is still under a heat debate because it deals with their privacy and individual right. We should make a clear statement that company computing systems are provided as tools for business and all information created, accessed, or stored using these systems are the property of the company and are subject to monitoring, auditing, or review. Even though the management has the authority to do so as the management is their source of income, but it is appropriate for the management to also look into their welfare as equal priority. Therefore, this report will focus on both side of the scale and dwell into both the benefits and the harms on implementing such a major monitoring system. Below (Diagram 1.0) is the finding of a research conducted by The American Management Association as published in the Business Week, December 2012 edition. Before we dealt with the issue, it is best for us to understand on how does the system works. Then only we will proceed on the why should we or should not we implement such system. First off, the system enable the administrator to overlook or monitor the employees screen using his/her own computer, to be exact, we can know what the employees are viewing or doing with their computer. This gives the advantage for the administrator to save a screen shot of the employee’s computer to be kept as evidence in the time to come. Next, the administrator can also access in to the employees computer at any time, any will, as if we are using the employees’ mouse and keyboard. With that, the administrator can turn off or terminate the non-work related program accessed by the employees. On the other hand, the administrator can as well have access into all of the documents, folders and the program installed or downloaded into the computer, even without the employees’ consent. Diagram 2.0 can best summarize the whole idea of the employees monitoring system.

Diagram 1.0 Reasons for implementing the Employee Monitoring System

Diagram 2.0 Example of the layout of the Computer Monitoring Software

2.0 CAUSE AND EFFECT
A drop of water can spoil the whole pot of milk. Sometimes precautions are essential to make sure things are in order. In nowadays life, the world is but at the fingertips. Most of the information is accessible anywhere anytime with the internet network so well established. It is no doubt the digital world evolves and still evolving in a drastic manner that brings the world into the greater level of live. But ironically, the money value for the technology drops steadily compare to the drastic development of the cyber world. We are getting a first class infrastructure development with an increasing transferring speed into the...

References: Jaya Pushani P. (et. Al.). (2011). Business Reports: Types of Short Reports; Justification Reports. In Editorial Unit (Eds.), OUMH2203: English for Workplace Communication. (13th ed., pp. 168). Sri Kembangan: Meteor Doc. Sdn Bhd.
Boxman RL.(2005). How to Write a Good Paper.[Online]. Available: http://www.isdeiv.tavrida.com/instructions.ppt .[2013, February 14]
Boone K. (2004). How to Write a Technical Report.[Online] Available: http://www.kevinboone.com/howto_report.html, [2013, February 15]
LAN Employee Monitor Preview. (n.d). [Online]. Available: http://www.supershareware.com/preview/lan-employee-monitor.html . [2013, February 15]
Jason (2010). Employee, Interruped - Internet use in Today 's Workplace. [Online]. Available:
http://nchsoftware.blogspot.com/2010/10/employee-interruped-internet-use-in_29.html . [2013, February 15]
Issues to consider when implementing an employee monitoring program. (2005). [Online]. Available:
http://www.techrepublic.com/article/issues-to-consider-when-implementing-an-employee-monitoring-program/5615878 . [2013, February 15]
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Uses of Computers Essay
  • Should Employees Be Allowed to Use Work Computers for Personal Use? Essay
  • Electronic Surveillance of Employees Essay
  • A Report On Electronic Gadget Use In Pr Essay
  • Leg 500- Electronic Surveillance of Employees Essay
  • Essay about The Advantages and Disadvantages of Computer Use
  • Legal and Ethical Aspects of Electronic Monitoring and Surveillance of Employees” Essay
  • Justification Report Essay

Become a StudyMode Member

Sign Up - It's Free