Preview

Should Manager Monitor Emplee Email and Internet Usage

Satisfactory Essays
Open Document
Open Document
334 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Should Manager Monitor Emplee Email and Internet Usage
1. Should manager monitor employee email and internet usage? Why and why not? 2. Describe an effective email and web usage policy for a company? 3. Chapter 7: Monitoring Employees in Networks: Unethical or Good Business? 4. 1. Should managers monitor employee email and internet usage? Why or why not?

Yes, I do think they should monitor employee email or internet usage because it can impact the company’s success. Many employees take advantage of the internet accessibility at work and spend more time on the internet than deems necessary. Although it can be looked at as “big brother,” the company pays their employees to do work and provides these services because they are necessary for the work environment. The company needs to do what is best for its success and if they need to monitor their employees than they have every right to do so.

2. Describe an effective e-mail and Web use policy for a company?

An effective e-mail and Web use policy for a company would comprise of a detailed description of what employees are allowed and prohibited from doing while at work. This policy should allow employees at least 30 minutes a day for personal use. The company can also provide certain computers designated for personal use that their employees can have access to so that when off company time they can use these computers. This may prevent the company from being vulnerable to viruses and hackers because they can be connected to different networks/servers.. The policy can also allow employees to use the internet and e-mail for personal use when on lunch, break or off company time. It is important for the firm to make the work place comfortable and prevent it from feeling like they have no rights. This is why I feel the firm should try to accommodate personal e-mail and internet usage because some employees have very little time and emergencies may arise where they need to use these

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Implications differ form company to company. But many of the companies monitor their employees to make sure that they are not sharing company related information with people out of the company. Some companies monitors to make sure that employees are not using companies’ website during work hours.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    References: Morton, H. (October, 2002 10). Somerville college policy on staff use of email and internet. Retrieved from http://www.some.ox.ac.uk/cms/files/policy_on_staff_use_of_email_and_internet_Oct_02.pdf…

    • 1402 Words
    • 6 Pages
    Better Essays
  • Good Essays

    In NetworkWorld's The Perils of Privacy, Sharon Gaudin discusses the benefits of a company having a well-defined email policy. She provides the pros and cons of whether a company should invest in an email monitoring system. According to Gaudin, companies…

    • 377 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    We will watch how the users go about their daily activities on the company’s internet/network and make notes on what we see to be as an opposing threat to the company itself. Monitoring how much bandwidth is being used and for what, also if any employee tries to load out of company software or use flash drives from home will be locked out immediately and then be questioned about it.…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are only a few exceptions to the law in regards to a company monitoring their employee’s use of Internet or phone usage while on company time. One of these exceptions is called the “ordinary course of business”, it is stated that under this exception “the employer may monitor employee communications to ensure such legitimate business objectives as assuring quality control”(Nord, G.D., McCubbins, T., Horn Norn, J.; August 2006/Vol. 49, no.8).…

    • 384 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Develop and implement a structured flexible work environment security policy. A concise, structured policy for telecommuting…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Unit 4 Aup

    • 432 Words
    • 2 Pages

    The acceptable use policy is a set of rules that a corporation, organization or internet service providers, provide to their employees about the use of computers, networks and associated resources. These rules would state that not only just employees but users as well should not access the system areas where they are not authorized to, they would be held accountable for what all they do, they should only use to computer that was issued to them for purposes assigned to them, etc. These rules basically state that the computers are not to be used improperly or illegally during or after work hours at job sites. Verizon wireless “acceptable use policy” states that there should be no illegal use of their personal internet meaning that their services should only be used for lawful purposes only. This includes any unauthorized actions to illegal sites or violation of control laws. Their email use is prohibited for users to use illegally. NO commercial advertising or informational announcements are allowed. AT&T “acceptable use policy” prohibits any use of their services in any way illegally, unlawful, or harmful in any way to their company or any other company. Their AUP also doesn’t want any unauthorized access to pornography sites, inappropriate interaction with minors or threatening of material or contents. AT&T email services are not to be used for inappropriate emails or messages. Cox Communication email prohibits sending any unsolicited mail messages. Commercial advertising and informational email is spamming and prohibited as well. Their services are not to be used illegally for any purposes by users or employees. All three of these companies basically have the same laws/rules which from reading up on other companies are all the same but just worded differently.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Xcom/285 Privacy Laws

    • 321 Words
    • 2 Pages

    Friedman, B., & Reed, L. (2007, June). Workplace privacy: Employee relations and legal implications of monitoring employee e-mail use. Employee Responsibilities and Rights Journal, 19(2),…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Once all the information is ironed out I will position each specific user group based on their role for eligibility. I will ensure all wireless and mobile devices are company owned. Write a policy against transferring their personal number to their company owned mobile device. This will help in keeping the company wireless environment protected and secure. Policy will also cover the health of the devices. Maintaining it for a year contract. A policy for storing inappropriate photographs/ images is prohibited. I will also include policies against texting and driving unless you use a hands free device…..but express the usage and a risk in such an event or situation is needed.…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    There is much debate over what employers should and should not be able to do when it comes to monitoring the communications of individuals under their employment. There are those who feel that the rights of the individual are not limited to protection from the Government and employers have limited rights in regards to employee communication. There those that feel that the employer should have very little to no restraint in monitoring those under their employment. Going too far in either the employers or employee position can create an unproductive and unrealistic standard for a working environment. Employers must be able to create and maintain both a productive and safe working environment from their employees. However this does not mean employees should be subject to unreasonable and intrusive monitoring practices by their employer. Communication privacy laws and workplace policies should be carefully crafted to provided balanced protection both the interest of employer and employee.…

    • 735 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Business Law

    • 259 Words
    • 2 Pages

    Employers can bear legal responsibility if they do not adequately monitor their employees. This is why sometimes extreme measures are taken to keep track of employee's computer usage. There is a case from New Jersey several years ago in which a company was held liable by an appellate court because an employee transmitted child pornography from his workplace computer. The court ruled this way because the employer had a policy which stated that all email messages sent from the workplace were the property of the employer, and not the employee, along with evidence which showed that company officials knew the employee was viewing pornography on his computer but did not take adequate steps to shut down such activities or investigate the extent of the employee's violations of company policy. This is a very chilling opinion for employers to digest.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Employees have a reasonable expectation of privacy within the workplace; however there are circumstances when an employer has a legitimate right to monitor, investigate, and review the activities of its employees. The following identifies business practices that may be executed to ensure the integrity of company products and property, workplace safety, and the monitoring of employee productivity.…

    • 1493 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Informational privacy is extremely important. Your personnel emails should be private and the amount of privacy with your work email should have limits set forth by your employer. If someone has an email account and sometimes happens to them and they are not here no more should someone be able to read their emails? When Justin Ellisworth gave his life for his country, his parents tired to get access to read emails so that they can understand what was going on in his life before he gave the ultimate sacrifice to his country. Should Yahoo have given Justin Ellisworth parents access to his emails. At what point does our personnel informational privacy become something that is not private? This brings up another question: Should work emails be treated the same as personnel emails when it comes to the amount of privacy that we as individuals have?…

    • 578 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Privacy is something everyone should have the right to. In fact, the First and Fourth Amendment protects this right. A major issue evolving in today's workplace is the invasion of employees' privacy by the employer. Everyone has a right to privacy at home, but this right does not include the workplace. Many employers have started monitoring the actions occurring by the employees of their company while at work. One of the many ways of monitoring action is through accesses to employees email correspondence. Many employers have private email severs which they have access to. This action is used to prompt employees to handle work related emails only. What would happen if an employee access there personal email while at work? Would that personal email be subject to…

    • 540 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public accesses to the company’s externally-reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.…

    • 1461 Words
    • 6 Pages
    Good Essays