Top-Rated Free Essay
Preview

Hello

Powerful Essays
1175 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hello
1. hello Increased Employee Productivity * Companies that monitor employee computers report increased employee productivity when they implement this type of policy. According to the Computer Monitoring website, most employees use company computers for non-work-related activities, such as online shopping, games, stock trading, personal emails, instant chat conversations and music downloads. This adds up over time, and companies can lose money when their employees are getting paid for non-productive hours.
Atmosphere of Distrust * One of the major disadvantages of implementing employee computer monitoring programs is that it can create a tense work environment. Some employees may feel as if the management team doesn't trust them, and this can lead to job dissatisfaction and turnover. Most young workers are so accustomed to the different Internet tools, they may be discouraged from working for a company that blocks them from certain websites or prohibits any type of non-work-related computer activities.
Personal vs. Professional Time * If your company culture includes non-traditional work hours, such as regular overtime, working lunches and company-issued laptops or smartphones, you may be faced with issues when implementing a computer monitoring policy. When employers expect employees to be on call at all hours, including responding to emails or phone calls during non-working hours, then there is a fine line between personal and professional time. For example, if you don't want your employee to leave the office for his allotted hour lunch break, then he should be allowed to take care of personal business during the workday.
Sponsored Links * Company Owners Advice
Businesses, Get Expert Advice On Staffing Issues. Call 0844 499 3740 www.Employersdirect-uk.org * Ask: Employment Law
A Solicitor Will Answer in Minutes! Questions Answered Every 9 Seconds.
Employment-Law.JustAnswer.com
* Internet Monitoring
Monitor Employee Internet, Network & Email use. Download free trial www.Webspy.com/Internet-Monitoring * IT Network Management
Award Winning Management Software. Grab The Evaluation For Free Today! whatsupgold.com/Network-Traffic Related Searches * Employee Web Monitoring * Monitoring Computers * Employer Employee Rights * Employee Harassment Law * Employee Discrimination
More from eHow * Salaried Employee Rights * Overtime Labor Laws for Salaried Employees
More to Explore * David Petraeus Reveals the Price for Sex at Work: Your Job (Take Part) * How Intel will fare in the post-Otellini era (PC World)
What's this? This content unit connects website visitors with interesting articles, stories and videos. View Privacy Policy
References
* Computer Monitoring: Added Benefits? * Texas Workforce Commission: Monitoring Company Computers and the Internet * Photo Credit Ryan McVay/Photodisc/Getty Images
More Like This * Writer Pros & Cons * Pros & Cons of Single Computers Vs. Computer Labs in School * Pros & Cons of the Use of Computers
Comments
You May Also Like * What are the Pros & Cons of Email Monitoring?
What are the Pros & Cons of Email Monitoring?. In a time where security and safety in the workplace are important considerations... * Types of Workplace Surveillance
Employers use workplace surveillance to monitor electronic communications and other behaviors of their employees. Surveillance tools also monitor behaviors of people ... * Cons of Employee Privacy Rights
Employee privacy rights pose disadvantages particularly for employers. asian woman image by huaxiadragon from Fotolia.com * The Disadvantages of Online Transaction Processing
Online shopping can have an ugly side. online shopping guy image by patrimonio designs from Fotolia.com * Example of an Employee Privacy Policy for a Company
Advanced technology and increasingly sophisticated work rules require employers to implement employee privacy policies. Policies that address privacy issues protect ... * What Are the Pros & Cons of Being a Computer Technician?
The use of computers in the workplace and in personal life is fueling jobs for computer technicians. This job requires not only... * What Are the Benefits of Computer Forensics?
Computer forensics specialists assist in legal investigations involving computers. man thinking about internet security image by patrimonio designs from Fotolia.com * Pros & Cons of Company Policies & Procedures
Company policies and procedures outline the way business is conducted within that organization, providing guidelines for both employees and managers. Policies and... * The Advantages & Disadvantages of Workplace Monitoring
The advancement of technology in the workplace has had many effects on how employees fulfill their duties -- and how employers manage... * Difference Between Exempt & Non-Exempt Employees in Florida
Though the U.S. federal government defines differences between exempt and non-exempt employees in the Fair Labor Standards Act, or FLSA, some states... * Cons of Outsourcing Professional Computer Technicians
Cons of Outsourcing Professional Computer Technicians. Many companies are attempting to save money by outsourcing their expensive information technology services. * Pros & Cons of Using a Monitor to View TV
Pros & Cons of Using a Monitor to View TV. When an older computer monitor has been replaced by a newer model,... * Pros and Cons of Employee Benefits
Employee benefits, once considered a nicety afforded to high-ranking company officials, has become a crucial corporate attraction. In an era of constantly... * Staffing Agency Training
In the fast-paced and competitive world of staffing, industry knowledge and strong business skills are required for a staffing agency to succeed.... * Should Managers Monitor Employee Email & Internet Usage?
Almost three-quarters of American businesses check up on what their employees do online. Supporters of monitoring say the practice is necessary to... * Pros & Cons of Employee Empowerment
Pros & Cons of Employee Empowerment. An empowered workforce is one where employees are given the authority to make the daily decisions... * Pros & Cons of a Desktop Computer
Pros & Cons of a Desktop Computer. Desktop computers used to have higher storage capacities and faster processors than laptop computers. However,... * Pros & Cons of Business Courses
Determining the pros and cons of business courses can be subjective, but considering a business course is always an option to fulfill...
Related Ads * Employee Web Monitoring * Monitoring Computers * Employer Employee Rights * Employee Harassment Law * Employee Discrimination
Check It Out

Tax Time: Helpful Apps, Refund Tips and More

You May Like *

Pros & Cons of the Use of Computers *

Pros & Cons of Computer Languages *

Pros & Cons of a Desktop Computer *

Pro & Con List for the Uses of Computers *

Pros & Cons of Taxes *

Pros & Cons About Computer Keyboards *

The Pros & Cons of Alternative Schools *

Pros & Cons of Debt
Featured

Free Ways to Do Taxes On Your Smartphone
Check It Out
Low-Cost Project: Diagonal Bookshelf
View Photos
5 Big Tax Trends for 2013
Read Article
Others Also Viewed * -------------------------------------------------
Pros & Cons of ISO 14001 * -------------------------------------------------
How to Use Your Computer As a Surveillance Device * -------------------------------------------------
The Pros & Cons of Work Performance Through Computers * -------------------------------------------------
The Pros of Monitoring Employees at Work * -------------------------------------------------
Pros and Cons of Business Technology ehow.com -------------------------------------------------
Top of Form

Bottom of Form * About eHow * eHow Blog * How to by Topic * How to Videos * Sitemap
© 1999-2013 Demand Media, Inc.
Use of this web site constitutes acceptance of the eHow Terms of Use and Privacy Policy. Report Copyright. Ad Choicesen-US

Read more: Employee Monitoring of Computers Pros & Cons | eHow.com http://www.ehow.com/info_8317017_employee-monitoring-computers-pros-cons.html#ixzz2Hy4ViLHX

You May Also Find These Documents Helpful

  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Behaviors such as transferring files from a work device to a home computer that is not protected or maintained to IT’s standards, using personal communications that are not as safe as corporate communications, talking about sensitive company matters where others can hear the conversation, and failing to use a laptop privacy guard when working remotely in a public place all invite information theft. Employees also fail to safeguard equipment such as laptop computers and portable storage devices, which can be lost or stolen (Cisco Systems, 2008, p 5).…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    3. What kinds of portable IT help employees work more efficiently and effectively? What may interfere…

    • 562 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Implications differ form company to company. But many of the companies monitor their employees to make sure that they are not sharing company related information with people out of the company. Some companies monitors to make sure that employees are not using companies’ website during work hours.…

    • 418 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I believe that they should monitor employee email and internet usage. By allowing the company to monitor such actions it will stop individuals wasting valuable company time. This also allows for restrictions of site access if one is exploring sites they should not be. It is important to watch to be sure that important information about the company is not leaked out to the public. Actions of their employees effect company whether online or not online. Although, the internet makes it easier to incidentally bring hardship to company in which one works the actions can cause lawsuits against the company.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Employees have a reasonable expectation of privacy within the workplace; however there are circumstances when an employer has a legitimate right to monitor, investigate, and review the activities of its employees. The following identifies business practices that may be executed to ensure the integrity of company products and property, workplace safety, and the monitoring of employee productivity.…

    • 1493 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Lack of user awareness - solution - conduct security awareness training, display security awareness posters, insert reminders in banner greeting, and send email reminders to employees. Security policy violation- solution - place employee on probation, review AUP and employee Manuel, discuss during performance review. Employee blackmail or extortion- solution - track and monitor abnormal employee behavior and use of IT infrastructure during off hours. Alarms and alerts programmed within an IDS/IPS help identify abnormal traffic and can block IP traffic as per policy definition.…

    • 686 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    however there are circumstances when an employer has a legitimate right to monitor, investigate, and review the activities of its employees. The following identifies business practices that may be enacted to ensure the integrity of company products and property, workplace safety, and the monitoring of employee productivity.…

    • 1411 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Pros: These policies could prevent a loss of productivity from employees using social media sites such as Facebook, and MySpace. It could also help to prevent possible virus and malware infections.…

    • 332 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Hello

    • 3190 Words
    • 13 Pages

    Some Windows products do not allow the use of international characters in the username or password. These characters may be part of an international alphabet or Asian characters. Research the characters that are allowed in recent version of Windows and cite your sources. Describe the advantage to the operating system of limiting the character set for usernames and passwords, and whether or not you suggest an alternative.…

    • 3190 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    The key distinction seems to be between public and private. If an employee posts content in a private forum – for example their personal Facebook wall with security settings on – then it is not appropriate for a company to monitor that content. However, if an employee posts something mentioning their employer to an open twitter account, or on a public discussion board, then that content is open to all and is thus of legitimate interest to the employer.…

    • 687 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Employees should have adequate rights to monitor employee use of equipment, such as laptops, tablets and cell phones issued for out-of office use because it is the company’s property designated for work purposes. There are several methods an employer can use to monitor use of company equipment. For instance, GPS tracking for company vehicles, Cell phone monitoring apps, and software to track computer usage. The employer has a right to know where its vehicle is, if it is driven safely, if the mileage is consistent with job duty. The employer also can access cell phone activity via apps. Again, the employer has a concern if the phone is being used excessively for other than work purposes that can be costly to the employer. Why should an employer have to pay rate charges for personal use? Finally, an employer can find monitoring software useful to decipher certain information or to track records and data.…

    • 297 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    It is not illegal for companies to monitor their employees’ workplace computer usage. The American Management Association (AMA) conducts a survey each year on electronic monitoring and surveillance. The latest results from 2007 that polled 304 companies are:…

    • 832 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Negative Message

    • 285 Words
    • 2 Pages

    As you know, we notified all employees last month by memo that computer use will be monitored and should be limited to work related projects. We have taken a step further in this regard to inform that employee personal blogs have also been included in the monitoring system with immediate effect. Please be advised, before implementing these new policies, we worked with our legal team to ensure that the policies and penalties were both, fair and legal.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Internet and the Workplace

    • 1937 Words
    • 8 Pages

    However, in addition to using the Internet, especially the World Wide Web and e-mail for work-related purposes, employees are also using the Internet for personal use, whether for sending personal e-mail messages, playing games, downloading pornography, ordering goods online, checking stock prices, or gambling. Accordingly, many issues have come to light involving employee e-mail and Internet use. Employers have to question how much, if any, personal use of the Internet and e-mail to permit in the workplace. Employers are also grappling with the question of whether to monitor Internet use and whether to block access to certain…

    • 1937 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Perhaps human are lazy and just dislike work as Adam Smith maintained. This idea has been so influential that today most the structure of the workplace assumes we don’t really want to do our work. Thus workers are monitored to ensure they are actually working, and that they are as efficient and productive…

    • 812 Words
    • 4 Pages
    Good Essays