Preview

Electronic Mail, Internet and Privacy Policy In The Work Place

Powerful Essays
Open Document
Open Document
1201 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Electronic Mail, Internet and Privacy Policy In The Work Place
Electronic Mail, Internet and

Privacy Policy In The Work Place

Myatical Sweets

Business Communication 285

March 8, 2012

Mister Kevin Barns

As of February 2011 there are few laws regarding the employer monitoring of

employees’ email or internet use, but there are many companies that have included

policies in handbooks, memos and presentations presented to employees. According to

Privacy Rights Clearinghouse fact sheet seven, two thirds of surveyed, by American

Management Association and ePolicy Institute 2007, employers monitor employee

internet use. Employers’ main concern for the monitoring: “inappropriate surfing”. 65%

use software to block connections to web sites deemed off limits for employees. This is a

27% increase since 2001 when the survey was first conducted. Employers are concerned

about employees visiting adult sites with sexual content, as well as games, social

networking, entertainment, shopping and auctions, sports, and external blogs. Of the 43%

of companies that monitor e-mail, nearly three-fourths use technology to automatically

monitor e-mail. And 28% of employers have fired workers for e-mail misuse. Close to

half of employers track content, keystrokes, and time spent at the keyboard. And 12%

monitor blogs to see what is being written about the company. Another 10% monitor

social networking sites. Almost half of the companies use video monitoring to counter

theft, violence and sabotage. Of those, only 7% state they use video surveillance to track

employees’ on-the-job performance. Most employers notify employees of anti-theft video

surveillance (78%) and performance-related video monitoring (89%).

Research in the Indiana General Assembly provided three bills about workplace

monitoring of an employee. First is: Bill 1545, DIGEST OF HB 1545 (Updated January

23, 2001 1:13 PM - DI 96)



Citations: amendments. Effective: July 1, 2012.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    For starters, the security policies for account management need to be updated. The user’s password needs to changed every 90 days. Any employee that has remote access should have a token key on a USB drive that provides the user’s credentials. When an employee retires, quits, or gets fired, they accounts should be locked until IT administrators can go through the account.…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Project Part 1

    • 348 Words
    • 1 Page

    Access to the company network will be secured by multiple firewalls set up with our routers. Firewall filters will be set up with a specific list of allowed users and programs. All other traffic will be blocked by default until it has been approved by IT. There will be a limited number of wireless access points around the building, with password access. These passwords will be changed on a regular basis. Access to the local network will be secured by user authentication passwords. Users will be limited to only the system resources that they absolutely need to complete their work. Users’ passwords must be changed every 90 days.…

    • 348 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Limit unauthorized use of network resources by allowing access during businiess hours only. Do not allow remote access permitions to anyone, except those that…

    • 563 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Employees will be also using the workstation domain is where they will connect to the company’s network. Tight security and access controls will be enforced on company equipment and users must have proper access rights…

    • 539 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Company A is an organization with a moderate amount of employees that occupies three locations within one city. The three locations are connected via fast network connections and the IT/IS Administration is centralized with the helpdesk. Employees have the ability to utilize computers and printers within their department, but are not allowed to use these devices located in other departments. In addition, HR information is restricted to that department as well as the executive offices, which have access to all locations and data.…

    • 327 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Project Pt 1

    • 338 Words
    • 2 Pages

    1.) User domain proposal: Track and monitor abnormal employee behavior and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on Acceptable use policy (AUP) monitoring and compliance.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Define a LAN-to-WAN, Internet, and Web surfing AUP that restricts usage of the company’s Internet connection and permits the company to monitor usage of the corporate Internet connection. Carefully evaluate the implications of each policy and how implementations might impact the IT infrastructure, both positively and negatively. Weigh the benefits and the disadvantages of each method. Consider whether or not a proposed solution causes an interruption to the legitimate users and how it might bring security at the expense of preventing a perfectly legitimate…

    • 272 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Grant Wiggins, the protagonist African-American main character in A Lesson Before Dying, has a tone that develops dramatically beginning with his initial malleable attitude, developing into serious intrigue in formerly-charged-to-death inmate, Jefferson. Scout Finch, protagonist Caucasian main character in To Kill a Mockingbird, seems to have generally a consistent spunky and energetic tone throughout the novel, with a coming of age spin. Both characters face their personality and race in effect with their tone.…

    • 74 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    shootings. With no data being brought forth on the number of police shootings, it is hard to tell…

    • 2481 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    In his interview, “Robert Ebert: The Essential Man [Excerpts]”(2010), Chris Jones informs that Robert Ebert’s sickness did not make him fear death, but rather appreciate life. Jones develops this information with the flashback of Ebert’s usual life as a movie critique, his life while fighting cancer, and then his values near death. Chris Jones's purpose is to inform in order for us to understand how Ebert’s hardships during his cancer allowed him to value life. Jones uses an empathetic tone with his caring audience who has lost loved ones.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    6. Use blocking software. If you’re doing work, you can use various types of software to shut yourself off from the Internet, or at least from the most distracting portions of it. For example, you can use software to temporarily block your email or social media accounts— whatever your worst distractions are, you can block them selectively.…

    • 833 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Internet use at Richman is only authorized to conduct Company business only. Internet use can easily allow hackers to see confidential Company information and allow viruses. This allows the hackers to get passwords and other important things. Which is why we want the staff at Richman’s to only use the internet for business only and business only sites. Employees can only check their business…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 326 Words
    • 2 Pages

    Pros is that restrictions would help prevent from viruses and other security issues as well as keep employees on task. They would not be able to browse the web for fun.…

    • 326 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Finance is the study of applying specific value to things individuals own to include services used and decisions determined [Finance by Cornett, M. M., Adair, T. A., & Nofsinger J. (2014). M: Finance (2nd ed.)]. In simple words, finance is how much value is attributable to goods and services and the basis of such attribution.…

    • 1150 Words
    • 5 Pages
    Good Essays