Preview

Electronic Mail, Internet and Privacy Policy In The Work Place

Powerful Essays
Open Document
Open Document
1201 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Electronic Mail, Internet and Privacy Policy In The Work Place
Electronic Mail, Internet and

Privacy Policy In The Work Place

Myatical Sweets

Business Communication 285

March 8, 2012

Mister Kevin Barns

As of February 2011 there are few laws regarding the employer monitoring of

employees’ email or internet use, but there are many companies that have included

policies in handbooks, memos and presentations presented to employees. According to

Privacy Rights Clearinghouse fact sheet seven, two thirds of surveyed, by American

Management Association and ePolicy Institute 2007, employers monitor employee

internet use. Employers’ main concern for the monitoring: “inappropriate surfing”. 65%

use software to block connections to web sites deemed off limits for employees. This is a

27% increase since 2001 when the survey was first conducted. Employers are concerned

about employees visiting adult sites with sexual content, as well as games, social

networking, entertainment, shopping and auctions, sports, and external blogs. Of the 43%

of companies that monitor e-mail, nearly three-fourths use technology to automatically

monitor e-mail. And 28% of employers have fired workers for e-mail misuse. Close to

half of employers track content, keystrokes, and time spent at the keyboard. And 12%

monitor blogs to see what is being written about the company. Another 10% monitor

social networking sites. Almost half of the companies use video monitoring to counter

theft, violence and sabotage. Of those, only 7% state they use video surveillance to track

employees’ on-the-job performance. Most employers notify employees of anti-theft video

surveillance (78%) and performance-related video monitoring (89%).

Research in the Indiana General Assembly provided three bills about workplace

monitoring of an employee. First is: Bill 1545, DIGEST OF HB 1545 (Updated January

23, 2001 1:13 PM - DI 96)



Citations: amendments. Effective: July 1, 2012.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For starters, the security policies for account management need to be updated. The user’s password needs to changed every 90 days. Any employee that has remote access should have a token key on a USB drive that provides the user’s credentials. When an employee retires, quits, or gets fired, they accounts should be locked until IT administrators can go through the account.…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Company A is an organization with a moderate amount of employees that occupies three locations within one city. The three locations are connected via fast network connections and the IT/IS Administration is centralized with the helpdesk. Employees have the ability to utilize computers and printers within their department, but are not allowed to use these devices located in other departments. In addition, HR information is restricted to that department as well as the executive offices, which have access to all locations and data.…

    • 327 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Limit unauthorized use of network resources by allowing access during businiess hours only. Do not allow remote access permitions to anyone, except those that…

    • 563 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Project Pt 1

    • 338 Words
    • 2 Pages

    1.) User domain proposal: Track and monitor abnormal employee behavior and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on Acceptable use policy (AUP) monitoring and compliance.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate…

    • 272 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    6. Where would you put a content filter system in place to prevent employee from non-business use of the Internet connection? Explain why. At the firewall because it can intercept specific content in a packet before it reaches its destination.…

    • 542 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    shootings. With no data being brought forth on the number of police shootings, it is hard to tell…

    • 2481 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    6. Use blocking software. If you’re doing work, you can use various types of software to shut yourself off from the Internet, or at least from the most distracting portions of it. For example, you can use software to temporarily block your email or social media accounts— whatever your worst distractions are, you can block them selectively.…

    • 833 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Aup Definition

    • 326 Words
    • 2 Pages

    Pros is that restrictions would help prevent from viruses and other security issues as well as keep employees on task. They would not be able to browse the web for fun.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    This is an easier crime in which to establish a strategic plan that would put an end to such crimes. There are four types of crimes that are classified as a property crime, they are burglary, theft, motor vehicle theft, and arson. Property crimes involve the taking of money or property and are high volume crimes with the target often being cash, electronics, such as televisions, power tools, cameras, and jewelry. According to the statistics from the F.B.I’s Preliminary Semiannual Uniform Crime Report, January - June of 2012, “The number of violent crimes reported by law enforcement for the first six months of 2012 increased 1.9 % over the figures from the same time period in 2011. Property crimes rose 1.5%.” To further break down this figure, there was a 1.9% increase in larceny-theft crimes, 1.7% increase for motor vehicle theft, and 0.1% increase for burglary. Current trends suggest that there will be an increase in property crime in…

    • 1275 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Setting Up a Vpn

    • 411 Words
    • 2 Pages

    6. Create a list of approved users Internet Protocol (IP) addresses and deny traffic not originating from a listed address. This process is often…

    • 411 Words
    • 2 Pages
    Good Essays