Preview

Due Diligence: an Employer’s Responsibility to Monitor Employee Computer Use

Powerful Essays
Open Document
Open Document
1781 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Due Diligence: an Employer’s Responsibility to Monitor Employee Computer Use
Due Diligence:
An Employer’s Responsibility to Monitor Employee Computer Use

Are some employers in denial? Like the frog in the pot story, the gradual introduction of complicated electronics into the workplace has left some employers behind in their knowledge of how computer use potentially affects the workplace. While not completely unaware of these dangers, by the time the water heats up beyond jumping out of trouble, they potentially have put their company at risk, if not already in legal woes. This paper is for the employers who are not monitoring, for whatever reason. The three topics presented here concerning production loss, security threats, and a desire to safeguard company reputation should trigger a change from the status quo. Most employers are mindful of and concerned with the wasting of productive work hours with non-work Internet use. Employees who surf the web outside of work-related tasks, play online computer games, and a myriad of other things for personal use rob their company blind. Many staff are just naive of the monetary toll this takes on the company. Equally, employers are sometimes engrossed with other things to notice. Fortunate companies are able to hire IT professionals who can monitor usage. Now, we tend to think of the Internet as the major culprit, but actually this could be any type of personal use. It does not require the Internet. There are games often resident on a computer just waiting for a taker. It just so happens that in many cases where online access is available, the Internet is the door to company productivity loss. In the working world, it is known as goldbricking, cyberslacking, cyberloafing, to name a few. So how does cyberloafing financially affect the company? Say an employee takes .5 hours a day to surf, shop, or whatever else during work hours. Looking at this cost systematically, we begin with adding up the per day use of .5 hours for an entire week. At the end of the week, we have 2.5 hours



Cited: “How to Protect Against Malicious Software.” UCLA Seasnet Computing Facility. n.d. Web. 5 July 2012 "Sexual Harassment." Title 29 Code of Federal Regulations, Pt. 1604.11. “Breaches Affecting 500 or More Individuals”. Health and Human Services. n.d. Web. 11 Jul 2012 “2007 Electronic Monitoring & Surveillance Survey: Over Half of All Employers Combined Fire Workers for E-Mail & Internet Abuse”. Electronic Discovery Navigator. 29 February 2008. Web. 15 July 2012 “Electronic Monitoring: A Poor Solution to Management Problems.” National Workrights Institute. n.d. Web. 14 July 2012.

You May Also Find These Documents Helpful

  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Behaviors such as transferring files from a work device to a home computer that is not protected or maintained to IT’s standards, using personal communications that are not as safe as corporate communications, talking about sensitive company matters where others can hear the conversation, and failing to use a laptop privacy guard when working remotely in a public place all invite information theft. Employees also fail to safeguard equipment such as laptop computers and portable storage devices, which can be lost or stolen (Cisco Systems, 2008, p 5).…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    NT2580 Introduction to Information Security Unit 2 Application of Security Countermeasures to Mitigate Malicious Attacks © ITT Educational Services, Inc. All rights reserved. Learning Objective Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure. NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    A world city is a large city that has been outstripped its natural urban network and become part of an international global system. World cities have become the central connecting point for the multiplicity of linkages and interconnections that sustain the contemporary world economy, and its social and political systems. According to the 2004 GaWC studies world cities can be ranked based on their provision of ‘advanced producer services’ such as accountancy, advertising, finance and law. In 2008 the rankings according to the GaWC determined that London and New York were Alpha ++ cities whilst Sydney, Paris, Hong Kong and Singapore were Alpha +. These world cities are essential within the globalised world economy with their main role being as powerful centres of economic and cultural authority.…

    • 827 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    Ghosh, A., & Cigital, M. An Approach to Defending Against New and Unknown Malicious Software. Retrieved Feb 16, 2012, from http://www.cigital.com/resources/papers/…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Satisfactory Essays

    Case Study

    • 563 Words
    • 3 Pages

    Helen Barnett is a supervisor of 15 customer service representatives for National Insurance, a company specializing in home insurance. Helen was surprised on what she was seeing on the computer screen of one of her employees, James Erskine, a picture of an ongoing sexual act. Customer Service Representatives assist clients with claims, insurance quotes, and other queries. These representatives each have cubicles that are furnished with a computer, a desk, and a phone headset, but of course Helen Barnett, the supervisor has her own office. National Insurance is a company that efforts in making greater use of electronic technology in servicing its clients. One of the representatives named James Erskine had been employed with the company for the last six months and on his 90-day performance review, he got a satisfactory. However, Lorraine Smalls is a co-worker who sat on the cubicle close to Erskine was the one who discovered the pictures when she quickly tried to recover some data to respond to a customer when her computer malfunctioned. It was not unusual for representatives to use another staff member’s computer. Smalls immediately called Barnett and as she viewed the browser, it shows that the website was viewed more than a dozen times that morning. As a supervisor, she wanted to confront him about using company time in such an unproductive manner. When Erskine returned from lunch, he was confronted and he immediately reasoned that he visited the site during break time and felt that it was an invasion of his privacy/ Barnett told him that she would report to the Human Resource Manager but Erskine himself went to the Manager, Dale Gibbons and expressed how he was violated. The HR Manager then told him that every one should have access to the company’s computer for related purposes and on the other…

    • 563 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Web page and search engines are very helpful and can provide a lot of information at an employee’s fingertips, however if these programs are not monitored they can be abused by personal use of employees. Managers and other department supervisors should monitor the use of email, instant messaging, web pages, and search engines because it is important to…

    • 346 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    The Employee handbook plays an important role in communicating the organization's policies as well as rules and regulations. It gives the employee a source to understand some of the responsibilities, benefits, wages, appraisals and restrictions of both the employee and the employer. One of the main areas of the handbook deals with privacy issues in the workplace. There are several areas to consider when writing a privacy policy. These areas include: the privacy rights issues that are addressed, the company's position in response to privacy rights issues, privacy protections to limit the company's liability, privacy protections to enhance employee motivation and productivity, ethical considerations and different ways to address state, federal, and international laws.…

    • 1493 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Mla vs. Apa

    • 1237 Words
    • 5 Pages

    Even though many companies now routinely monitor employees through electronic means, “there may exist less intrusive safeguards for employers” (Kesan 293).…

    • 1237 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Xcom/285 Privacy Laws

    • 321 Words
    • 2 Pages

    Friedman, B., & Reed, L. (2007, June). Workplace privacy: Employee relations and legal implications of monitoring employee e-mail use. Employee Responsibilities and Rights Journal, 19(2),…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Employee monitoring has emerged as a necessity and yet as a very controversial issue due to the widespread use of technology. Employee monitoring is the act of watching and monitoring employees' actions during working hours using employer equipment/property. This phrase can be a little scary as an employee, where is the line? The restroom is their property; thankfully there are employers who know their boundaries. Legally employers are continuing to monitor their employees. The only issue that seems to be addressed is how much they can monitor them.…

    • 1403 Words
    • 6 Pages
    Better Essays
  • Good Essays

    71% of employers alert employees to e-mail monitoring (AMA/ePolicy Institute 2007 Electronic Monotoring & Surveillance Survey)…

    • 832 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Technology Within Business

    • 1322 Words
    • 6 Pages

    Firstly, by having technological advancements as the most imperative goal in businesses it can result in a dependency on technology. Dependency means that the company’s main reliance is on technology in order to function. Therefore if the technology fails then the business can become unsuccessful. For example this reliance on technology was made evident when the computers that ran the power for Melbourne tunnels failed in October 2012 and resulted in the Melbourne tunnels being shut down (ABC, 2012, para 1). On the other hand, technology can result in a more efficient workplace and work environment. For example Intel has increased their productivity through wireless notebooks by five percent per employee (Rungta, Tierney, Towles, 2008, p2). However when technology does breakdown it can cause larger problems such as, a loss of customer reliability and data los. This was made evident when a fault occurred in Commonwealth Bank Automated Teller Machines and online banking system in March 2012 and resulted in customers being able to overdraw their account (Zappone, 2012, para). Therefore, organisation’s need to focus on strategies that allow people to work with minimal technology. Hence, it is evident that companies should not depend on technology because it is not always reliable and can negatively affect a businesses performance. Therefore technological advancements should not be imperative for a business today.…

    • 1322 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Cyberslacking is a prominent occurrence amongst the Hammer Wines employees. However, of all employees, the Receptionists spent the longest time on the Internet throughout the one-week trial (see figure 1.0 below). This may or may not be detrimental to Hammer Wines. Often, receptionists complete their work before their set time, meaning that if they’re browsing the Internet, still answering their phone and have completed required work, productivity will remain normal. Studies also show productivity can increase when employees are less restricted with the Internet. This productivity can swing both ways. Negative productivity will be detrimental to Hammer Wines if the receptionist fails to multitask and therefore ineffectively completes required jobs.…

    • 966 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Malware is a danger to our virtual society and appears in a myriad of forms Worms, Viruses, Trojan Horses, Macro viruses, Spyware. More forms of malware are being developed every day known as zero-day attacks since they haven’t been seen before, some of these have the possibility to be a new form of malware and the rest will fit the types previously listed. These high-profile attacks have consumers and companies considering more high-technology defense strategies. There are countless others that don’t want to consider them and they are weak links in virtual security. Some vendors that control programs or features numerous customers use such as: power grid management, shipping software, hospital patient…

    • 1842 Words
    • 8 Pages
    Better Essays