Preview

Organizational Policy - Computer Monitoring

Good Essays
Open Document
Open Document
945 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Organizational Policy - Computer Monitoring
Cynthia Gallo
IFSM 304
James Jones
October 9, 2011
ORGANIZATIONAL POLICY – COMPUTER MONITORING
Introduction
An organizational policy as defined by Tutorialspoint.com is a principled adopted by a company or an organization set in place to determine and influence decisions established by senior management (2011). According to Murugan Anandarajan’s book, The Internet and Workplace Transformation: Advances in Management Information Systems, it states “As guidelines, organizational policies may discipline computer use and Internet access, helping employees understand what behaviors are acceptable or not” (2006). Misuse of company resources have led to companies reevaluating the guidelines and policies currently in place. Developing a new organizational policy to address the issue of computer and internet usage and addressing the ethical dilemma of employee computer monitoring is essential for the well-being and productivity of the company.
Organizational Policy
When accessing the company’s network (on-site or remotely), employees must limit personal computer and internet usage only during their allocated break and lunch times. During these times, internet and computer usage must be appropriate. In the case there is reasonable suspicion that an employee is in violation of this policy, the company holds the right to monitor computer activity. The company holds the right to terminate an employee based on information found after monitoring their workstation. If the offense does not deem a termination, computer training will be conducted for the employee to reestablish comprehension of proper use of company resources.
How will this help the Company The policy in place will help the company by assuring all employees are not misusing company resources and productivity is maintained. “Employees who access inappropriate sites pose serious legal liabilities for the organization” (Young, 2010), which means applying the policy can reduce these risks significantly.



References: Anandarajan, M. (2006). The Internet and Workplace Transformation: Advances in Management Information Systems Friend, L. (2010). “Benefits and Effects of Computer Monitoring in the Workplace.” Chron Small Business CMMI Glossary (2011). “Organizational Policy”. Tutorialspoint.com. Retrieved October 8, 2011 from http://www.tutorialspoint.com/cmmi/cmmi-glossary.htm#O Reynolds, G.W. (2010). Ethics in Information Technology (3rd Ed.). Boston, MA: Course Technology. Young, K. (2011, February) “Management Wise: Killer Surf Issues: Crafting an Organizational Model to Combat Employee Internet Abuse.” Information Management October 6, 2011 from http://content.arma.org/imm/IMMJanuary- February2010/IMM0110managementwisekillersurfissues.aspx

You May Also Find These Documents Helpful

  • Good Essays

    Web page and search engines are very helpful and can provide a lot of information at an employee’s fingertips, however if these programs are not monitored they can be abused by personal use of employees. Managers and other department supervisors should monitor the use of email, instant messaging, web pages, and search engines because it is important to…

    • 346 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    This section of the employee handbook is provided as a guideline for employees to understand the company policy and procedures regarding privacy in the workplace. While this section cannot address every possible scenario that may occur, the general policy will serve as a basis of understanding the key workplace issues and employee privacy. This section addresses privacy issues related to personal background information, off-work activities, and the corporate policy on the use of electronic monitoring. These privacy policies are designed to both provide a clear guideline for employees on the difference between job related and personal privacy. The policies are designed to create a standard set of procedures that apply equally to all employees. The company goal is to provide a fair workplace for everyone, while at the same time protect the organizations professional reputation. The privacy policies are all in compliance with state, federal, and international laws.…

    • 1411 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Why: Management should define the policies for the reason to use the Internet, how to use the Internet, responsibilities of the person online, and consequences for in appropriate use. This will allow the IS department to take measures to ensure security over the Web, while still allowing for successful business to be conducted.…

    • 545 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Acct Internal Control

    • 716 Words
    • 3 Pages

    The first internal control should be implemented within the human resources department which is the human resources control to define the policies and procedures for hiring practice of LBJ Company. The human resource department will have the expertise to establish policies that speak directly to the proper acquisition, promotion, benefits, and termination of all future and current employees. A full background check will be conducted on each individual who are seriously vetted for a position within LBJ. This process will eliminate the embarrassment experience by the president recently. In addition to the background checks being put in place for all employees, the principle of establishing responsibility control is needed to ensure that every employee has accountability to themselves and LBJ. This will be done by introducing a computer usage agreement signed and placed in each employee file. Having this legal and binding agreement with the employees and LBJ, will state the policy of use of all computer systems within the company and the recourse if said agreement is violated and mandate that each user have a username and password to be changed every 45 days. With the usage of common access cards or username and password combination will readily identify anyone who is engaging in illegal activities on the company’s asset by…

    • 716 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Negative Message

    • 285 Words
    • 2 Pages

    As you know, we notified all employees last month by memo that computer use will be monitored and should be limited to work related projects. We have taken a step further in this regard to inform that employee personal blogs have also been included in the monitoring system with immediate effect. Please be advised, before implementing these new policies, we worked with our legal team to ensure that the policies and penalties were both, fair and legal.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Internet and the Workplace

    • 1937 Words
    • 8 Pages

    However, in addition to using the Internet, especially the World Wide Web and e-mail for work-related purposes, employees are also using the Internet for personal use, whether for sending personal e-mail messages, playing games, downloading pornography, ordering goods online, checking stock prices, or gambling. Accordingly, many issues have come to light involving employee e-mail and Internet use. Employers have to question how much, if any, personal use of the Internet and e-mail to permit in the workplace. Employers are also grappling with the question of whether to monitor Internet use and whether to block access to certain…

    • 1937 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Speculate whether employers should have more or fewer rights to monitor employee use of company equipment, such as laptops, tablets, and cell phones issued for out-of-office, potentially after-hours work. Suggest at least three methods for an employer to monitor its employees’ use of company equipments. Provide a rationale for your response.…

    • 297 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Behaviors such as transferring files from a work device to a home computer that is not protected or maintained to IT’s standards, using personal communications that are not as safe as corporate communications, talking about sensitive company matters where others can hear the conversation, and failing to use a laptop privacy guard when working remotely in a public place all invite information theft. Employees also fail to safeguard equipment such as laptop computers and portable storage devices, which can be lost or stolen (Cisco Systems, 2008, p 5).…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Acceptable Use Policy

    • 1267 Words
    • 6 Pages

    The AUP (acceptable use policy) that I want to focus on is one that governs internet usage. Acceptable use policy regarding internet usage normally includes information about websites that are off limits as well as defining a scope for what sites are allowed to be accessed for personal surfing. Most AUP’s are put in place to protect the company’s employees, partners and the company itself from any illegal or damaging actions by individuals knowingly or unknowingly. Confidentiality, integrity and availability are the founding stables of insuring that information is secure. An acceptable use policy enforces confidentiality, integrity and availability by limiting access and disclosure to authorized users -- "the right people" -- and preventing access or disclosure to unauthorized ones -- "the wrong people.”, as well as requiring employees to authenticate themselves in order to control access to data system resources and in turn hold employees responsible if violations occur under their user id.…

    • 1267 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Safety Policy” covering the filtering discussed above. For minors, the policy must also address monitoring of online activities, the safety and security of all forms of direct electronic communications, unauthorized online access, and unauthorized disclosure of personal identification information.…

    • 1205 Words
    • 5 Pages
    Better Essays
  • Better Essays

    The internet 's rapid spread and growth in popularity among the public meant that people were using it for communication and education in their everyday lives. As employees spent more time at the office, the demand to use the internet for personal use was growing. Though the official company policy was that internet usage must be for business purpose, the decision was made to step back from that policy and let employees use search and email functions for personal use. Waterbee chose to monitor employees usage, but the results after the first week were surprising. For example, one employee spent an entire day on playboy.com. This employee did not work in his own office, which meant other employees could see his monitor. The Security team, faced with taking action on a number of employees, and complicated by legal issues, then advised HR to stop monitoring usage. HR, however, stuck to the orignal plan and took action on the employees who misused the Internet.…

    • 827 Words
    • 4 Pages
    Better Essays
  • Better Essays

    IT policies and procedures in any organization provides a framework for appropriate and inappropriate use of computing and information resources (Winniford, et al, 2012). More specifically, the organization would have in writing that using a computer system without proper authorization granted through Briargrove’s Administration would have adverse actions on their…

    • 1283 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Computer and Internet technology use in the workplace gives rise to questionable ethical practices among employees as well as managers. For the last three (plus) decades the increasing availability and advances in technology has improved productivity; however the use of computers and Internet in the workplace leads to temptation to misuse the resource for personal gain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    employees can have a “reasonable expectation of privacy in their use of e-mail and internet” at…

    • 1089 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    HRM3704

    • 5092 Words
    • 17 Pages

    [To be issued by employer to staff governing authorised use of internet and email facilities assuming that limited personal use is permitted]…

    • 5092 Words
    • 17 Pages
    Powerful Essays